Explore topic-wise MCQs in Software Engineering.

This section includes 32 Mcqs, each offering curated multiple-choice questions to sharpen your Software Engineering knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following terms is a measure of the probability that the system will cause an accident ?

A. Risk
B. Hazard probability
C. Accident
D. Damage
Answer» B. Hazard probability
2.

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?

A. Diverse
B. Documentable
C. Auditable
D. None of the mentioned
Answer» D. None of the mentioned
3.

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?

A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned
Answer» C. AVAIL
4.

Which reliability requirements are concerned with maintaining copies of the system ?

A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements
Answer» C. Redundancy requirements
5.

Which of the following is not a functional reliability requirement for a system ?

A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements
Answer» E.
6.

Which of the following is incorrect with respect to Model Checking ?

A. Model checking is particularly valuable for verifying concurrent systems
B. Model checking is computationally very inexpensive
C. The model checker explores all possible paths through the model
D. All of the mentioned
Answer» C. The model checker explores all possible paths through the model
7.

What is a Range check ?

A. Check that the input does not exceed some maximum size e.g. 40 characters for a name
B. Check that the input falls within a known range
C. Use information about the input to check if it is reasonable rather than an extreme value
D. None of the mentioned
Answer» C. Use information about the input to check if it is reasonable rather than an extreme value
8.

To specify security requirements, one should identify the risks that are to be dealt with ?

A. True
B. False
Answer» C.
9.

The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ?

A. True
B. False
Answer» B. False
10.

The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ?

A. True
B. False
Answer» B. False
11.

POFOD stands for___________________?

A. Possibility of failure of data
B. Probability of failure of data
C. Possibility of failure on demand
D. Probability of failure on demand
Answer» E.
12.

How many stages are there in Risk-driven requirements specification ?

A. three
B. four
C. five
D. six
Answer» C. five
13.

Exception handling is a mechanism to provide some fault avoidance ?

A. True
B. False
Answer» C.
14.

Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?

A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery
Answer» B. Fault tolerance
15.

Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?

A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned
Answer» B. Incorrect service delivery
16.

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?

A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned
Answer» D. None of the mentioned
17.

Circumstances that have potential to cause loss or harm is known as___________________?

A. Attack
B. Threat
C. Vulnerability
D. Control
Answer» C. Vulnerability
18.

Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?

A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» C. Input/Output Faults
19.

Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?

A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» E.
20.

Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?

A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» B. Data Faults
21.

Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?

A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» B. Data Faults
22.

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?

A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned
Answer» C. Operational risk analysis
23.

An impersonation of an authorised user is an example of a security threat ?

A. True
B. True
Answer» C.
24.

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?

A. Human error or mistake
B. System fault
C. System error
D. System failure
Answer» E.
25.

An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?

A. Human error or mistake
B. System fault
C. System error
D. System failure
Answer» D. System failure
26.

An assessment of the worst possible damage that could result from a particular hazard is known as _________________?

A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap
Answer» D. Mishap
27.

An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?

A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal
Answer» C. Hazard detection
28.

A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?

A. Vulnerability
B. Attack
C. Threat
D. Exposure
Answer» B. Attack
29.

A system resource that has a value and has to be protected is known as ________________________?

A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Answer» B. Control
30.

A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?

A. risk
B. control
C. attack
D. asset
Answer» C. attack
31.

A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?

A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal
Answer» E.
32.

A characteristic of a software system that can lead to a system error is known as _____________________ ?

A. Human error or mistake
B. System fault
C. System error
D. System failure
Answer» C. System error