A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned
Explanation: Rate of occurrence of failures (ROCOF) sets out the probable number of system failures that are likely to be observed relative to the number of system executions.
Related Mcqs:
- Which of the following is not a functional reliability requirement for a system ?
A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements - Which reliability requirements are concerned with maintaining copies of the system ?
A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements - The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ?
A. True
B. False - Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned - To specify security requirements, one should identify the risks that are to be dealt with ?
A. True
B. False - What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
A. Fault Avoidance
B. Fault detection
C. Fault tolerance
D. None of the mentioned - The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ?
A. True
B. False - What are security controls ?
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned - Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults - The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control