A system resource that has a value and has to be protected is known as ________________________?
		A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Explanation: The answer is self explanatory.
		A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Explanation: The answer is self explanatory.
		A. Concurrent systems can be analysed to discover race conditions that might lead to deadlock
B. Producing a mathematical specification requires a detailed analysis of the requirements
C. They require the use of specialised notations that cannot be understood by domain experts
D. All of the mentioned
		A. Check that the input does not exceed some maximum size e.g. 40 characters for a name
B. Check that the input falls within a known range
C. Use information about the input to check if it is reasonable rather than an extreme value
D. None of the mentioned
		A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned
Explanation: All the options are good practices to achieve Dependability Engineering.
		A. Risk
B. Hazard probability
C. Accident
D. Damage
Explanation: The risk is assessed by considering the hazard probability, the hazard severity, and the probability that the hazard will lead to an accident.
		A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned
Explanation: This risk assessment takes place during the system development life cycle after design choices have been made..
		A. Diverse
B. Documentable
C. Auditable
D. None of the mentioned
Explanation: It means that process standards are being followed and make suggestions for process improvement.