Dependability & Security Mcqs for Software Engineering


Q.  Which of the following is incorrect with respect to Model Checking ?

a. Model checking is particularly valuable for verifying concurrent systems
b. Model checking is computationally very inexpensive
c. The model checker explores all possible paths through the model
d. All of the mentioned


ANSWER: See Answer
 
Model checking is very expensive.It is only practical to use it in the verification of small to medium sized critical systems.
MCQs:  The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Which of the following is a Strategy to achieve Software diversity ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Which of the following examples does not involve dependability engineering ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  To specify security requirements, one should identify the risks that are to be dealt with ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Which reliability requirements are concerned with maintaining copies of the system ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Which of the following is not a functional reliability requirement for a system ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  POFOD stands for___________________?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  How many stages are there in Risk-driven requirements specification ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
Category: Software Engineering Mcqs,   Published by: teswesm
MCQs:  An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
Category: Software Engineering Mcqs,   Published by: teswesm