Search
.Management Sciences
Category: Dependability and Security
A system resource that has a value and has to be protected is known as ________________________?
0
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
(more…)
Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery
(more…)
Which of the following is a Strategy to achieve Software diversity ?
A. Different programming languages
B. Different design methods and tools
C. Explicit specification of different algorithms
D. All of the mentioned
(more…)
A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
A. Vulnerability
B. Attack
C. Threat
D. Exposure
A characteristic of a software system that can lead to a system error is known as _____________________ ?
A. Human error or mistake
B. System fault
C. System error
D. System failure
The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control
(more…)
Which of the following is not a Protection system ?
A. System to stop a train if it passes a red light
B. System to indicate not returning of the library book
C. System to shut down a reactor if temperature/pressure are too high
D. None of the mentioned
(more…)
Recent Comments