A. True
B. False
Dependability and Security
Dependability and Security
A. Formal verification
B. Model checking
C. Automated program analysis
D. All of the mentioned
A. Model checking is particularly valuable for verifying concurrent systems
B. Model checking is computationally very inexpensive
C. The model checker explores all possible paths through the model
D. All of the mentioned
A. Asset
B. Threat
C. Vulnerability
D. Control
A. Concurrent systems can be analysed to discover race conditions that might lead to deadlock
B. Producing a mathematical specification requires a detailed analysis of the requirements
C. They require the use of specialised notations that cannot be understood by domain experts
D. All of the mentioned
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. Characteristic error checking
B. User-defined error checking
C. Assertion checking
D. All of the mentioned
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. True
B. False