A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Explanation: The answer is self explanatory.
Related Mcqs:
- A characteristic of a software system that can lead to a system error is known as _____________________ ?
A. Human error or mistake
B. System fault
C. System error
D. System failure - An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure - An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap - A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
A. Vulnerability
B. Attack
C. Threat
D. Exposure - Circumstances that have potential to cause loss or harm is known as___________________?
A. Attack
B. Threat
C. Vulnerability
D. Control - POFOD stands for___________________?
A. Possibility of failure of data
B. Probability of failure of data
C. Possibility of failure on demand
D. Probability of failure on demand - What is a Range check ?
A. Check that the input does not exceed some maximum size e.g. 40 characters for a name
B. Check that the input falls within a known range
C. Use information about the input to check if it is reasonable rather than an extreme value
D. None of the mentioned - Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery - Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults - Which of the following is a technique covered in Static Analysis ?
A. Formal verification
B. Model checking
C. Automated program analysis
D. All of the mentioned