adplus-dvertising
frame-decoration

Question

A weakness in a computer-based system that may be exploited to cause loss or harm is known as?

a.

Vulnerability

b.

Attack

c.

Threat

d.

Exposure

Posted under Software Engineering

Answer: (a).Vulnerability

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. A weakness in a computer-based system that may be exploited to cause loss or harm is known as?

Similar Questions

Discover Related MCQs

Q. A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems.

Q. How many stages are there in Risk-driven requirements specification?

Q. POFOD stands for

Q. Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period?

Q. Which of the following is not a functional reliability requirement for a system?

Q. At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions?

Q. Which reliability requirements are concerned with maintaining copies of the system?

Q. Which of the following examples does not involve dependability engineering ?

Q. What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?

Q. What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?

Q. Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?

Q. Which of the following is a Strategy to achieve Software diversity ?

Q. Which of the following is a bad practice of Dependable programming ?

Q. Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering.

Q.  Which model gives the overall reliability of the system that is projected and certified?

Q. Which is the degree where the software performs its required function?

Q. Measure of reliability is given by ______ .

Q. Which of the following is not a phase of “bath tub curve” of hardware reliability?

Q. How is reliability and failure intensity related to each other?

Q. How many product quality factors are proposed in McCall quality model?