MCQOPTIONS
Saved Bookmarks
This section includes 32 Mcqs, each offering curated multiple-choice questions to sharpen your Software Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following terms is a measure of the probability that the system will cause an accident ? |
| A. | Risk |
| B. | Hazard probability |
| C. | Accident |
| D. | Damage |
| Answer» B. Hazard probability | |
| 2. |
Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ? |
| A. | Diverse |
| B. | Documentable |
| C. | Auditable |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 3. |
Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ? |
| A. | POFOD |
| B. | ROCOF |
| C. | AVAIL |
| D. | None of the mentioned |
| Answer» C. AVAIL | |
| 4. |
Which reliability requirements are concerned with maintaining copies of the system ? |
| A. | Checking requirements |
| B. | Recovery requirements |
| C. | Redundancy requirements |
| D. | Ambiguous requirements |
| Answer» C. Redundancy requirements | |
| 5. |
Which of the following is not a functional reliability requirement for a system ? |
| A. | Checking requirements |
| B. | Recovery requirements |
| C. | Redundancy requirements |
| D. | Ambiguous requirements |
| Answer» E. | |
| 6. |
Which of the following is incorrect with respect to Model Checking ? |
| A. | Model checking is particularly valuable for verifying concurrent systems |
| B. | Model checking is computationally very inexpensive |
| C. | The model checker explores all possible paths through the model |
| D. | All of the mentioned |
| Answer» C. The model checker explores all possible paths through the model | |
| 7. |
What is a Range check ? |
| A. | Check that the input does not exceed some maximum size e.g. 40 characters for a name |
| B. | Check that the input falls within a known range |
| C. | Use information about the input to check if it is reasonable rather than an extreme value |
| D. | None of the mentioned |
| Answer» C. Use information about the input to check if it is reasonable rather than an extreme value | |
| 8. |
To specify security requirements, one should identify the risks that are to be dealt with ? |
| A. | True |
| B. | False |
| Answer» C. | |
| 9. |
The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 11. |
POFOD stands for___________________? |
| A. | Possibility of failure of data |
| B. | Probability of failure of data |
| C. | Possibility of failure on demand |
| D. | Probability of failure on demand |
| Answer» E. | |
| 12. |
How many stages are there in Risk-driven requirements specification ? |
| A. | three |
| B. | four |
| C. | five |
| D. | six |
| Answer» C. five | |
| 13. |
Exception handling is a mechanism to provide some fault avoidance ? |
| A. | True |
| B. | False |
| Answer» C. | |
| 14. |
Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering? |
| A. | Fault avoidance |
| B. | Fault tolerance |
| C. | Fault detection |
| D. | Fault Recovery |
| Answer» B. Fault tolerance | |
| 15. |
Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ? |
| A. | Loss of service |
| B. | Incorrect service delivery |
| C. | System/data corruption |
| D. | None of the mentioned |
| Answer» B. Incorrect service delivery | |
| 16. |
Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ? |
| A. | Loss of service |
| B. | Incorrect service delivery |
| C. | System/data corruption |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 17. |
Circumstances that have potential to cause loss or harm is known as___________________? |
| A. | Attack |
| B. | Threat |
| C. | Vulnerability |
| D. | Control |
| Answer» C. Vulnerability | |
| 18. |
Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”? |
| A. | Control Faults |
| B. | Data Faults |
| C. | Input/Output Faults |
| D. | Interface faults |
| Answer» C. Input/Output Faults | |
| 19. |
Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”? |
| A. | Storage management faults |
| B. | Data Faults |
| C. | Input/Output Faults |
| D. | Interface faults |
| Answer» E. | |
| 20. |
Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”? |
| A. | Control Faults |
| B. | Data Faults |
| C. | Input/Output Faults |
| D. | Interface faults |
| Answer» B. Data Faults | |
| 21. |
Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ? |
| A. | Storage management faults |
| B. | Data Faults |
| C. | Input/Output Faults |
| D. | Interface faults |
| Answer» B. Data Faults | |
| 22. |
At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ? |
| A. | Preliminary risk analysis |
| B. | Life-cycle risk analysis |
| C. | Operational risk analysis |
| D. | All of the mentioned |
| Answer» C. Operational risk analysis | |
| 23. |
An impersonation of an authorised user is an example of a security threat ? |
| A. | True |
| B. | True |
| Answer» C. | |
| 24. |
An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________? |
| A. | Human error or mistake |
| B. | System fault |
| C. | System error |
| D. | System failure |
| Answer» E. | |
| 25. |
An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________? |
| A. | Human error or mistake |
| B. | System fault |
| C. | System error |
| D. | System failure |
| Answer» D. System failure | |
| 26. |
An assessment of the worst possible damage that could result from a particular hazard is known as _________________? |
| A. | Risk |
| B. | Hazard probability |
| C. | Hazard severity |
| D. | Mishap |
| Answer» D. Mishap | |
| 27. |
An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ? |
| A. | Hazard avoidance |
| B. | Damage limitation |
| C. | Hazard detection |
| D. | Hazard detection and removal |
| Answer» C. Hazard detection | |
| 28. |
A weakness in a computer-based system that may be exploited to cause loss or harm is known as ? |
| A. | Vulnerability |
| B. | Attack |
| C. | Threat |
| D. | Exposure |
| Answer» B. Attack | |
| 29. |
A system resource that has a value and has to be protected is known as ________________________? |
| A. | Asset |
| B. | Control |
| C. | Vulnerability |
| D. | None of the mentioned |
| Answer» B. Control | |
| 30. |
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems? |
| A. | risk |
| B. | control |
| C. | attack |
| D. | asset |
| Answer» C. attack | |
| 31. |
A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ? |
| A. | Hazard avoidance |
| B. | Damage limitation |
| C. | Hazard detection |
| D. | Hazard detection and removal |
| Answer» E. | |
| 32. |
A characteristic of a software system that can lead to a system error is known as _____________________ ? |
| A. | Human error or mistake |
| B. | System fault |
| C. | System error |
| D. | System failure |
| Answer» C. System error | |