Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

Dependability and Security

Which of the following is incorrect with respect to Model Checking ?

Which of the following is incorrect with respect to Model Checking ?

A. Model checking is particularly valuable for verifying concurrent systems
B. Model checking is computationally very inexpensive
C. The model checker explores all possible paths through the model
D. All of the mentioned

Explanation: Model checking is very expensive.It is only practical to use it in the verification of small to medium sized critical systems.

Which of the following is incorrect with respect to Model Checking ? Read More »

Dependability and Security

The records of each patient that is receiving or has received treatment resembles which security concept ?

The records of each patient that is receiving or has received treatment resembles which security concept ?

A. Asset
B. Threat
C. Vulnerability
D. Control

Explanation: Asset is a system resource that has a value and has to be protected.

The records of each patient that is receiving or has received treatment resembles which security concept ? Read More »

Dependability and Security

Select the disadvantage of using Formal methods ___________________?

Select the disadvantage of using Formal methods ___________________?

A. Concurrent systems can be analysed to discover race conditions that might lead to deadlock
B. Producing a mathematical specification requires a detailed analysis of the requirements
C. They require the use of specialised notations that cannot be understood by domain experts
D. All of the mentioned

Select the disadvantage of using Formal methods ___________________? Read More »

Dependability and Security

Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?

Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?

A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults

Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”? Read More »

Dependability and Security

Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?

Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?

A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults

Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”? Read More »

Dependability and Security

Which level of Static Analysis allows specific rules that apply to a program to be checked ?

Which level of Static Analysis allows specific rules that apply to a program to be checked ?

A. Characteristic error checking
B. User-defined error checking
C. Assertion checking
D. All of the mentioned

Explanation: Users of a programming language define error patterns, thus extending the types of error that can be detected.

Which level of Static Analysis allows specific rules that apply to a program to be checked ? Read More »

Dependability and Security

Static analysis is now routinely used in the development of many safety and security critical systems?

Static analysis is now routinely used in the development of many safety and security critical systems?

A. True
B. False

Explanation: The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs

Static analysis is now routinely used in the development of many safety and security critical systems? Read More »

Dependability and Security