Which reliability requirements are concerned with maintaining copies of the system ?
(A) Checking requirements
(B) Recovery requirements
(C) Redundancy requirements
(D) Ambiguous requirements
Which of the following is not a functional reliability requirement for a system ?
(A) Checking requirements
(B) Recovery requirements
(C) Redundancy requirements
(D) Ambiguous requirements
Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
(A) Fault avoidance
(B) Fault tolerance
(C) Fault detection
(D) Fault Recovery
What are security controls ?
(A) Controls that are intended to ensure that attacks are unsuccessful
(B) Controls that are intended to detect and repel attacks
(C) Controls that are intended to support recovery from problems
(D) All of the mentioned
Which of the following is a layer of protection for Security ?
(A) Platform-level protection
(B) Application-level protection
(C) Record-level protection
(D) All of the mentioned
Which of the following is a bad practice of Dependable programming ?
(A) Limit the visibility of information in a program
(B) Check array bounds
(C) Check all inputs for validity
(D) None of the mentioned
Which of the following is not a Protection system ?
(A) System to stop a train if it passes a red light
(B) System to indicate not returning of the library book
(C) System to shut down a reactor if temperature/pressure are too high
(D) None of the mentioned
What is a Range check ?
(A) Check that the input does not exceed some maximum size e.g. 40 characters for a name
(B) Check that the input falls within a known range
(C) Use information about the input to check if it is reasonable rather than an extreme value
(D) None of the mentioned
What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
(A) Fault Avoidance
(B) Fault detection
(C) Fault tolerance
(D) None of the mentioned
Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?
(A) Control Faults
(B) Data Faults
(C) Input/Output Faults
(D) Interface faults