A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned
Explanation: This risk assessment takes place during the system development life cycle after design choices have been made..
A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned
Explanation: This risk assessment takes place during the system development life cycle after design choices have been made..
A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned
Explanation: Rate of occurrence of failures (ROCOF) sets out the probable number of system failures that are likely to be observed relative to the number of system executions.
A. True
B. False
Explanation: To specify security requirements, one should identify the assets that are to be dealt with.
A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements
Explanation: These requirements are geared to helg the system recover after a failure has occurred.
A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements
Explanation: All the options are correct except option d.
A. Possibility of failure of data
B. Probability of failure of data
C. Possibility of failure on demand
D. Probability of failure on demand
A. three
B. four
C. five
D. six
Explanation: These include Risk identification, Risk analysis, Risk reduction and Risk decomposition
A. Human error or mistake
B. System fault
C. System error
D. System failure
A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned
Explanation: One may separate this into loss of critical services and loss of non-critical services, where the consequences of a failure in non-critical services are less than the consequences of critical service failure.
A. Vulnerability
B. Attack
C. Threat
D. Exposure