InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”.(a) Storage management faults(b) Data Faults(c) Input/Output Faults(d) Interface faultsThis question was addressed to me in my homework.I'm obligated to ask this question of Dependability and Security Assurance topic in division Dependability and Security of Software Engineering |
|
Answer» RIGHT CHOICE is (a) Storage MANAGEMENT faults The explanation: None. |
|
| 2. |
Which level of Static Analysis allows specific rules that apply to a program to be checked ?(a) Characteristic error checking(b) User-defined error checking(c) Assertion checking(d) All of the mentionedThe question was posed to me during an interview for a job.This key question is from Dependability and Security Assurance in division Dependability and Security of Software Engineering |
|
Answer» The correct choice is (b) User-defined ERROR checking |
|
| 3. |
Static analysis is now routinely used in the development of many safety and security critical systems.(a) True(b) FalseThe question was posed to me in a job interview.The doubt is from Dependability and Security Assurance topic in division Dependability and Security of Software Engineering |
|
Answer» Correct choice is (a) True |
|
| 4. |
Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”.(a) Storage management faults(b) Data Faults(c) Input/Output Faults(d) Interface faultsThis question was addressed to me in quiz.I'm obligated to ask this question of Dependability and Security Assurance in division Dependability and Security of Software Engineering |
|
Answer» The CORRECT ANSWER is (d) INTERFACE faults |
|
| 5. |
Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”.(a) Control Faults(b) Data Faults(c) Input/Output Faults(d) Interface faultsI have been asked this question during an online exam.The origin of the question is Dependability and Security Assurance in division Dependability and Security of Software Engineering |
|
Answer» RIGHT CHOICE is (a) Control Faults The BEST I can explain: NONE. |
|
| 6. |
Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”.(a) Control Faults(b) Data Faults(c) Input/Output Faults(d) Interface faultsThe question was posed to me in homework.This key question is from Dependability and Security Assurance in chapter Dependability and Security of Software Engineering |
|
Answer» Right choice is (b) DATA Faults |
|
| 7. |
Select the disadvantage of using Formal methods(a) Concurrent systems can be analysed to discover race conditions that might lead to deadlock(b) Producing a mathematical specification requires a detailed analysis of the requirements(c) They require the use of specialised notations that cannot be understood by domain experts(d) All of the mentionedI got this question in quiz.My doubt stems from Dependability and Security Assurance topic in division Dependability and Security of Software Engineering |
|
Answer» Correct option is (c) They require the USE of specialised notations that cannot be understood by DOMAIN experts |
|
| 8. |
Which of the following is incorrect with respect to Model Checking?(a) Model checking is particularly valuable for verifying concurrent systems(b) Model checking is computationally very inexpensive(c) The model checker explores all possible paths through the model(d) All of the mentionedI have been asked this question by my school principal while I was bunking the class.This is a very interesting question from Dependability and Security Assurance in section Dependability and Security of Software Engineering |
|
Answer» The correct choice is (b) MODEL checking is computationally very inexpensive |
|
| 9. |
Which of the following is a technique covered in Static Analysis ?(a) Formal verification(b) Model checking(c) Automated program analysis(d) All of the mentionedI had been asked this question during an online exam.This question is from Dependability and Security Assurance topic in section Dependability and Security of Software Engineering |
|
Answer» The CORRECT CHOICE is (d) All of the mentioned |
|
| 10. |
Static Analysis involves executing a program.(a) True(b) FalseI have been asked this question by my school principal while I was bunking the class.I'm obligated to ask this question of Dependability and Security Assurance topic in portion Dependability and Security of Software Engineering |
|
Answer» Right CHOICE is (b) False |
|
| 11. |
Circumstances that have potential to cause loss or harm is known as(a) Attack(b) Threat(c) Vulnerability(d) ControlThe question was asked by my school teacher while I was bunking the class.The doubt is from Security Engineering topic in chapter Dependability and Security of Software Engineering |
|
Answer» RIGHT choice is (b) Threat Best EXPLANATION: The ANSWER is SELF EXPLANATORY. |
|
| 12. |
The records of each patient that is receiving or has received treatment resembles which security concept ?(a) Asset(b) Threat(c) Vulnerability(d) ControlThis question was addressed to me by my college professor while I was bunking the class.Question is from Security Engineering topic in portion Dependability and Security of Software Engineering |
|
