A. Check that the input does not exceed some maximum size e.g. 40 characters for a name
B. Check that the input falls within a known range
C. Use information about the input to check if it is reasonable rather than an extreme value
D. None of the mentioned
Related Mcqs:
- Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults - Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults - Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults - Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults - The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ?
A. True
B. False - How many stages are there in Risk-driven requirements specification ?
A. three
B. four
C. five
D. six - Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?
A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned - The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ?
A. True
B. False - Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery - Which of the following is incorrect with respect to Model Checking ?
A. Model checking is particularly valuable for verifying concurrent systems
B. Model checking is computationally very inexpensive
C. The model checker explores all possible paths through the model
D. All of the mentioned