This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Security Engineering”.
1. Which of the following is a layer of protection for Security ?
a) Platform-level protection
b) Application-level protection
c) Record-level protection
d) All of the mentioned
View Answer
Explanation: None.
2. Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks.
a) True
b) False
View Answer
Explanation: Security engineering is concerned with maintenance as well as development of such systems.
3. What are security controls ?
a) Controls that are intended to ensure that attacks are unsuccessful
b) Controls that are intended to detect and repel attacks
c) Controls that are intended to support recovery from problems
d) All of the mentioned
View Answer
Explanation: All the options define a security control property.
4. Controls that are intended to repel attacks is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) None of the mentioned
View Answer
Explanation: Here the system is designed so that faults in the delivered software do not result in system failure.
5. Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) Fault Recovery
View Answer
Explanation: In Fault avoidance the system is developed in such a way that human error is avoided and thus system faults are minimised.
6. What is Life cycle risk assessment ?
a) Risk assessment before the system has been deployed
b) Risk assessment while the system is being developed
c) All of the mentioned
d) None of the mentioned
View Answer
Explanation: None.
7. A system resource that has a value and has to be protected is known as
a) Asset
b) Control
c) Vulnerability
d) None of the mentioned
View Answer
Explanation: The answer is self explanatory.
8. An impersonation of an authorised user is an example of a security threat.
a) True
b) False
View Answer
Explanation: It is a security attack.
9. The records of each patient that is receiving or has received treatment resembles which security concept ?
a) Asset
b) Threat
c) Vulnerability
d) Control
View Answer
Explanation: Asset is a system resource that has a value and has to be protected.
10. Circumstances that have potential to cause loss or harm is known as
a) Attack
b) Threat
c) Vulnerability
d) Control
View Answer
Explanation: The answer is self explanatory.
Sanfoundry Global Education & Learning Series – Software Engineering.
Here’s the list of Best Books in Software Engineering.
- Practice Information Technology MCQs
- Practice Computer Science MCQs
- Check Software Engineering Books
- Apply for Computer Science Internship
- Practice BCA MCQs