A. Attack
B. Threat
C. Vulnerability
D. Control
Explanation: The answer is self explanatory.
Advertisement
Related Mcqs:
- A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
- A. Vulnerability B. Attack C. Threat D. Exposure...
- Which of the following terms is a measure of the probability that the system will cause an accident ?
- A. Risk B. Hazard probability C. Accident D. Damage...
- A characteristic of a software system that can lead to a system error is known as _____________________ ?
- A. Human error or mistake B. System fault C. System error D. System failure...
- An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
- A. Human error or mistake B. System fault C. System error D. System failure...
- An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
- A. Risk B. Hazard probability C. Hazard severity D. Mishap...
- A system resource that has a value and has to be protected is known as ________________________?
- A. Asset B. Control C. Vulnerability D. None of the mentioned...
- Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
- A. Loss of service B. Incorrect service delivery C. System/data corruption D. None of the mentioned...
- What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
- A. Fault Avoidance B. Fault detection C. Fault tolerance D. None of the mentioned...
- Which of the following is a layer of protection for Security ?
- A. Platform-level protection B. Application-level protection C. Record-level protection D. All of the mentioned...
- The records of each patient that is receiving or has received treatment resembles which security concept ?
- A. Asset B. Threat C. Vulnerability D. Control...
Advertisement