This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Dependability and Security”.
1. A characteristic of a software system that can lead to a system error is known as?
a) Human error or mistake
b) System fault
c) System error
d) System failure
View Answer
Explanation: None.
2. An erroneous system state that can lead to system behavior that is unexpected by system users is known as?
a) Human error or mistake
b) System fault
c) System error
d) System failure
View Answer
Explanation: None.
3. An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____________
a) Human error or mistake
b) System fault
c) System error
d) System failure
View Answer
Explanation: None.
4. A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states?
a) Hazard avoidance
b) Damage limitation
c) Hazard detection
d) Hazard detection and removal
View Answer
Explanation: The system is designed so that hazards are detected and removed before they result in an accident.
5. An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states?
a) Hazard avoidance
b) Damage limitation
c) Hazard detection
d) Hazard detection and removal
View Answer
Explanation: The system may include protection features that minimize the damage that may result from an accident.
6. An assessment of the worst possible damage that could result from a particular hazard is known as
a) Risk
b) Hazard probability
c) Hazard severity
d) Mishap
View Answer
Explanation: Hazard severity can range from catastrophic, where many people are killed, to minor, where only minor damage results. When an individual death is a possibility, a reasonable assessment of hazard severity is ‘very high’.
7. which of the following terms is a measure of the probability that the system will cause an accident?
a) Risk
b) Hazard probability
c) Accident
d) Damage
View Answer
Explanation: The risk is assessed by considering the hazard probability, the hazard severity, and the probability that the hazard will lead to an accident.
8. A weakness in a computer-based system that may be exploited to cause loss or harm is known as?
a) Vulnerability
b) Attack
c) Threat
d) Exposure
View Answer
Explanation: None.
9. A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems.
a) risk
b) control
c) attack
d) asset
View Answer
Explanation: A control protective measure that reduces a system’s vulnerability.
10. The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment.
a) True
b) False
View Answer
Explanation: None.
Sanfoundry Global Education & Learning Series – Software Engineering.
Here’s the list of Best Books in Software Engineering.
- Check Computer Science Books
- Practice Computer Science MCQs
- Practice Information Technology MCQs
- Apply for Computer Science Internship
- Check Software Engineering Books