Que- There are ________ overlapping stages in the lifetime of large and complex sociotechnical systems.
a. two
b. three
c. four
d. five
Answer- three
Que- Sociotechnical systems are deterministic.
a. TRUE
b. FALSE
c. Nothing Can be Said
d. None of the mentioned
Answer- FALSE
Que- What are the two ways to view the human error of a sociotechnical system?
a. hardware and software approach
b. management and users approach
c. person and systems approach
d. all of the mentioned
Answer- person and systems approach
Que- Human and organizational factors such as organizational structure and politics have a significant effect on the operation of sociotechnical systems.
a. TRUE
b. FALSE
c. Nothing Can be Said
d. None of the mentioned
Answer- TRUE
Que- A characteristic of a software system that can lead to a system error is known as?
a. Human error or mistake
b. System fault
c. System error
d. System failure
Answer- System fault
Que- An erroneous system state that can lead to system behavior that is unexpected by system users is known as?
a. Human error or mistake
b. System fault
c. System error
d. System failure
Answer- System error
Que- An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____________
a. Human error or mistake
b. System fault
c. System error
d. System failure
Answer- System failure
Que- A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states?
a. Hazard avoidance
b. Damage limitation
c. Hazard detection
d. Hazard detection and removal
Answer- Hazard detection and removal
Que- An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states?
a. Hazard avoidance
b. Damage limitation
c. Hazard detection
d. Hazard detection and removal
Answer- Damage limitation
Que- An assessment of the worst possible damage that could result from a particular hazard is known as
a. Risk
b. Hazard probability
c. Hazard severity
d. Mishap
Answer- Hazard severity
Que- which of the following terms is a measure of the probability that the system will cause an accident?
a. Risk
b. Hazard probability
c. Accident
d. Damage
Answer- Risk
Que- A weakness in a computer-based system that may be exploited to cause loss or harm is known as?
a. Vulnerability
b. Attack
c. Threat
d. Exposure
Answer- Vulnerability
Que- A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems.
a. risk
b. control
c. attack
d. asset
Answer- control
Que- The safety of a system is a system attribute that reflects the system's ability to operate, normally or abnormally, without injury to people or damage to the environment.
a. TRUE
b. FALSE
c. Nothing Can be Said
d. None of the mentioned
Answer- TRUE
Que- How many stages are there in Risk-driven requirements specification?
a. three
b. four
c. five
d. six
Answer- four
Que- Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here?
a. Loss of service
b. Incorrect service delivery
c. System/data corruption
d. None of the mentioned
Answer- Loss of service
Que- Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here?
a. Loss of service
b. Incorrect service delivery
c. System/data corruption
d. None of the mentioned
Answer- System/data corruption
Que- POFOD stands for
a. Possibility of failure of data
b. Probability of failure of data
c. Possibility of failure on demand
d. Probability of failure on demand
Answer- Probability of failure on demand
Que- Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period?
a. POFOD
b. ROCOF
c. AVAIL
d. None of the mentioned
Answer- ROCOF
Que- Which of the following is not a functional reliability requirement for a system?
a. Checking requirements
b. Recovery requirements
c. Redundancy requirements
d. Ambiguous requirements
Answer- Ambiguous requirements
Que- To specify security requirements, one should identify the risks that are to be dealt with.
a. TRUE
b. FALSE
c. Nothing Can be Said
d. None of the mentioned
Answer- FALSE
Que- The aim of preliminary risk analysis and assessment process is to derive security requirements for the system as a whole.
a. TRUE
b. FALSE
c. Nothing Can be Said
d. None of the mentioned
Answer- TRUE
Que- At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions?
a. Preliminary risk analysis
b. Life-cycle risk analysis
c. Operational risk analysis
d. All of the mentioned
Answer- Life-cycle risk analysis
Que- Which reliability requirements are concerned with maintaining copies of the system?
a. Checking requirements
b. Recovery requirements
c. Redundancy requirements
d. Ambiguous requirements
Answer- Recovery requirements
Que- Which of the following examples does not involve dependability engineering ?
a. Medical Systems
b. Power Systems
c. Library Management
d. Telecommunications
Answer- Library Management
Que- What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
a. Fault Avoidance
b. Fault detection
c. Fault tolerance
d. None of the mentioned
Answer- Fault Avoidance
Que- What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
a. Fault Avoidance
b. Fault detection
c. Fault tolerance
d. None of the mentioned
Answer- Fault tolerance
Que- Which process characteristic with respect to Dependability Engineering is mentioned by the statement: "The process should be understandable by people apart from process participants"?
a. Diverse
b. Documentable
c. Auditable
d. None of the mentioned
Answer- Auditable
Que- Which of the following is not a Protection system ?
a. System to stop a train if it passes a red light
b. System to indicate not returning of the library book
c. System to shut down a reactor if temperature/pressure are too high
d. None of the mentioned
Answer- System to indicate not returning of the library book
Que- The use of a well-defined, repeatable process is essential if faults in a system are to be minimized.
a. TRUE
b. FALSE
c. Nothing Can be Said
d. None of the mentioned
Answer- TRUE
Que- Which of the following is a Strategy to achieve Software diversity ?
a. Different programming languages
b. Different design methods and tools
c. Explicit specification of different algorithms
d. All of the mentioned
Answer- All of the mentioned
Que- Exception handling is a mechanism to provide some fault avoidance.
a. TRUE
b. FALSE
c. Nothing Can be Said
d. None of the mentioned
Answer- FALSE
Que- Which of the following is a bad practice of Dependable programming ?
a. Limit the visibility of information in a program
b. Check array bounds
c. Check all inputs for validity
d. None of the mentioned
Answer- None of the mentioned