

MCQOPTIONS
Saved Bookmarks
This section includes 32 Mcqs, each offering curated multiple-choice questions to sharpen your Software Engineering knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following terms is a measure of the probability that the system will cause an accident ? |
A. | Risk |
B. | Hazard probability |
C. | Accident |
D. | Damage |
Answer» B. Hazard probability | |
2. |
Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ? |
A. | Diverse |
B. | Documentable |
C. | Auditable |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
3. |
Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ? |
A. | POFOD |
B. | ROCOF |
C. | AVAIL |
D. | None of the mentioned |
Answer» C. AVAIL | |
4. |
Which reliability requirements are concerned with maintaining copies of the system ? |
A. | Checking requirements |
B. | Recovery requirements |
C. | Redundancy requirements |
D. | Ambiguous requirements |
Answer» C. Redundancy requirements | |
5. |
Which of the following is not a functional reliability requirement for a system ? |
A. | Checking requirements |
B. | Recovery requirements |
C. | Redundancy requirements |
D. | Ambiguous requirements |
Answer» E. | |
6. |
Which of the following is incorrect with respect to Model Checking ? |
A. | Model checking is particularly valuable for verifying concurrent systems |
B. | Model checking is computationally very inexpensive |
C. | The model checker explores all possible paths through the model |
D. | All of the mentioned |
Answer» C. The model checker explores all possible paths through the model | |
7. |
What is a Range check ? |
A. | Check that the input does not exceed some maximum size e.g. 40 characters for a name |
B. | Check that the input falls within a known range |
C. | Use information about the input to check if it is reasonable rather than an extreme value |
D. | None of the mentioned |
Answer» C. Use information about the input to check if it is reasonable rather than an extreme value | |
8. |
To specify security requirements, one should identify the risks that are to be dealt with ? |
A. | True |
B. | False |
Answer» C. | |
9. |
The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ? |
A. | True |
B. | False |
Answer» B. False | |
10. |
The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ? |
A. | True |
B. | False |
Answer» B. False | |
11. |
POFOD stands for___________________? |
A. | Possibility of failure of data |
B. | Probability of failure of data |
C. | Possibility of failure on demand |
D. | Probability of failure on demand |
Answer» E. | |
12. |
How many stages are there in Risk-driven requirements specification ? |
A. | three |
B. | four |
C. | five |
D. | six |
Answer» C. five | |
13. |
Exception handling is a mechanism to provide some fault avoidance ? |
A. | True |
B. | False |
Answer» C. | |
14. |
Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering? |
A. | Fault avoidance |
B. | Fault tolerance |
C. | Fault detection |
D. | Fault Recovery |
Answer» B. Fault tolerance | |
15. |
Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ? |
A. | Loss of service |
B. | Incorrect service delivery |
C. | System/data corruption |
D. | None of the mentioned |
Answer» B. Incorrect service delivery | |
16. |
Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ? |
A. | Loss of service |
B. | Incorrect service delivery |
C. | System/data corruption |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
17. |
Circumstances that have potential to cause loss or harm is known as___________________? |
A. | Attack |
B. | Threat |
C. | Vulnerability |
D. | Control |
Answer» C. Vulnerability | |
18. |
Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”? |
A. | Control Faults |
B. | Data Faults |
C. | Input/Output Faults |
D. | Interface faults |
Answer» C. Input/Output Faults | |
19. |
Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”? |
A. | Storage management faults |
B. | Data Faults |
C. | Input/Output Faults |
D. | Interface faults |
Answer» E. | |
20. |
Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”? |
A. | Control Faults |
B. | Data Faults |
C. | Input/Output Faults |
D. | Interface faults |
Answer» B. Data Faults | |
21. |
Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ? |
A. | Storage management faults |
B. | Data Faults |
C. | Input/Output Faults |
D. | Interface faults |
Answer» B. Data Faults | |
22. |
At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ? |
A. | Preliminary risk analysis |
B. | Life-cycle risk analysis |
C. | Operational risk analysis |
D. | All of the mentioned |
Answer» C. Operational risk analysis | |
23. |
An impersonation of an authorised user is an example of a security threat ? |
A. | True |
B. | True |
Answer» C. | |
24. |
An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________? |
A. | Human error or mistake |
B. | System fault |
C. | System error |
D. | System failure |
Answer» E. | |
25. |
An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________? |
A. | Human error or mistake |
B. | System fault |
C. | System error |
D. | System failure |
Answer» D. System failure | |
26. |
An assessment of the worst possible damage that could result from a particular hazard is known as _________________? |
A. | Risk |
B. | Hazard probability |
C. | Hazard severity |
D. | Mishap |
Answer» D. Mishap | |
27. |
An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ? |
A. | Hazard avoidance |
B. | Damage limitation |
C. | Hazard detection |
D. | Hazard detection and removal |
Answer» C. Hazard detection | |
28. |
A weakness in a computer-based system that may be exploited to cause loss or harm is known as ? |
A. | Vulnerability |
B. | Attack |
C. | Threat |
D. | Exposure |
Answer» B. Attack | |
29. |
A system resource that has a value and has to be protected is known as ________________________? |
A. | Asset |
B. | Control |
C. | Vulnerability |
D. | None of the mentioned |
Answer» B. Control | |
30. |
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems? |
A. | risk |
B. | control |
C. | attack |
D. | asset |
Answer» C. attack | |
31. |
A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ? |
A. | Hazard avoidance |
B. | Damage limitation |
C. | Hazard detection |
D. | Hazard detection and removal |
Answer» E. | |
32. |
A characteristic of a software system that can lead to a system error is known as _____________________ ? |
A. | Human error or mistake |
B. | System fault |
C. | System error |
D. | System failure |
Answer» C. System error | |