A. True
B. False
Explanation: None.
Related Mcqs:
- An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap - Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?
A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned - Static analysis is now routinely used in the development of many safety and security critical systems?
A. True
B. False - An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal - A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
A. risk
B. control
C. attack
D. asset - Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?
A. Diverse
B. Documentable
C. Auditable
D. None of the mentioned - An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure - What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
A. Fault Avoidance
B. Fault detection
C. Fault tolerance
D. None of the mentioned - Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery - Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults