Software Engineering Questions and Answers – Security Engineering

This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Security Engineering”.

1. Which of the following is a layer of protection for Security ?
a) Platform-level protection
b) Application-level protection
c) Record-level protection
d) All of the mentioned
View Answer

Answer:d
Explanation: None.

2. Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks.
a) True
b) False
View Answer

Answer:b
Explanation: Security engineering is concerned with maintenance as well as development of such systems.

3. What are security controls ?
a) Controls that are intended to ensure that attacks are unsuccessful
b) Controls that are intended to detect and repel attacks
c) Controls that are intended to support recovery from problems
d) All of the mentioned
View Answer

Answer:d
Explanation: All the options define a security control property.
advertisement
advertisement

4. Controls that are intended to repel attacks is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) None of the mentioned
View Answer

Answer:b
Explanation: Here the system is designed so that faults in the delivered software do not result in system failure.

5. Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) Fault Recovery
View Answer

Answer:a
Explanation: In Fault avoidance the system is developed in such a way that human error is avoided and thus system faults are minimised.

6. What is Life cycle risk assessment ?
a) Risk assessment before the system has been deployed
b) Risk assessment while the system is being developed
c) All of the mentioned
d) None of the mentioned
View Answer

Answer:c
Explanation: None.

7. A system resource that has a value and has to be protected is known as
a) Asset
b) Control
c) Vulnerability
d) None of the mentioned
View Answer

Answer:a
Explanation: The answer is self explanatory.
advertisement

8. An impersonation of an authorised user is an example of a security threat.
a) True
b) False
View Answer

Answer:b
Explanation: It is a security attack.

9. The records of each patient that is receiving or has received treatment resembles which security concept ?
a) Asset
b) Threat
c) Vulnerability
d) Control
View Answer

Answer:a
Explanation: Asset is a system resource that has a value and has to be protected.
advertisement

10. Circumstances that have potential to cause loss or harm is known as
a) Attack
b) Threat
c) Vulnerability
d) Control
View Answer

Answer:b
Explanation: The answer is self explanatory.

Sanfoundry Global Education & Learning Series – Software Engineering.

Here’s the list of Best Books in Software Engineering.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.