A. Attack
B. Threat
C. Vulnerability
D. Control
Explanation: The answer is self explanatory.
Related Mcqs:
- A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
A. Vulnerability
B. Attack
C. Threat
D. Exposure - Which of the following terms is a measure of the probability that the system will cause an accident ?
A. Risk
B. Hazard probability
C. Accident
D. Damage - A characteristic of a software system that can lead to a system error is known as _____________________ ?
A. Human error or mistake
B. System fault
C. System error
D. System failure - An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure - An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap - A system resource that has a value and has to be protected is known as ________________________?
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned - Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned - What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
A. Fault Avoidance
B. Fault detection
C. Fault tolerance
D. None of the mentioned - Which of the following is a layer of protection for Security ?
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned - The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control