Logo

Dependability And Security MCQs

A. True
B. False

Explanation: Static analysis techniques are system verification techniques that don’t involve executing a program.

Correct Answer: False


Click for More Details

Option A: Formal verification

Option B: Model checking

Option C: Automated program analysis

Option D: All of the mentioned

Correct Answer: All of the mentioned


Click for More Details

Option A: Model checking is particularly valuable for verifying concurrent systems

Option B: Model checking is computationally very inexpensive

Option C: The model checker explores all possible paths through the model

Option D: All of the mentioned

Correct Answer: Model checking is computationally very inexpensive


Click for More Details

Option A: Asset

Option B: Threat

Option C: Vulnerability

Option D: Control

Correct Answer: Asset


Click for More Details

Option A: Concurrent systems can be analysed to discover race conditions that might lead to deadlock

Option B: Producing a mathematical specification requires a detailed analysis of the requirements

Option C: They require the use of specialised notations that cannot be understood by domain experts

Option D: All of the mentioned

Correct Answer: They require the use of specialised notations that cannot be understood by domain experts


Click for More Details

Option A: Control Faults

Option B: Data Faults

Option C: Input/Output Faults

Option D: Interface faults

Correct Answer: Data Faults


Click for More Details

Option A: Storage management faults

Option B: Data Faults

Option C: Input/Output Faults

Option D: Interface faults

Correct Answer: Interface faults


Click for More Details

Option A: Characteristic error checking

Option B: User-defined error checking

Option C: Assertion checking

Option D: All of the mentioned

Correct Answer: User-defined error checking


Click for More Details

Option A: Control Faults

Option B: Data Faults

Option C: Input/Output Faults

Option D: Interface faults

Correct Answer: Control Faults


Click for More Details

A. True
B. False

Explanation: The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs

Correct Answer: True


Click for More Details

Option A: Storage management faults

Option B: Data Faults

Option C: Input/Output Faults

Option D: Interface faults

Correct Answer: Storage management faults


Click for More Details

A. True
B. False

Explanation: It is a security attack.

Correct Answer: False


Click for More Details

Option A: Attack

Option B: Threat

Option C: Vulnerability

Option D: Control

Correct Answer: Threat


Click for More Details

Option A: Asset

Option B: Control

Option C: Vulnerability

Option D: None of the mentioned

Correct Answer: Asset


Click for More Details

Option A: Risk assessment before the system has been deployed

Option B: Risk assessment while the system is being developed

Option C: All of the mentioned

Option D: None of the mentioned

Correct Answer: All of the mentioned


Click for More Details

A. True
B. False

Explanation: Security engineering is concerned with maintenance as well as development of such systems.

Correct Answer: False


Click for More Details

Option A: Fault avoidance

Option B: Fault tolerance

Option C: Fault detection

Option D: Fault Recovery

Correct Answer: Fault avoidance


Click for More Details

Option A: Controls that are intended to ensure that attacks are unsuccessful

Option B: Controls that are intended to detect and repel attacks

Option C: Controls that are intended to support recovery from problems

Option D: All of the mentioned

Correct Answer: All of the mentioned


Click for More Details

Option A: Platform-level protection

Option B: Application-level protection

Option C: Record-level protection

Option D: All of the mentioned

Correct Answer: All of the mentioned


Click for More Details

Option A: Limit the visibility of information in a program

Option B: Check array bounds

Option C: Check all inputs for validity

Option D: None of the mentioned

Correct Answer: Check array bounds


Click for More Details

Option A: System to stop a train if it passes a red light

Option B: System to indicate not returning of the library book

Option C: System to shut down a reactor if temperature/pressure are too high

Option D: None of the mentioned

Correct Answer: System to indicate not returning of the library book


Click for More Details

A. True
B. False

Explanation: Exception handling is a mechanism to provide some fault tolerance.

