An impersonation of an authorised user is an example of a security threat ?
A. True
B. False
Explanation: It is a security attack.
A. True
B. False
Explanation: It is a security attack.
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal
Explanation: The system is designed so that hazards are detected and removed before they result in an accident.
A. Medical Systems
B. Power Systems
C. Library Management
D. Telecommunications
Explanation: Software customers expect all software to be dependable. However, for non-critical applications such as certain management systems, they may be willing to accept some system failures.
A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap
Explanation: Hazard severity can range from catastrophic, where many people are killed, to minor, where only minor damage results. When an individual death is a possibility, a reasonable assessment of hazard severity is ‘very high’.
A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned
A. Human error or mistake
B. System fault
C. System error
D. System failure