A. True
B. False
Explanation: To specify security requirements, one should identify the assets that are to be dealt with.
Related Mcqs:
- At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?
A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned - How many stages are there in Risk-driven requirements specification ?
A. three
B. four
C. five
D. six - Which reliability requirements are concerned with maintaining copies of the system ?
A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements - An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
A. risk
B. control
C. attack
D. asset - Which of the following is a layer of protection for Security ?
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned - What are security controls ?
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned - An impersonation of an authorised user is an example of a security threat ?
A. True
B. False - The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control