M C Q s D r i v e

Software Engineering Mcqs 840 MCQs [All-Courses]

thumb

Software Engineering MCQs for job test and interview preparation, especially for fresh graduates, students, and candidates appearing in competitive exams. These multiple-choice questions cover a wide range of topics, including the fundamentals of software engineering, its various types, advanced concepts, software design, development processes, testing methods, software evolution, and security aspects.

Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
A Storage management faults
B Data Faults
C Input/Output Faults
D Interface faults
Correct Answer: Storage management faults
An impersonation of an authorised user is an example of a security threat ?
A True
B False
C
D
Correct Answer: False
Circumstances that have potential to cause loss or harm is known as___________________?
A Attack
B Threat
C Vulnerability
D Control
Correct Answer: Threat
A system resource that has a value and has to be protected is known as ________________________?
A Asset
B Control
C Vulnerability
D None of the mentioned
Correct Answer: Asset
What is Life cycle risk assessment ?
A Risk assessment before the system has been deployed
B Risk assessment while the system is being developed
C All of the mentioned
D None of the mentioned
Correct Answer: All of the mentioned
Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ?
A True
B False
C
D
Correct Answer: False
Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
A Fault avoidance
B Fault tolerance
C Fault detection
D Fault Recovery
Correct Answer: Fault avoidance
What are security controls ?
A Controls that are intended to ensure that attacks are unsuccessful
B Controls that are intended to detect and repel attacks
C Controls that are intended to support recovery from problems
D All of the mentioned
Correct Answer: All of the mentioned
Which of the following is a layer of protection for Security ?
A Platform-level protection
B Application-level protection
C Record-level protection
D All of the mentioned
Correct Answer: All of the mentioned
Which of the following is a bad practice of Dependable programming ?
A Limit the visibility of information in a program
B Check array bounds
C Check all inputs for validity
D None of the mentioned
Correct Answer: Check array bounds