A. Vulnerability
B. Attack
C. Threat
D. Exposure
Related Mcqs:
- Circumstances that have potential to cause loss or harm is known as___________________?
A. Attack
B. Threat
C. Vulnerability
D. Control - Which of the following terms is a measure of the probability that the system will cause an accident ?
A. Risk
B. Hazard probability
C. Accident
D. Damage - A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - A characteristic of a software system that can lead to a system error is known as _____________________ ?
A. Human error or mistake
B. System fault
C. System error
D. System failure - An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure - An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap - A system resource that has a value and has to be protected is known as ________________________?
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned - How many stages are there in Risk-driven requirements specification ?
A. three
B. four
C. five
D. six - What are security controls ?
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned - The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control