A. True
B. False
Explanation: Static analysis techniques are system verification techniques that don’t involve executing a program.
Correct Answer: False ✔
Click for More Details
Option A: Formal verification
Option B: Model checking
Option C: Automated program analysis
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: Model checking is particularly valuable for verifying concurrent systems
Option B: Model checking is computationally very inexpensive
Option C: The model checker explores all possible paths through the model
Option D: All of the mentioned
Correct Answer: Model checking is computationally very inexpensive ✔
Click for More Details
Option A: Asset
Option B: Threat
Option C: Vulnerability
Option D: Control
Correct Answer: Asset ✔
Click for More Details
Option A: Concurrent systems can be analysed to discover race conditions that might lead to deadlock
Option B: Producing a mathematical specification requires a detailed analysis of the requirements
Option C: They require the use of specialised notations that cannot be understood by domain experts
Option D: All of the mentioned
Correct Answer: They require the use of specialised notations that cannot be understood by domain experts ✔
Click for More Details
Option A: Control Faults
Option B: Data Faults
Option C: Input/Output Faults
Option D: Interface faults
Correct Answer: Data Faults ✔
Click for More Details
Option A: Storage management faults
Option B: Data Faults
Option C: Input/Output Faults
Option D: Interface faults
Correct Answer: Interface faults ✔
Click for More Details
Option A: Characteristic error checking
Option B: User-defined error checking
Option C: Assertion checking
Option D: All of the mentioned
Correct Answer: User-defined error checking ✔
Click for More Details
Option A: Control Faults
Option B: Data Faults
Option C: Input/Output Faults
Option D: Interface faults
Correct Answer: Control Faults ✔
Click for More Details
A. True
B. False
Explanation: The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs
Correct Answer: True ✔
Click for More Details
Option A: Storage management faults
Option B: Data Faults
Option C: Input/Output Faults
Option D: Interface faults
Correct Answer: Storage management faults ✔
Click for More Details
Option A: Attack
Option B: Threat
Option C: Vulnerability
Option D: Control
Correct Answer: Threat ✔
Click for More Details
Option A: Asset
Option B: Control
Option C: Vulnerability
Option D: None of the mentioned
Correct Answer: Asset ✔
Click for More Details
Option A: Risk assessment before the system has been deployed
Option B: Risk assessment while the system is being developed
Option C: All of the mentioned
Option D: None of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
A. True
B. False
Explanation: Security engineering is concerned with maintenance as well as development of such systems.
Correct Answer: False ✔
Click for More Details
Option A: Fault avoidance
Option B: Fault tolerance
Option C: Fault detection
Option D: Fault Recovery
Correct Answer: Fault avoidance ✔
Click for More Details
Option A: Controls that are intended to ensure that attacks are unsuccessful
Option B: Controls that are intended to detect and repel attacks
Option C: Controls that are intended to support recovery from problems
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: Platform-level protection
Option B: Application-level protection
Option C: Record-level protection
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: Limit the visibility of information in a program
Option B: Check array bounds
Option C: Check all inputs for validity
Option D: None of the mentioned
Correct Answer: Check array bounds ✔
Click for More Details
Option A: System to stop a train if it passes a red light
Option B: System to indicate not returning of the library book
Option C: System to shut down a reactor if temperature/pressure are too high
Option D: None of the mentioned
Correct Answer: System to indicate not returning of the library book ✔
Click for More Details
A. True
B. False
Explanation: Exception handling is a mechanism to provide some fault tolerance.
Correct Answer: False ✔
Click for More Details
Option A: Check that the input does not exceed some maximum size e.g. 40 characters for a name
Option B: Check that the input falls within a known range
Option C: Use information about the input to check if it is reasonable rather than an extreme value
Option D: None of the mentioned
Correct Answer: Check that the input falls within a known range ✔
Click for More Details
A. True
B. False
Explanation: The answer is self explanatory.
Correct Answer: True ✔
Click for More Details
Option A: Fault Avoidance
Option B: Fault detection
Option C: Fault tolerance
Option D: None of the mentioned
Correct Answer: Fault tolerance ✔
Click for More Details
Option A: Fault Avoidance
Option B: Fault detection
Option C: Fault tolerance
Option D: None of the mentioned
Correct Answer: Fault Avoidance ✔
Click for More Details
Option A: Different programming languages
Option B: Different design methods and tools
Option C: Explicit specification of different algorithms
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: Diverse
Option B: Documentable
Option C: Auditable
Option D: None of the mentioned
Correct Answer: Auditable ✔
Click for More Details
Option A: Medical Systems
Option B: Power Systems
Option C: Library Management
Option D: Telecommunications
Correct Answer: Library Management ✔
Click for More Details
Option A: Loss of service
Option B: Incorrect service delivery
Option C: System/data corruption
Option D: None of the mentioned
Correct Answer: System/data corruption ✔
Click for More Details
Option A: Preliminary risk analysis
Option B: Life-cycle risk analysis
Option C: Operational risk analysis
Option D: All of the mentioned
Correct Answer: Life-cycle risk analysis ✔
Click for More Details
Option A: POFOD
Option B: ROCOF
Option C: AVAIL
Option D: None of the mentioned
Correct Answer: ROCOF ✔
Click for More Details
A. True
B. False
Explanation: To specify security requirements, one should identify the assets that are to be dealt with.
Correct Answer: False ✔
Click for More Details
Option A: Checking requirements
Option B: Recovery requirements
Option C: Redundancy requirements
Option D: Ambiguous requirements
Correct Answer: Recovery requirements ✔
Click for More Details
Option A: Checking requirements
Option B: Recovery requirements
Option C: Redundancy requirements
Option D: Ambiguous requirements
Correct Answer: Ambiguous requirements ✔
Click for More Details
Option A: Possibility of failure of data
Option B: Probability of failure of data
Option C: Possibility of failure on demand
Option D: Probability of failure on demand
Correct Answer: Probability of failure on demand ✔
Click for More Details
Option A: three
Option B: four
Option C: five
Option D: six
Correct Answer: four ✔
Click for More Details
Option A: Human error or mistake
Option B: System fault
Option C: System error
Option D: System failure
Correct Answer: System failure ✔
Click for More Details
Option A: Loss of service
Option B: Incorrect service delivery
Option C: System/data corruption
Option D: None of the mentioned
Correct Answer: Loss of service ✔
Click for More Details
Option A: Vulnerability
Option B: Attack
Option C: Threat
Option D: Exposure
Correct Answer: Vulnerability ✔
Click for More Details
Option A: risk
Option B: control
Option C: attack
Option D: asset
Correct Answer: control ✔
Click for More Details
Option A: Risk
Option B: Hazard probability
Option C: Hazard severity
Option D: Mishap
Correct Answer: Hazard severity ✔
Click for More Details
Option A: Human error or mistake
Option B: System fault
Option C: System error
Option D: System failure
Correct Answer: System error ✔
Click for More Details
Option A: Hazard avoidance
Option B: Damage limitation
Option C: Hazard detection
Option D: Hazard detection and removal
Correct Answer: Hazard detection ✔
Click for More Details
Option A: Hazard avoidance
Option B: Damage limitation
Option C: Hazard detection
Option D: Hazard detection and removal
Correct Answer: Damage limitation ✔
Click for More Details
Option A: Human error or mistake
Option B: System fault
Option C: System error
Option D: System failure
Correct Answer: System fault ✔
Click for More Details
Option A: Risk
Option B: Hazard probability
Option C: Accident
Option D: Damage
Correct Answer: Risk ✔
Click for More Details