Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

Dependability and Security

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?

A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned

Explanation: This risk assessment takes place during the system development life cycle after design choices have been made..

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ? Read More »

Dependability and Security

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?

A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned

Explanation: Rate of occurrence of failures (ROCOF) sets out the probable number of system failures that are likely to be observed relative to the number of system executions.

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ? Read More »

Dependability and Security

Which reliability requirements are concerned with maintaining copies of the system ?

Which reliability requirements are concerned with maintaining copies of the system ?

A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements

Explanation: These requirements are geared to helg the system recover after a failure has occurred.

Which reliability requirements are concerned with maintaining copies of the system ? Read More »

Dependability and Security

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?

A. Human error or mistake
B. System fault
C. System error
D. System failure

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________? Read More »

Dependability and Security

Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?

Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?

A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned

Explanation: One may separate this into loss of critical services and loss of non-critical services, where the consequences of a failure in non-critical services are less than the consequences of critical service failure.

Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ? Read More »

Dependability and Security