A. FALSE
A. Control
C. Threat
D. Vulnerability
A. Data Faults
B. Interface faults
C. Input/Output Faults
B. Redundancy requirements
C. Ambiguous requirements
D. Checking requirements
A. AVAIL
B. None of the mentioned
D. POFOD
A. Characteristic error checking
B. All of the mentioned
D. Assertion checking
A. Human error or mistake
B. System failure
C. System error
A. Hazard detection
B. Hazard detection and removal
D. Hazard avoidance
A. Fault detection
B. Fault Avoidance
D. None of the mentioned
A. System failure
B. Human error or mistake
D. System fault
A. Input/Output Faults
B. Data Faults
D. Storage management faults
A. Hazard probability
B. Accident
D. Damage
A. All of the mentioned
B. Operational risk analysis
D. Preliminary risk analysis
A. Attack
B. Exposure
D. Threat
B. FALSE
A. None of the mentioned
B. Risk assessment while the system is being developed
D. Risk assessment before the system has been deployed
C. Checking requirements
D. Recovery requirements
C. Documentable
D. Diverse
B. six
C. three
D. five
A. Check all inputs for validity
C. Limit the visibility of information in a program
A. TRUE
A. Platform-level protection
B. Record-level protection
D. Application-level protection
B. TRUE
C. Data Faults
A. Vulnerability
D. Control
B. Damage limitation
A. Telecommunications
B. Medical Systems
D. Power Systems
A. Possibility of failure on demand
C. Possibility of failure of data
D. Probability of failure of data
B. Formal verification
C. Model checking
D. Automated program analysis
A. Fault tolerance
D. Fault detection
C. Attack
B. Use information about the input to check if it is reasonable rather than an extreme value
D. Check that the input does not exceed some maximum size e.g. 40 characters for a name
A. Explicit specification of different algorithms
B. Different programming languages
D. Different design methods and tools
C. Fault Recovery
A. asset
C. attack
D. risk
B. Producing a mathematical specification requires a detailed analysis of the requirements
C. Concurrent systems can be analysed to discover race conditions that might lead to deadlock
D. All of the mentioned
A. Model checking is particularly valuable for verifying concurrent systems
B. The model checker explores all possible paths through the model
C. All of the mentioned
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. Controls that are intended to ensure that attacks are unsuccessful
C. System/data corruption
D. Incorrect service delivery
B. System to shut down a reactor if temperature/pressure are too high
D. System to stop a train if it passes a red light
A. Mishap
C. Hazard probability
D. Risk
A. Incorrect service delivery
B. Loss of service
C. None of the mentioned
C. Control Faults
Showing 1 to 48 of 48 mcqs