Security Engineering

Security Engineering

University

5 Qs

quiz-placeholder

Similar activities

CS 333 Lesson 1 - Prelim

CS 333 Lesson 1 - Prelim

University

8 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

Quiz - Hardware & Software

Quiz - Hardware & Software

University

10 Qs

SYSTEM ADMIN FINAL EXAM IDENTIFICATION 2024-25

SYSTEM ADMIN FINAL EXAM IDENTIFICATION 2024-25

University

10 Qs

CI - Knowledge Check 2

CI - Knowledge Check 2

University

8 Qs

Audit Knowledge Quiz

Audit Knowledge Quiz

University

10 Qs

ОИС НАСТОЯЩИЙ БАЗА 11-20

ОИС НАСТОЯЩИЙ БАЗА 11-20

University

10 Qs

Conocimientos sobre el software

Conocimientos sobre el software

University

10 Qs

Security Engineering

Security Engineering

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Gabriel Costa

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between application security and infrastructure security?

Infrastructure security protects the application code

Application security focuses on securing data and functionalities

Infrastructure security only deals with software vulnerabilities

Application security does not include encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is essential in secure software design?

Ignoring data encryption

Allowing any type of access

Validate user input

Not making regular backups

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an operational risk?

Weak password policies

Using outdated software libraries

Unpatched server firmware

A DoS (Denial of Service) attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is system survivability crucial in complex environments?

It ensures rapid response to incidents and disaster recovery

It makes the system more vulnerable to attacks

It reduces the need for authentication

It removes the need for risk assessments

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of vulnerability management?

Only fixing security issues after an attack

Ensuring that the software remains outdated

Identifying, assessing, and mitigating security weaknesses

Ignoring minor software issues