Exam 2: Software Engineering and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ takes a close look at each software module and involves picking the appropriate programming languages, data structures, and algorithms.

(Multiple Choice)
4.8/5
(30)

What are the MLS general access rules?

(Essay)
4.9/5
(36)

A "____" is a special type of "smart" virus that can replicate from system to system without human user intervention.

(Multiple Choice)
4.9/5
(37)

____ is defined as the illegal copying and/or distributing of copyrighted software without the permission of the copyright holder.

(Multiple Choice)
4.9/5
(34)

In AOP, a(n) ____ is a rule indicating a logical description of a set of join points.

(Multiple Choice)
4.8/5
(31)

The ____ model provides an implementation guide that helps project managers to decide if a particular activity needs to be adopted.

(Multiple Choice)
5.0/5
(41)

Compare dynamic versus static analysis.

(Essay)
4.9/5
(31)

TCSEC defined _____ as the combination of the computer hardware, the software security kernel, and its privileged components.

(Short Answer)
4.8/5
(32)

What are the three essential TCB elements required to ensure that an MLS system operates correctly?

(Essay)
4.7/5
(38)

A "____" is a type of stand-alone software attack that does not replicate by itself.

(Multiple Choice)
4.8/5
(33)

____ is a new programming paradigm that promotes separation of concerns.

(Multiple Choice)
4.8/5
(38)

AOP introduces a new construct, called a(n) ____, that seeks to encapsulate crosscutting concerns.

(Multiple Choice)
4.8/5
(38)

With ____, the software is stored in such a way that a code is "hidden" before execution and an independently stored key is retrieved and constructed prior to execution using a method known only by the vendor.

(Multiple Choice)
4.9/5
(36)

In terms of software engineering, _____ is defined as the effort to create software in a secure computing platform.

(Short Answer)
4.8/5
(38)

The value of a DEUD is the same for every software product deployed.

(True/False)
4.8/5
(36)

A ____ attaches itself to a program or data file so that it can spread from one computer to another, infecting as it travels.

(Multiple Choice)
4.8/5
(42)

The interrelationships among security levels in the Bell-LaPadula security model form a directed graph called a(n) _____.

(Short Answer)
4.8/5
(35)

A ____ case is a specific way of using the system by performing some part of the functionality.

(Multiple Choice)
4.8/5
(33)

The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.

(Multiple Choice)
4.8/5
(34)

Security technologies such as firewalls, anti-virus software, and intrusion-detection engines have been developed to "catch" security holes in software systems.

(True/False)
4.8/5
(31)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)