A. True
B. False
Explanation: Static analysis techniques are system verification techniques that don’t involve executing a program.
A. True
B. False
Explanation: Static analysis techniques are system verification techniques that don’t involve executing a program.
A. Formal verification
B. Model checking
C. Automated program analysis
D. All of the mentioned
A. Model checking is particularly valuable for verifying concurrent systems
B. Model checking is computationally very inexpensive
C. The model checker explores all possible paths through the model
D. All of the mentioned
Explanation: Model checking is very expensive.It is only practical to use it in the verification of small to medium sized critical systems.
A. Asset
B. Threat
C. Vulnerability
D. Control
Explanation: Asset is a system resource that has a value and has to be protected.
A. Concurrent systems can be analysed to discover race conditions that might lead to deadlock
B. Producing a mathematical specification requires a detailed analysis of the requirements
C. They require the use of specialised notations that cannot be understood by domain experts
D. All of the mentioned
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. Characteristic error checking
B. User-defined error checking
C. Assertion checking
D. All of the mentioned
Explanation: Users of a programming language define error patterns, thus extending the types of error that can be detected.
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. True
B. False
Explanation: The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs