dependability and security Mcqs
4. Which reliability requirements are concerned with maintaining copies of the system ?
comments icon0
A. Recovery requirements

B. Redundancy requirements

C. Ambiguous requirements

D. Checking requirements

6. Which level of Static Analysis allows specific rules that apply to a program to be checked ?
comments icon0

A. Characteristic error checking

B. All of the mentioned

C. User-defined error checking

D. Assertion checking

16. What is Life cycle risk assessment ?
comments icon0

A. None of the mentioned

B. Risk assessment while the system is being developed

C. All of the mentioned

D. Risk assessment before the system has been deployed

17. Which of the following is not a functional reliability requirement for a system ?
comments icon0
A. Ambiguous requirements

B. Redundancy requirements

C. Checking requirements

D. Recovery requirements

20. Which of the following is a bad practice of Dependable programming ?
comments icon0

A. Check all inputs for validity

B. None of the mentioned

C. Limit the visibility of information in a program

D. Check array bounds
22. Which of the following is a layer of protection for Security ?
comments icon0

A. Platform-level protection

B. Record-level protection

C. All of the mentioned

D. Application-level protection

24. Choose the fault class in which the following automated static analysis check would fall:Pointer Arithmetic ?
comments icon0

A. Input/Output Faults

B. Interface faults

C. Data Faults

D. Storage management faults
27. Which of the following examples does not involve dependability engineering ?
comments icon0

A. Telecommunications

B. Medical Systems

C. Library Management

D. Power Systems

28. POFOD stands for___________________?
comments icon0

A. Possibility of failure on demand

B. Probability of failure on demand

C. Possibility of failure of data

D. Probability of failure of data

29. Which of the following is a technique covered in Static Analysis ?
comments icon0
A. All of the mentioned

B. Formal verification

C. Model checking

D. Automated program analysis

34. What is a Range check ?
comments icon0

A. None of the mentioned

B. Use information about the input to check if it is reasonable rather than an extreme value

C. Check that the input falls within a known range

D. Check that the input does not exceed some maximum size e.g. 40 characters for a name

35. Which of the following is a Strategy to achieve Software diversity ?
comments icon0

A. Explicit specification of different algorithms

B. Different programming languages

C. All of the mentioned

D. Different design methods and tools

38. Select the disadvantage of using Formal methods ___________________?
comments icon0
A. They require the use of specialised notations that cannot be understood by domain experts

B. Producing a mathematical specification requires a detailed analysis of the requirements

C. Concurrent systems can be analysed to discover race conditions that might lead to deadlock

D. All of the mentioned

39. Which of the following is incorrect with respect to Model Checking ?
comments icon0

A. Model checking is particularly valuable for verifying concurrent systems

B. The model checker explores all possible paths through the model

C. All of the mentioned

D. Model checking is computationally very inexpensive
40. What are security controls ?
comments icon0
A. All of the mentioned

B. Controls that are intended to detect and repel attacks

C. Controls that are intended to support recovery from problems

D. Controls that are intended to ensure that attacks are unsuccessful

41. Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
comments icon0
A. Loss of service

B. None of the mentioned

C. System/data corruption

D. Incorrect service delivery

42. Which of the following is not a Protection system ?
comments icon0

A. None of the mentioned

B. System to shut down a reactor if temperature/pressure are too high

C. System to indicate not returning of the library book

D. System to stop a train if it passes a red light