Security Engineering

Security Engineering

University

5 Qs

quiz-placeholder

Similar activities

Cloud computing quiz

Cloud computing quiz

University

10 Qs

MAD Unit 4 Tl

MAD Unit 4 Tl

University

10 Qs

1-10

1-10

University

10 Qs

Topic 4.0 Window Operating System

Topic 4.0 Window Operating System

University

10 Qs

Pengenalan Profesi Bidang PPLG

Pengenalan Profesi Bidang PPLG

10th Grade - University

10 Qs

Software Audit Quiz

Software Audit Quiz

University

10 Qs

Konsep Dasar Sistem Informasi

Konsep Dasar Sistem Informasi

University

10 Qs

POST TEST PELATIHAN

POST TEST PELATIHAN

University

10 Qs

Security Engineering

Security Engineering

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Gabriel Costa

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between application security and infrastructure security?

Infrastructure security protects the application code

Application security focuses on securing data and functionalities

Infrastructure security only deals with software vulnerabilities

Application security does not include encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is essential in secure software design?

Ignoring data encryption

Allowing any type of access

Validate user input

Not making regular backups

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an operational risk?

Weak password policies

Using outdated software libraries

Unpatched server firmware

A DoS (Denial of Service) attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is system survivability crucial in complex environments?

It ensures rapid response to incidents and disaster recovery

It makes the system more vulnerable to attacks

It reduces the need for authentication

It removes the need for risk assessments

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of vulnerability management?

Only fixing security issues after an attack

Ensuring that the software remains outdated

Identifying, assessing, and mitigating security weaknesses

Ignoring minor software issues