Correct Answer: False


Click for More Details

Option A: Check that the input does not exceed some maximum size e.g. 40 characters for a name

Option B: Check that the input falls within a known range

Option C: Use information about the input to check if it is reasonable rather than an extreme value

Option D: None of the mentioned

Correct Answer: Check that the input falls within a known range


Click for More Details

A. True
B. False

Explanation: The answer is self explanatory.

Correct Answer: True


Click for More Details

Option A: Fault Avoidance

Option B: Fault detection

Option C: Fault tolerance

Option D: None of the mentioned

Correct Answer: Fault tolerance


Click for More Details

Option A: Fault Avoidance

Option B: Fault detection

Option C: Fault tolerance

Option D: None of the mentioned

Correct Answer: Fault Avoidance


Click for More Details

Option A: Different programming languages

Option B: Different design methods and tools

Option C: Explicit specification of different algorithms

Option D: All of the mentioned

Correct Answer: All of the mentioned


Click for More Details

Option A: Diverse

Option B: Documentable

Option C: Auditable

Option D: None of the mentioned

Correct Answer: Auditable


Click for More Details

Option A: Medical Systems

Option B: Power Systems

Option C: Library Management

Option D: Telecommunications

Correct Answer: Library Management


Click for More Details

Option A: Loss of service

Option B: Incorrect service delivery

Option C: System/data corruption

Option D: None of the mentioned

Correct Answer: System/data corruption


Click for More Details

Option A: Preliminary risk analysis

Option B: Life-cycle risk analysis

Option C: Operational risk analysis

Option D: All of the mentioned

Correct Answer: Life-cycle risk analysis


Click for More Details

Option A: POFOD

Option B: ROCOF

Option C: AVAIL

Option D: None of the mentioned

Correct Answer: ROCOF


Click for More Details

A. True
B. False

Explanation: To specify security requirements, one should identify the assets that are to be dealt with.

Correct Answer: False


Click for More Details

Option A: Checking requirements

Option B: Recovery requirements

Option C: Redundancy requirements

Option D: Ambiguous requirements

Correct Answer: Recovery requirements


Click for More Details

Option A: Checking requirements

Option B: Recovery requirements

Option C: Redundancy requirements

Option D: Ambiguous requirements

Correct Answer: Ambiguous requirements


Click for More Details

Option A: Possibility of failure of data

Option B: Probability of failure of data

Option C: Possibility of failure on demand

Option D: Probability of failure on demand

Correct Answer: Probability of failure on demand


Click for More Details

Option A: three

Option B: four

Option C: five

Option D: six

Correct Answer: four


Click for More Details

Option A: Human error or mistake

Option B: System fault

Option C: System error

Option D: System failure

Correct Answer: System failure


Click for More Details

Option A: Loss of service

Option B: Incorrect service delivery

Option C: System/data corruption

Option D: None of the mentioned

Correct Answer: Loss of service


Click for More Details

Option A: Vulnerability

Option B: Attack

Option C: Threat

Option D: Exposure

Correct Answer: Vulnerability


Click for More Details

Option A: risk

Option B: control

Option C: attack

Option D: asset

Correct Answer: control


Click for More Details

Option A: Risk

Option B: Hazard probability

Option C: Hazard severity

Option D: Mishap

Correct Answer: Hazard severity


Click for More Details

Option A: Human error or mistake

Option B: System fault

Option C: System error

Option D: System failure

Correct Answer: System error


Click for More Details

A. True
B. False

Explanation: None.

Correct Answer: True


Click for More Details

Option A: Hazard avoidance

Option B: Damage limitation

Option C: Hazard detection

Option D: Hazard detection and removal

Correct Answer: Hazard detection


Click for More Details

Option A: Hazard avoidance

Option B: Damage limitation

Option C: Hazard detection

Option D: Hazard detection and removal

Correct Answer: Damage limitation


Click for More Details

Option A: Human error or mistake

Option B: System fault

Option C: System error

Option D: System failure

Correct Answer: System fault


Click for More Details

Option A: Risk

Option B: Hazard probability

Option C: Accident

Option D: Damage

Correct Answer: Risk


Click for More Details