A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
Related Mcqs:
- An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap - How many stages are there in Risk-driven requirements specification ?
A. three
B. four
C. five
D. six - At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?
A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned - An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure - Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?
A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned - What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
A. Fault Avoidance
B. Fault detection
C. Fault tolerance
D. None of the mentioned - The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ?
A. True
B. False - What are security controls ?
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned - Static analysis is now routinely used in the development of many safety and security critical systems?
A. True
B. False - Which of the following is incorrect with respect to Model Checking ?
A. Model checking is particularly valuable for verifying concurrent systems
B. Model checking is computationally very inexpensive
C. The model checker explores all possible paths through the model
D. All of the mentioned