Home »
Software Engineering MCQs
MCQ | Aspects of Security Engineering in Software Engineering
Software Engineering | Aspects of Security Engineering MCQ: This section contains the multiple-choice questions on Aspects of Security Engineering in Software Engineering.
Submitted by IncludeHelp, on August 31, 2021
The goal of security engineering is to design systems that are dependable even in the face of malicious intent, human error, or mischance. When considered as a discipline, systems engineering focuses on the tools, procedures, and methods required to design, develop, and test whole systems, as well as to modify existing systems as their environment changes.
Aspects of Security Engineering in Software Engineering MCQs
Here you will find the MCQs on Security engineers in Software Engineering. The MCQs will enhance the learning and knowledge base with respect to Security engineers in Software Engineering.
Q1. Security engineers build systems that have ___ their assets from attack.
- The ability to product
- The ability to project
- The ability to protect
- All of the mentioned above
Answer: C) The ability to protect
Explanation:
Security engineers design solutions that have the capability of protecting their clients' assets from attack by outside parties. Using threat analysis, we may establish the controls that are necessary to decrease the exposure that occurs as a result of attacks that take advantage of system weaknesses.
Q2. Security assurance is preformed and continues throughout ____.
- The hardware process
- The software process
- The hardware & software both
- None of the mentioned above
Answer: B) The software process
Explanation:
Security assurance is preformed and continues throughout the software process.
Q3. Software security provides ___ that enable a software system to protect its assets from attack.
- The mechanisms
- The ability to product
- The software process
- None of the mentioned above
Answer: A) The mechanisms
Explanation:
Software security provides the mechanisms that enable a software system to protect its assets from attack.
Q4. Software security is an aspect of software ____.
- Process assurance
- Quality assurance
- Product assurance
- All of the mentioned above
Answer: B) Quality assurance
Explanation:
Software security is an aspect of software quality assurance. Response to complaints of system vulnerabilities that have been exploited presents a significant challenge when trying to enhance the security of an existing system.
Q5. Security is not just a concern to the people developing software for ____.
- The military
- Government
- Health agencies
- All of the mentioned above
Answer: D) All of the mentioned above
Explanation:
Security is a problem for everyone, not just those who work on software for the military, government, or health-related organizations. Today, any software engineer who is responsible for protecting client resources must be concerned about security.
Q6. Users of mobile apps have access to almost the same web services that fixed-location wired Internet users have,
- True
- False
Answer: A) True
Explanation:
Web services available to users of mobile apps are nearly identical to those available to users of fixed-location wired Internet connections.
Q7. Cloud computing brings additional ___ and ___ concerns.
- Confidentiality, privacy
- Testing, development
- Integration, maintenance
- All of the mentioned above
Answer: A) Confidentiality, privacy
Explanation:
Because data is entrusted to remote computers that are managed by service providers, cloud computing raises extra concerns about confidentiality and privacy. We have no control over our data because it is in the hands of these cloud service providers.
Q8. Amongst which of the following is / are; a security model needs to capture,
- Security policy objectives, external interface requirements
- Software security requirements, rules of operation
- Specifications describing model-system correspondence.
- All of the mentioned above
Answer: D) All of the mentioned above
Explanation:
A security model needs to capture the following items: security policy objectives, external interface requirements, software security requirements, rules of operation, and specifications describing model-system correspondence.
Q9. Security flaws and the losses associated with them become more costly and more ominous,
- True
- False
Answer: A) True
Explanation:
Security weaknesses, as well as the losses that result from them, are becoming increasingly costly and ominous.
Q10. Amongst which of the following is / are the security case consists elements,
- The claims themselves
- The arguments that link the claims to each other through evidence and assumptions
- The body of evidence and explicit assumptions that support the arguments.
- All of the mentioned above
Answer: D) All of the mentioned above
Explanation:
Each security case consists of three elements: the claims themselves, the arguments that link the claims to each other through evidence and assumptions, and the body of evidence and explicit assumptions that support the arguments.