A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. True
B. False
Read More Details about this Mcq
A. Attack
B. Threat
C. Vulnerability
D. Control
Read More Details about this Mcq
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Read More Details about this Mcq
A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
A. True
B. False
Read More Details about this Mcq
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery
Read More Details about this Mcq
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned
Read More Details about this Mcq
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned
A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned
Read More Details about this Mcq
