Blog

Keep up to date with the latest news

New Dependability And Security MCQs – Up To Date Software Engineering MCQs

New Dependability And Security MCQs – Up To Date Software Engineering MCQs

This post is comprising of latest ” Dependability And Security MCQs – Latest Competitive Software Engineering MCQs “. Here you’ll get latest Software engineering mcqs for written test, interview with answers. If you want to improve your knowledge regarding Software engineering then read these mcqs of Design of Steel Structures.

Latest Software Engineering MCQs

By practicing these MCQs of Dependability And Security MCQs – Latest Competitive Software Engineering MCQs , an individual for exams performs better than before. This post comprising of mechanical engineering objective questions and answers related to Dependability And Security Mcqs “. As wise people believe “Perfect Practice make a Man Perfect”. It is therefore practice these mcqs of Software engineering to approach the success. Tab this page to check “Dependability And Security” for the preparation of competitive mcqs, FPSC mcqs, PPSC mcqs, SPSC mcqs, KPPSC mcqs, AJKPSC mcqs, BPSC mcqs, NTS mcqs, PTS mcqs, OTS mcqs, Atomic Energy mcqs, Pak Army mcqs, Pak Navy mcqs, CTS mcqs, ETEA mcqs and others.

Latest Dependability And Security Mcqs

The most occurred mcqs of Dependability And Security in past papers. Past papers of Dependability And Security Mcqs. Past papers of Dependability And Security Mcqs . Mcqs are the necessary part of any competitive / job related exams. The Mcqs having specific numbers in any written test. It is therefore everyone have to learn / remember the related Dependability And Security Mcqs. The Important series of Dependability And Security Mcqs are given below:

Static Analysis involves executing a program ?

A. True
B. False

Which of the following is a technique covered in Static Analysis ?

A. Model checking
B. Formal verification
C. Automated program analysis
D. All of the mentioned

Which of the following is incorrect with respect to Model Checking ?

A. The model checker explores all possible paths through the model
B. Model checking is computationally very inexpensive
C. Model checking is particularly valuable for verifying concurrent systems
D. All of the mentioned

The records of each patient that is receiving or has received treatment resembles which security concept ?

A. Asset
B. Vulnerability
C. Threat
D. Control

Select the disadvantage of using Formal methods ___________________?

A. Producing a mathematical specification requires a detailed analysis of the requirements
B. Concurrent systems can be analysed to discover race conditions that might lead to deadlock
C. They require the use of specialised notations that cannot be understood by domain experts
D. All of the mentioned

Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?

A. Input/Output Faults
B. Data Faults
C. Control Faults
D. Interface faults

Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?

A. Data Faults
B. Storage management faults
C. Input/Output Faults
D. Interface faults

Which level of Static Analysis allows specific rules that apply to a program to be checked ?

A. Assertion checking
B. User-defined error checking
C. Characteristic error checking
D. All of the mentioned

Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?

A. Control Faults
B. Input/Output Faults
C. Data Faults
D. Interface faults

Static analysis is now routinely used in the development of many safety and security critical systems?

A. True
B. False

Software Evolution Mcqs

Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?

A. Storage management faults
B. Input/Output Faults
C. Data Faults
D. Interface faults

An impersonation of an authorised user is an example of a security threat ?

A. True
B. False

Circumstances that have potential to cause loss or harm is known as___________________?

A. Vulnerability
B. Threat
C. Attack
D. Control

A system resource that has a value and has to be protected is known as ________________________?

A. Asset
B. Vulnerability
C. Control
D. None of the mentioned

What is Life cycle risk assessment ?

A. Risk assessment while the system is being developed
B. Risk assessment before the system has been deployed
C. All of the mentioned
D. None of the mentioned

Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ?

A. True
B. False

Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?

A. Fault avoidance
B. Fault detection
C. Fault tolerance
D. Fault Recovery

What are security controls ?

A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to support recovery from problems
C. Controls that are intended to detect and repel attacks
D. All of the mentioned

Which of the following is a layer of protection for Security ?

A. Application-level protection
B. Platform-level protection
C. Record-level protection
D. All of the mentioned

Which of the following is a bad practice of Dependable programming ?

A. Check all inputs for validity
B. Check array bounds
C. Limit the visibility of information in a program
D. None of the mentioned

Which of the following is not a Protection system ?

A. System to shut down a reactor if temperature/pressure are too high
B. System to indicate not returning of the library book
C. System to stop a train if it passes a red light
D. None of the mentioned

Exception handling is a mechanism to provide some fault avoidance ?

A. True
B. False

What is a Range check ?

A. Use information about the input to check if it is reasonable rather than an extreme value
B. Check that the input falls within a known range
C. Check that the input does not exceed some maximum size e.g. 40 characters for a name
D. None of the mentioned

Software Metrics Mcqs

The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ?

A. True
B. False

What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?

A. Fault detection
B. Fault Avoidance
C. Fault tolerance
D. None of the mentioned

What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?

A. Fault Avoidance
B. Fault tolerance
C. Fault detection
D. None of the mentioned

Which of the following is a Strategy to achieve Software diversity ?

A. Different design methods and tools
B. Different programming languages
C. Explicit specification of different algorithms
D. All of the mentioned

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?

A. Documentable
B. Diverse
C. Auditable
D. None of the mentioned

Which of the following examples does not involve dependability engineering ?

A. Power Systems
B. Medical Systems
C. Library Management
D. Telecommunications

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?

A. Incorrect service delivery
B. Loss of service
C. System/data corruption
D. None of the mentioned

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?

A. Operational risk analysis
B. Life-cycle risk analysis
C. Preliminary risk analysis
D. All of the mentioned

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?

A. AVAIL
B. ROCOF
C. POFOD
D. None of the mentioned

To specify security requirements, one should identify the risks that are to be dealt with ?

A. True
B. False

Which reliability requirements are concerned with maintaining copies of the system ?

A. Redundancy requirements
B. Recovery requirements
C. Checking requirements
D. Ambiguous requirements

Which of the following is not a functional reliability requirement for a system ?

A. Recovery requirements
B. Checking requirements
C. Redundancy requirements
D. Ambiguous requirements

POFOD stands for___________________?

A. Probability of failure of data
B. Possibility of failure of data
C. Possibility of failure on demand
D. Probability of failure on demand

How many stages are there in Risk-driven requirements specification ?

A. five
B. four
C. three
D. six

Software Design Mcqs

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?

A. Human error or mistake
B. System error
C. System fault
D. System failure

Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?

A. Loss of service
B. System/data corruption
C. Incorrect service delivery
D. None of the mentioned

A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?

A. Vulnerability
B. Threat
C. Attack
D. Exposure

A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?

A. attack
B. control
C. risk
D. asset

An assessment of the worst possible damage that could result from a particular hazard is known as _________________?

A. Hazard probability
B. Risk
C. Hazard severity
D. Mishap

An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?

A. Human error or mistake
B. System failure
C. System error
D. System fault

The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ?

A. True
B. False

A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?

A. Damage limitation
B. Hazard avoidance
C. Hazard detection
D. Hazard detection and removal

An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states ?

A. Hazard detection
B. Damage limitation
C. Hazard avoidance
D. Hazard detection and removal

A characteristic of a software system that can lead to a system error is known as _____________________ ?

A. System error
B. System fault
C. Human error or mistake
D. System failure

Which of the following terms is a measure of the probability that the system will cause an accident ?

A. Risk
B. Accident
C. Hazard probability
D. Damage

New Dependability And Security MCQs – Up To Date Software Engineering MCQs