Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Software Security Technologies
Quiz 2: Software Engineering and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Before users are allowed to access any information in the MLS model, they assigned a ____ level.
Question 2
Multiple Choice
A "____" is a special type of "smart" virus that can replicate from system to system without human user intervention.
Question 3
Multiple Choice
A ____ case is a specific way of using the system by performing some part of the functionality.
Question 4
Multiple Choice
The ____ model is the most fundamental process model used to build software.
Question 5
True/False
The value of a DEUD is the same for every software product deployed.
Question 6
Multiple Choice
____ provides strict access control, allowing information to flow freely between users in a computing system who have appropriate security access while preventing information leaks to unauthorized users.
Question 7
True/False
Performance and piracy are not considerations when data and execution are sent remotely.
Question 8
Multiple Choice
____ is defined as the illegal copying and/or distributing of copyrighted software without the permission of the copyright holder.
Question 9
True/False
A security requirement is a manifestation of a high-level security policy related to the detailed requirements of a specific system.
Question 10
Multiple Choice
During ____, unified security architecture must be put in place to enable the system to enforce various security principles and fulfill all the use cases from requirement analysis.
Question 11
Multiple Choice
The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.
Question 12
Multiple Choice
____ breaks the software code into portions that run on ordinary RAM, portions that run on read-only memory (ROM) , portions that run under secure hardware, and/or portions that run remotely in a trusted location.