Explore topic-wise MCQs in Software Engineering Mcqs.

This section includes 48 Mcqs, each offering curated multiple-choice questions to sharpen your Software Engineering Mcqs knowledge and support exam preparation. Choose a topic below to get started.

1.

The records of each patient that is receiving or has received treatment resembles which security concept ?

A. Asset
B. Threat
C. Vulnerability
D. Control
Answer» B. Threat
2.

Select the disadvantage of using Formal methods ___________________?

A. Concurrent systems can be analysed to discover race conditions that might lead to deadlock
B. Producing a mathematical specification requires a detailed analysis of the requirements
C. They require the use of specialised notations that cannot be understood by domain experts
D. All of the mentioned
Answer» D. All of the mentioned
3.

Which of the following is a layer of protection for Security ?

A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned
Answer» E.
4.

The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ?

A. True
B. False
Answer» B. False
5.

Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?

A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» E.
6.

Which of the following is not a Protection system ?

A. System to stop a train if it passes a red light
B. System to indicate not returning of the library book
C. System to shut down a reactor if temperature/pressure are too high
D. None of the mentioned
Answer» C. System to shut down a reactor if temperature/pressure are too high
7.

Which of the following is a technique covered in Static Analysis ?

A. Formal verification
B. Model checking
C. Automated program analysis
D. All of the mentioned
Answer» E.
8.

Static Analysis involves executing a program ?

A. True
B. False
Answer» C.
9.

Which of the following is incorrect with respect to Model Checking ?

A. Model checking is particularly valuable for verifying concurrent systems
B. Model checking is computationally very inexpensive
C. The model checker explores all possible paths through the model
D. All of the mentioned
Answer» C. The model checker explores all possible paths through the model
10.

A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?

A. risk
B. control
C. attack
D. asset
Answer» C. attack
11.

The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ?

A. True
B. False
Answer» B. False
12.

An assessment of the worst possible damage that could result from a particular hazard is known as _________________?

A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap
Answer» D. Mishap
13.

Exception handling is a mechanism to provide some fault avoidance ?

A. True
B. False
Answer» C.
14.

What is a Range check ?

A. Check that the input does not exceed some maximum size e.g. 40 characters for a name
B. Check that the input falls within a known range
C. Use information about the input to check if it is reasonable rather than an extreme value
D. None of the mentioned
Answer» C. Use information about the input to check if it is reasonable rather than an extreme value
15.

Which of the following is a Strategy to achieve Software diversity ?

A. Different programming languages
B. Different design methods and tools
C. Explicit specification of different algorithms
D. All of the mentioned
Answer» E.
16.

What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?

A. Fault Avoidance
B. Fault detection
C. Fault tolerance
D. None of the mentioned
Answer» D. None of the mentioned
17.

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?

A. Diverse
B. Documentable
C. Auditable
D. None of the mentioned
Answer» D. None of the mentioned
18.

What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?

A. Fault Avoidance
B. Fault detection
C. Fault tolerance
D. None of the mentioned
Answer» B. Fault detection
19.

Which of the following examples does not involve dependability engineering ?

A. Medical Systems
B. Power Systems
C. Library Management
D. Telecommunications
Answer» D. Telecommunications
20.

Which of the following is not a functional reliability requirement for a system ?

A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements
Answer» E.
21.

An impersonation of an authorised user is an example of a security threat ?

A. True
B. True
Answer» C.
22.

Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?

A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» B. Data Faults
23.

A system resource that has a value and has to be protected is known as ________________________?

A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Answer» B. Control
24.

Circumstances that have potential to cause loss or harm is known as___________________?

A. Attack
B. Threat
C. Vulnerability
D. Control
Answer» C. Vulnerability
25.

Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ?

A. True
B. False
Answer» C.
26.

What is Life cycle risk assessment ?

A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
Answer» D. None of the mentioned
27.

Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?

A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery
Answer» B. Fault tolerance
28.

What are security controls ?

A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned
Answer» E.
29.

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?

A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned
Answer» C. AVAIL
30.

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?

A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned
Answer» C. Operational risk analysis
31.

Which reliability requirements are concerned with maintaining copies of the system ?

A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements
Answer» C. Redundancy requirements
32.

To specify security requirements, one should identify the risks that are to be dealt with ?

A. True
B. False
Answer» C.
33.

POFOD stands for___________________?

A. Possibility of failure of data
B. Probability of failure of data
C. Possibility of failure on demand
D. Probability of failure on demand
Answer» E.
34.

Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?

A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» B. Data Faults
35.

Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?

A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned
Answer» B. Incorrect service delivery
36.

An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?

A. Human error or mistake
B. System fault
C. System error
D. System failure
Answer» D. System failure
37.

How many stages are there in Risk-driven requirements specification ?

A. three
B. four
C. five
D. six
Answer» C. five
38.

Which of the following terms is a measure of the probability that the system will cause an accident ?

A. Risk
B. Hazard probability
C. Accident
D. Damage
Answer» B. Hazard probability
39.

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?

A. Human error or mistake
B. System fault
C. System error
D. System failure
Answer» E.
40.

A characteristic of a software system that can lead to a system error is known as _____________________ ?

A. Human error or mistake
B. System fault
C. System error
D. System failure
Answer» C. System error
41.

An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?

A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal
Answer» C. Hazard detection
42.

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?

A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned
Answer» D. None of the mentioned
43.

A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?

A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal
Answer» E.
44.

A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?

A. Vulnerability
B. Attack
C. Threat
D. Exposure
Answer» B. Attack
45.

Which of the following is a bad practice of Dependable programming ?

A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned
Answer» C. Check all inputs for validity
46.

Static analysis is now routinely used in the development of many safety and security critical systems?

A. True
B. False
Answer» B. False
47.

Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?

A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» C. Input/Output Faults
48.

Which level of Static Analysis allows specific rules that apply to a program to be checked ?

A. Characteristic error checking
B. User-defined error checking
C. Assertion checking
D. All of the mentioned
Answer» C. Assertion checking