A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned
Explanation: All the options define a security control property.
Related Mcqs:
- Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery - An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
A. risk
B. control
C. attack
D. asset - At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?
A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned - To specify security requirements, one should identify the risks that are to be dealt with ?
A. True
B. False - Which of the following is a layer of protection for Security ?
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned - Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ?
A. True
B. False - An impersonation of an authorised user is an example of a security threat ?
A. True
B. False - The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control