Exam 2: Software Engineering and Security
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
____ takes a close look at each software module and involves picking the appropriate programming languages, data structures, and algorithms.
(Multiple Choice)
4.8/5
(30)
A "____" is a special type of "smart" virus that can replicate from system to system without human user intervention.
(Multiple Choice)
4.9/5
(37)
____ is defined as the illegal copying and/or distributing of copyrighted software without the permission of the copyright holder.
(Multiple Choice)
4.9/5
(34)
In AOP, a(n) ____ is a rule indicating a logical description of a set of join points.
(Multiple Choice)
4.8/5
(31)
The ____ model provides an implementation guide that helps project managers to decide if a particular activity needs to be adopted.
(Multiple Choice)
5.0/5
(41)
TCSEC defined _____ as the combination of the computer hardware, the software security kernel, and its privileged components.
(Short Answer)
4.8/5
(32)
What are the three essential TCB elements required to ensure that an MLS system operates correctly?
(Essay)
4.7/5
(38)
A "____" is a type of stand-alone software attack that does not replicate by itself.
(Multiple Choice)
4.8/5
(33)
____ is a new programming paradigm that promotes separation of concerns.
(Multiple Choice)
4.8/5
(38)
AOP introduces a new construct, called a(n) ____, that seeks to encapsulate crosscutting concerns.
(Multiple Choice)
4.8/5
(38)
With ____, the software is stored in such a way that a code is "hidden" before execution and an independently stored key is retrieved and constructed prior to execution using a method known only by the vendor.
(Multiple Choice)
4.9/5
(36)
In terms of software engineering, _____ is defined as the effort to create software in a secure computing platform.
(Short Answer)
4.8/5
(38)
The value of a DEUD is the same for every software product deployed.
(True/False)
4.8/5
(36)
A ____ attaches itself to a program or data file so that it can spread from one computer to another, infecting as it travels.
(Multiple Choice)
4.8/5
(42)
The interrelationships among security levels in the Bell-LaPadula security model form a directed graph called a(n) _____.
(Short Answer)
4.8/5
(35)
A ____ case is a specific way of using the system by performing some part of the functionality.
(Multiple Choice)
4.8/5
(33)
The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.
(Multiple Choice)
4.8/5
(34)
Security technologies such as firewalls, anti-virus software, and intrusion-detection engines have been developed to "catch" security holes in software systems.
(True/False)
4.8/5
(31)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)