Software Engineering | Aspects of Security Engineering MCQ: This section contains the multiple-choice questions on Aspects of Security Engineering in Software Engineering.

The goal of security engineering is to design systems that are dependable even in the face of malicious intent, human error, or mischance. When considered as a discipline, systems engineering focuses on the tools, procedures, and methods required to design, develop, and test whole systems, as well as to modify existing systems as their environment changes.

Here you will find the MCQs on Security engineers in Software Engineering. The MCQs will enhance the learning and knowledge base with respect to Security engineers in Software Engineering.

questions

Title
Security engineers build systems that have ___ their assets from attack

Security engineers build systems that have ___ their assets from attack.


  1. The ability to product
  2. The ability to project
  3. The ability to protect
  4. All of the mentioned above
discuss
Security assurance is preformed and continues throughout ____

Security assurance is preformed and continues throughout ____.


  1. The hardware process
  2. The software process
  3. The hardware & software both
  4. None of the mentioned above
discuss
Software security provides ___ that enable a software system to protect its assets from attack

Software security provides ___ that enable a software system to protect its assets from attack.


  1. The mechanisms
  2. The ability to product
  3. The software process
  4. None of the mentioned above
discuss
Software security is an aspect of software ____

Software security is an aspect of software ____.


  1. Process assurance
  2. Quality assurance
  3. Product assurance
  4. All of the mentioned above
discuss
Security is not just a concern to the people developing software for ____

Security is not just a concern to the people developing software for ____.


  1. The military
  2. Government
  3. Health agencies
  4. All of the mentioned above
discuss
Users of mobile apps have access to almost the same web services that fixed-location wired Internet users have,

Users of mobile apps have access to almost the same web services that fixed-location wired Internet users have,


  1. True
  2. False
discuss
Cloud computing brings additional ___ and ___ concerns

Cloud computing brings additional ___ and ___ concerns.


  1. Confidentiality, privacy
  2. Testing, development
  3. Integration, maintenance
  4. All of the mentioned above
discuss
Amongst which of the following is / are; a security model needs to capture,

Amongst which of the following is / are; a security model needs to capture,


  1. Security policy objectives, external interface requirements
  2. Software security requirements, rules of operation
  3. Specifications describing model-system correspondence
  4. All of the mentioned above
discuss
Security flaws and the losses associated with them become more costly and more ominous,

Security flaws and the losses associated with them become more costly and more ominous,


  1. True
  2. False
discuss
Amongst which of the following is / are the security case consists elements,

Amongst which of the following is / are the security case consists elements,


  1. The claims themselves
  2. The arguments that link the claims to each other through evidence and assumptions
  3. The body of evidence and explicit assumptions that support the arguments
  4. All of the mentioned above
discuss
total MCQs: 10

MCQs

10

Views

55

Best Answers

299

Points

5