MCQ | Aspects of Security Engineering in Software Engineering

Software Engineering | Aspects of Security Engineering MCQ: This section contains the multiple-choice questions on Aspects of Security Engineering in Software Engineering.
Submitted by IncludeHelp, on August 31, 2021

The goal of security engineering is to design systems that are dependable even in the face of malicious intent, human error, or mischance. When considered as a discipline, systems engineering focuses on the tools, procedures, and methods required to design, develop, and test whole systems, as well as to modify existing systems as their environment changes.

Aspects of Security Engineering in Software Engineering MCQs

Here you will find the MCQs on Security engineers in Software Engineering. The MCQs will enhance the learning and knowledge base with respect to Security engineers in Software Engineering.

Q1. Security engineers build systems that have ___ their assets from attack.

  1. The ability to product
  2. The ability to project
  3. The ability to protect
  4. All of the mentioned above

Answer: C) The ability to protect

Explanation:

Security engineers design solutions that have the capability of protecting their clients' assets from attack by outside parties. Using threat analysis, we may establish the controls that are necessary to decrease the exposure that occurs as a result of attacks that take advantage of system weaknesses.


Q2. Security assurance is preformed and continues throughout ____.

  1. The hardware process
  2. The software process
  3. The hardware & software both
  4. None of the mentioned above

Answer: B) The software process

Explanation:

Security assurance is preformed and continues throughout the software process.


Q3. Software security provides ___ that enable a software system to protect its assets from attack.

  1. The mechanisms
  2. The ability to product
  3. The software process
  4. None of the mentioned above

Answer: A) The mechanisms

Explanation:

Software security provides the mechanisms that enable a software system to protect its assets from attack.


Q4. Software security is an aspect of software ____.

  1. Process assurance
  2. Quality assurance
  3. Product assurance
  4. All of the mentioned above

Answer: B) Quality assurance

Explanation:

Software security is an aspect of software quality assurance. Response to complaints of system vulnerabilities that have been exploited presents a significant challenge when trying to enhance the security of an existing system.


Q5. Security is not just a concern to the people developing software for ____.

  1. The military
  2. Government
  3. Health agencies
  4. All of the mentioned above

Answer: D) All of the mentioned above

Explanation:

Security is a problem for everyone, not just those who work on software for the military, government, or health-related organizations. Today, any software engineer who is responsible for protecting client resources must be concerned about security.


Q6. Users of mobile apps have access to almost the same web services that fixed-location wired Internet users have,

  1. True
  2. False

Answer: A) True

Explanation:

Web services available to users of mobile apps are nearly identical to those available to users of fixed-location wired Internet connections.


Q7. Cloud computing brings additional ___ and ___ concerns.

  1. Confidentiality, privacy
  2. Testing, development
  3. Integration, maintenance
  4. All of the mentioned above

Answer: A) Confidentiality, privacy

Explanation:

Because data is entrusted to remote computers that are managed by service providers, cloud computing raises extra concerns about confidentiality and privacy. We have no control over our data because it is in the hands of these cloud service providers.


Q8. Amongst which of the following is / are; a security model needs to capture,

  1. Security policy objectives, external interface requirements
  2. Software security requirements, rules of operation
  3. Specifications describing model-system correspondence.
  4. All of the mentioned above

Answer: D) All of the mentioned above

Explanation:

A security model needs to capture the following items: security policy objectives, external interface requirements, software security requirements, rules of operation, and specifications describing model-system correspondence.


Q9. Security flaws and the losses associated with them become more costly and more ominous,

  1. True
  2. False

Answer: A) True

Explanation:

Security weaknesses, as well as the losses that result from them, are becoming increasingly costly and ominous.


Q10. Amongst which of the following is / are the security case consists elements,

  1. The claims themselves
  2. The arguments that link the claims to each other through evidence and assumptions
  3. The body of evidence and explicit assumptions that support the arguments.
  4. All of the mentioned above

Answer: D) All of the mentioned above

Explanation:

Each security case consists of three elements: the claims themselves, the arguments that link the claims to each other through evidence and assumptions, and the body of evidence and explicit assumptions that support the arguments.





Comments and Discussions!

Load comments ↻





Copyright © 2024 www.includehelp.com. All rights reserved.