A. True
B. False
Explanation: Security engineering is concerned with maintenance as well as development of such systems.
Advertisement
Related Mcqs:
- Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
- A. Fault avoidance B. Fault tolerance C. Fault detection D. Fault Recovery...
- A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
- A. risk B. control C. attack D. asset...
- Static analysis is now routinely used in the development of many safety and security critical systems?
- A. True B. False...
- Which of the following examples does not involve dependability engineering ?
- A. Medical Systems B. Power Systems C. Library Management D. Telecommunications...
- Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?
- A. Diverse B. Documentable C. Auditable D. None of the mentioned...
- Which reliability requirements are concerned with maintaining copies of the system ?
- A. Checking requirements B. Recovery requirements C. Redundancy requirements D. Ambiguous requirements...
- An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?
- A. Hazard avoidance B. Damage limitation C. Hazard detection D. Hazard detection and removal...
- A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?
- A. Hazard avoidance B. Damage limitation C. Hazard detection D. Hazard detection and removal...
- To specify security requirements, one should identify the risks that are to be dealt with ?
- A. True B. False...
- An impersonation of an authorised user is an example of a security threat ?
- A. True B. False...
Advertisement