A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Dependability and Security
Dependability and Security
A. True
B. False
A. Attack
B. Threat
C. Vulnerability
D. Control
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
A. True
B. False
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned
A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned