250+ TOP MCQs on Dependability and Security and Answers

Software Engineering Multiple Choice Questions on “Dependability and Security”.

1. A characteristic of a software system that can lead to a system error is known as?
a) Human error or mistake
b) System fault
c) System error
d) System failure

Answer: b

2. An erroneous system state that can lead to system behavior that is unexpected by system users is known as?
a) Human error or mistake
b) System fault
c) System error
d) System failure

Answer: c

3. An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____________
a) Human error or mistake
b) System fault
c) System error
d) System failure

Answer: d

4. A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states?
a) Hazard avoidance
b) Damage limitation
c) Hazard detection
d) Hazard detection and removal

Answer: d
Clarification: The system is designed so that hazards are detected and removed before they result in an accident.

5. An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states?
a) Hazard avoidance
b) Damage limitation
c) Hazard detection
d) Hazard detection and removal

Answer: b
Clarification: The system may include protection features that minimize the damage that may result from an accident.

6. An assessment of the worst possible damage that could result from a particular hazard is known as
a) Risk
b) Hazard probability
c) Hazard severity
d) Mishap

Answer: c
Clarification: Hazard severity can range from catastrophic, where many people are killed, to minor, where only minor damage results. When an individual death is a possibility, a reasonable assessment of hazard severity is ‘very high’.

7. which of the following terms is a measure of the probability that the system will cause an accident?
a) Risk
b) Hazard probability
c) Accident
d) Damage

Answer: a
Clarification: The risk is assessed by considering the hazard probability, the hazard severity, and the probability that the hazard will lead to an accident.

8. A weakness in a computer-based system that may be exploited to cause loss or harm is known as?
a) Vulnerability
b) Attack
c) Threat
d) Exposure

Answer: a
Clarification: None.

9. A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems.
a) risk
b) control
c) attack
b) asset

Answer: b
Clarification: A control protective measure that reduces a system’s vulnerability.

10. The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment.
a) True
b) False

Answer: a

Leave a Reply

Your email address will not be published. Required fields are marked *