Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

1
When analyzing security requirements focus in system assets with the highest value and greatest exposure.
A)True
B)False
2
It is possible to have a safe system that is not secure.
A)True
B)False
3
Individuals rarely expose their personal information to others on social media networks.
A)True
B)False
4
Wireless networks require the trust and cooperation between nodes that can be exploited by malicious programs?
A)True
B)False
5
Cloud computing is has greater levels of security that other web data repositories.
A)True
B)False
6
The security concerns remain an obstacle to implementing the vision implied by the Internet of Things .
A)True
B)False
7
Security and usability requirements are often in conflict with each other.
A)True
B)False
8
Which of following is not one of the elements of a security model?
A)Criminal background checks
B)External interface requirements
C)Rules of operation
D)Security policy objectives
9
Security metrics and measures need to assess which of these properties?
A)Dependability
B)Survivability
C)Trustworthiness
D)All of the above
10
Security correctness checks should be included which of the following activities?
A)Audits
B)Deployment
C)Inspections
D)Testing
E)a, b, c
11
Which is not one of the elements of a security case?
A)Arguments
B)Bug reports
C)Claims
D)Evidence
12
Security assurance and risk identification must be included in the schedule and budget if they are to be taken seriously.
A)True
B)False
13
Threat analysis is not needed for conventional software applications.
A)True
B)False
14
An incident response plan spells out the actions to be carried out by each stakeholder in response to specific attacks.
A)True
B)False







PressmanOnline Learning Center

Home > Chapter 27 > Multiple Choice Quiz