Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. True
B. False
Explanation: It is a security attack.
An impersonation of an authorised user is an example of a security threat ? Read More »
Dependability and Security A. Attack
B. Threat
C. Vulnerability
D. Control
Explanation: The answer is self explanatory.
Circumstances that have potential to cause loss or harm is known as___________________? Read More »
Dependability and Security A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Explanation: The answer is self explanatory.
A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
What is Life cycle risk assessment ? Read More »
Dependability and Security A. True
B. False
Explanation: Security engineering is concerned with maintenance as well as development of such systems.
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery
Explanation: In Fault avoidance the system is developed in such a way that human error is avoided and thus system faults are minimised.
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned
Explanation: All the options define a security control property.
What are security controls ? Read More »
Dependability and Security A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned
Which of the following is a layer of protection for Security ? Read More »
Dependability and Security A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned
Explanation: All the options are good practices to achieve Dependability Engineering.
Which of the following is a bad practice of Dependable programming ? Read More »
Dependability and Security