A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
A. True
B. False
Explanation: It is a security attack.
A. Attack
B. Threat
C. Vulnerability
D. Control
Explanation: The answer is self explanatory.
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Explanation: The answer is self explanatory.
A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
A. True
B. False
Explanation: Security engineering is concerned with maintenance as well as development of such systems.
A. Fault avoidance
B. Fault tolerance
C. Fault detection
D. Fault Recovery
Explanation: In Fault avoidance the system is developed in such a way that human error is avoided and thus system faults are minimised.
A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned
Explanation: All the options define a security control property.
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned
A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned
Explanation: All the options are good practices to achieve Dependability Engineering.