A. Human error or mistake
B. System fault
C. System error
D. System failure
Related Mcqs:
- Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned - An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure - A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - Which of the following examples does not involve dependability engineering ?
A. Medical Systems
B. Power Systems
C. Library Management
D. Telecommunications - How many stages are there in Risk-driven requirements specification ?
A. three
B. four
C. five
D. six - Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?
A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned - What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
A. Fault Avoidance
B. Fault detection
C. Fault tolerance
D. None of the mentioned - What are security controls ?
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned - An impersonation of an authorised user is an example of a security threat ?
A. True
B. False - The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control