31. What is Life cycle risk assessment ? A. Risk assessment before the system has been deployed B. Risk assessment while the system is being developed C. All of the mentioned D. None of the mentioned ✅ The correct answer is option C.
32. Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ? A. Loss of service B. Incorrect service delivery C. System/data corruption D. None of the mentioned ✅ The correct answer is option C.
33. The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ? A. True B. False Explanation: None. ✅ The correct answer is option A.
34. Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ? A. Storage management faults B. Data Faults C. Input/Output Faults D. Interface faults ✅ The correct answer is option A.
35. The use of a well-defined, repeatable process is essential if faults in a system are to be minimized ? A. True B. False Explanation: The answer is self explanatory. ✅ The correct answer is option A.
36. Static analysis is now routinely used in the development of many safety and security critical systems? A. True B. False Explanation: The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs ✅ The correct answer is option A.
37. What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ? A. Fault Avoidance B. Fault detection C. Fault tolerance D. None of the mentioned ✅ The correct answer is option C.
38. A characteristic of a software system that can lead to a system error is known as _____________________ ? A. Human error or mistake B. System fault C. System error D. System failure ✅ The correct answer is option B.
39. Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ? A. True B. False Explanation: Security engineering is concerned with maintenance as well as development of such systems. ✅ The correct answer is option B.
40. Select the disadvantage of using Formal methods ___________________? A. Concurrent systems can be analysed to discover race conditions that might lead to deadlock B. Producing a mathematical specification requires a detailed analysis of the requirements C. They require the use of specialised notations that cannot be understood by domain experts D. All of the mentioned ✅ The correct answer is option C.