2502. Which reliability requirements are concerned with maintaining copies of the system ?
comments icon0
A. Recovery requirements

B. Redundancy requirements

C. Ambiguous requirements

D. Checking requirements

2504. Which level of Static Analysis allows specific rules that apply to a program to be checked ?
comments icon0

A. Characteristic error checking

B. All of the mentioned

C. User-defined error checking

D. Assertion checking

2514. What is Life cycle risk assessment ?
comments icon0

A. None of the mentioned

B. Risk assessment while the system is being developed

C. All of the mentioned

D. Risk assessment before the system has been deployed

2515. Which of the following is not a functional reliability requirement for a system ?
comments icon0
A. Ambiguous requirements

B. Redundancy requirements

C. Checking requirements

D. Recovery requirements

2518. Which of the following is a bad practice of Dependable programming ?
comments icon0

A. Check all inputs for validity

B. None of the mentioned

C. Limit the visibility of information in a program

D. Check array bounds
2520. Which of the following is a layer of protection for Security ?
comments icon0

A. Platform-level protection

B. Record-level protection

C. All of the mentioned

D. Application-level protection

2522. Choose the fault class in which the following automated static analysis check would fall:Pointer Arithmetic ?
comments icon0

A. Input/Output Faults

B. Interface faults

C. Data Faults

D. Storage management faults
2525. Which of the following examples does not involve dependability engineering ?
comments icon0

A. Telecommunications

B. Medical Systems

C. Library Management

D. Power Systems

2526. POFOD stands for___________________?
comments icon0

A. Possibility of failure on demand

B. Probability of failure on demand

C. Possibility of failure of data

D. Probability of failure of data

2527. Which of the following is a technique covered in Static Analysis ?
comments icon0
A. All of the mentioned

B. Formal verification

C. Model checking

D. Automated program analysis

2532. What is a Range check ?
comments icon0

A. None of the mentioned

B. Use information about the input to check if it is reasonable rather than an extreme value

C. Check that the input falls within a known range

D. Check that the input does not exceed some maximum size e.g. 40 characters for a name

2533. Which of the following is a Strategy to achieve Software diversity ?
comments icon0

A. Explicit specification of different algorithms

B. Different programming languages

C. All of the mentioned

D. Different design methods and tools

2536. Select the disadvantage of using Formal methods ___________________?
comments icon0
A. They require the use of specialised notations that cannot be understood by domain experts

B. Producing a mathematical specification requires a detailed analysis of the requirements

C. Concurrent systems can be analysed to discover race conditions that might lead to deadlock

D. All of the mentioned

2537. Which of the following is incorrect with respect to Model Checking ?
comments icon0

A. Model checking is particularly valuable for verifying concurrent systems

B. The model checker explores all possible paths through the model

C. All of the mentioned

D. Model checking is computationally very inexpensive
2538. What are security controls ?
comments icon0
A. All of the mentioned

B. Controls that are intended to detect and repel attacks

C. Controls that are intended to support recovery from problems

D. Controls that are intended to ensure that attacks are unsuccessful

2539. Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
comments icon0
A. Loss of service

B. None of the mentioned

C. System/data corruption

D. Incorrect service delivery

2540. Which of the following is not a Protection system ?
comments icon0

A. None of the mentioned

B. System to shut down a reactor if temperature/pressure are too high

C. System to indicate not returning of the library book

D. System to stop a train if it passes a red light

2547. Which of the following term is best define by the statement:Each object is stored only once, but is accessible by all CASE tools that need it.?
comments icon0

A. Data independence

B. Ad Hoc data queries and reports

C. Non-redundant data storage

D. Transaction control

2548. Source code translation is a part of which re-engineering technique ?
comments icon0

A. Refactoring

B. None of the mentioned

C. Restructuring

D. Data re-engineering

2549. Which of these benefits can be achieved when software is restructured ?
comments icon0

A. Software easier to test

B. All of the mentioned

C. Reduced maintenance effort

D. Higher quality programs

2550. Which tools are used to modify online database systems ?
comments icon0

A. Reverse engineering specification tools

B. online system re-engineering tools

C. Test management tools

D. Code restructuring and analysis tools