A. True
B. False
Explanation: It is a security attack.
Related Mcqs:
- A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
A. risk
B. control
C. attack
D. asset - An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?
A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned - To specify security requirements, one should identify the risks that are to be dealt with ?
A. True
B. False - Which of the following is a layer of protection for Security ?
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned - What are security controls ?
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned - Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ?
A. True
B. False - Static analysis is now routinely used in the development of many safety and security critical systems?
A. True
B. False - The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control