250+ TOP MCQs on Security Engineering and Answers

Software Engineering Multiple Choice Questions on “Security Engineering”.

1. Which of the following is a layer of protection for Security ?
a) Platform-level protection
b) Application-level protection
c) Record-level protection
d) All of the mentioned

Answer:d

2. Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks.
a) True
b) False

Answer:b
Clarification: Security engineering is concerned with maintenance as well as development of such systems.

3. What are security controls ?
a) Controls that are intended to ensure that attacks are unsuccessful
b) Controls that are intended to detect and repel attacks
c) Controls that are intended to support recovery from problems
d) All of the mentioned

Answer:d
Clarification: All the options define a security control property.

4. Controls that are intended to repel attacks is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) None of the mentioned

Answer:b
Clarification: Here the system is designed so that faults in the delivered software do not result in system failure.

5. Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) Fault Recovery

Answer:a
Clarification: In Fault avoidance the system is developed in such a way that human error is avoided and thus system faults are minimised.

6. What is Life cycle risk assessment ?
a) Risk assessment before the system has been deployed
b) Risk assessment while the system is being developed
c) All of the mentioned
d) None of the mentioned

Answer:c

7. A system resource that has a value and has to be protected is known as
a) Asset
b) Control
c) Vulnerability
d) None of the mentioned

Answer:a
Clarification: The answer is self explanatory.

8. An impersonation of an authorised user is an example of a security threat.
a) True
b) False

Answer:b
Clarification: It is a security attack.

9. The records of each patient that is receiving or has received treatment resembles which security concept ?
a) Asset
b) Threat
c) Vulnerability
d) Control

Answer:a
Clarification: Asset is a system resource that has a value and has to be protected.

10. Circumstances that have potential to cause loss or harm is known as
a) Attack
b) Threat
c) Vulnerability
d) Control

Answer:b
Clarification: The answer is self explanatory.

Leave a Reply

Your email address will not be published. Required fields are marked *