Midterm Exam Questions - Software Security

Midterm Exam Questions - Software Security

University

•

30 Qs

quiz-placeholder

Similar activities

SAS 1 Informatika 7

SAS 1 Informatika 7

7th Grade - University

•

25 Qs

Quiz Merancang Pseudocode

Quiz Merancang Pseudocode

10th Grade - University

•

25 Qs

Remidi PTS Gasal

Remidi PTS Gasal

12th Grade - University

•

25 Qs

SAS Dasar Program Keahlian RPL Kelas X

SAS Dasar Program Keahlian RPL Kelas X

10th Grade - University

•

25 Qs

(9) TF Informatika "Algoritma"

(9) TF Informatika "Algoritma"

10th Grade - University

•

25 Qs

Soal Labirin dan Berpikir Komputasional

Soal Labirin dan Berpikir Komputasional

7th Grade - University

•

25 Qs

Bài kiểm tra Chương 4_CSDL&DLL

Bài kiểm tra Chương 4_CSDL&DLL

University

•

25 Qs

Pemahaman Jaringan Komputer

Pemahaman Jaringan Komputer

8th Grade - University

•

25 Qs

Midterm Exam Questions - Software Security

Midterm Exam Questions - Software Security

Assessment

Quiz

•

Information Technology (IT)

•

University

•

Practice Problem

•

Hard

Created by

M. Oktoda N.

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Prinsip dasar keamanan informasi yang memastikan data tidak dapat diakses oleh pihak yang tidak berwenang disebut...

Integrity

Availability

Confidentiality

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Konsep CIA Triad yang berfokus pada keutuhan data dan sistem, memastikan data tidak dimodifikasi secara tidak sah, adalah...

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Dalam model keamanan, Celah atau kelemahan dalam sistem yang dapat dieksploitasi oleh ancaman disebut...

Ancaman (Threat)

Serangan (Attack)

Kerentanan (Vulnerability)

Mitigasi

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Praktik mengintegrasikan kontrol keamanan, mulai dari tahap desain hingga deployment dan maintenance dalam siklus hidup pengembangan perangkat lunak, secara umum disebut...

Quality Assurance

System Testing

Keamanan Perangkat Lunak (Software Security)

Disaster Recovery

5.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Menurut model SDL (Security Development Lifecycle) Microsoft, tahap awal di mana threat modeling dan security architecture review dilakukan adalah fase...

Training Phase

Requirements Phase

Design Phase

Verification Phase

6.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Komponen dari NIST Cybersecurity Framework yang bertujuan untuk mengimplementasikan safeguards untuk memastikan layanan kritis berjalan dan membatasi dampak serangan adalah fungsi...

Identify

Detect

Respond

Protect

7.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Model Ancaman STRIDE yang berfokus pada penyamaran identitas untuk mendapatkan akses tidak sah adalah...

Tampering

Repudiation

Spoofing

Information Disclosure

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?