Answer» RIGHT CHOICE is (a) Asset Easy explanation: Asset is a SYSTEM resource that has a VALUE and has to be PROTECTED. |
|
| 13. |
A system resource that has a value and has to be protected is known as(a) Asset(b) Control(c) Vulnerability(d) None of the mentionedThis question was posed to me in semester exam.Question is taken from Security Engineering topic in portion Dependability and Security of Software Engineering |
|
Answer» RIGHT ANSWER is (a) Asset To ELABORATE: The answer is SELF EXPLANATORY. |
|
| 14. |
An impersonation of an authorised user is an example of a security threat.(a) True(b) FalseThis question was addressed to me in unit test.The origin of the question is Security Engineering topic in section Dependability and Security of Software Engineering |
|
Answer» RIGHT answer is (B) False The BEST explanation: It is a security attack. |
|
| 15. |
What is Life cycle risk assessment ?(a) Risk assessment before the system has been deployed(b) Risk assessment while the system is being developed(c) All of the mentioned(d) None of the mentionedThis question was posed to me in homework.My doubt is from Security Engineering topic in chapter Dependability and Security of Software Engineering |
|
Answer» RIGHT OPTION is (C) All of the mentioned Explanation: NONE. |
|
| 16. |
Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering.(a) Fault avoidance(b) Fault tolerance(c) Fault detection(d) Fault RecoveryThis question was addressed to me in class test.Question is from Security Engineering topic in portion Dependability and Security of Software Engineering |
|
Answer» RIGHT answer is (a) Fault AVOIDANCE To elaborate: In Fault avoidance the system is DEVELOPED in such a way that human ERROR is avoided and thus system FAULTS are minimised. |
|
| 17. |
Controls that are intended to repel attacks is analogous to ____________ in dependability engineering.(a) Fault avoidance(b) Fault tolerance(c) Fault detection(d) None of the mentionedThe question was posed to me at a job interview.The above asked question is from Security Engineering in chapter Dependability and Security of Software Engineering |
|
Answer» Right option is (B) Fault tolerance |
|
| 18. |
What are security controls ?(a) Controls that are intended to ensure that attacks are unsuccessful(b) Controls that are intended to detect and repel attacks(c) Controls that are intended to support recovery from problems(d) All of the mentionedThis question was addressed to me in an online quiz.The doubt is from Security Engineering in chapter Dependability and Security of Software Engineering |
|
Answer» RIGHT choice is (d) All of the mentioned To explain: All the options define a SECURITY control PROPERTY. |
|
| 19. |
Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks.(a) True(b) FalseI had been asked this question in an international level competition.This key question is from Security Engineering topic in section Dependability and Security of Software Engineering |
|
Answer» Correct choice is (B) False |
|
| 20. |
Which of the following is a layer of protection for Security ?(a) Platform-level protection(b) Application-level protection(c) Record-level protection(d) All of the mentionedThis question was posed to me in my homework.I'd like to ask this question from Security Engineering in division Dependability and Security of Software Engineering |
|
Answer» The CORRECT ANSWER is (d) All of the mentioned |
|
| 21. |
Which of the following is a bad practice of Dependable programming ?(a) Limit the visibility of information in a program(b) Check array bounds(c) Check all inputs for validity(d) None of the mentionedThe question was posed to me in exam.The doubt is from Dependability Engineering in chapter Dependability and Security of Software Engineering |
|
Answer» The CORRECT answer is (d) None of the mentioned |
|
| 22. |
Exception handling is a mechanism to provide some fault avoidance.(a) True(b) FalseI got this question by my school teacher while I was bunking the class.I would like to ask this question from Dependability Engineering in chapter Dependability and Security of Software Engineering |
|
Answer» The correct CHOICE is (b) False |
|
| 23. |
What is a Range check?(a) Check that the input does not exceed some maximum size e.g. 40 characters for a name(b) Check that the input falls within a known range(c) Use information about the input to check if it is reasonable rather than an extreme value(d) None of the mentionedThe question was posed to me in a job interview.My question is from Dependability Engineering in portion Dependability and Security of Software Engineering |
|
Answer» Right OPTION is (B) Check that the input falls within a KNOWN range |
|
| 24. |
Which of the following is a Strategy to achieve Software diversity ?(a) Different programming languages(b) Different design methods and tools(c) Explicit specification of different algorithms(d) All of the mentionedThis question was addressed to me in a job interview.My question comes from Dependability Engineering topic in division Dependability and Security of Software Engineering |
|
Answer» CORRECT option is (d) All of the mentioned Best EXPLANATION: Diversity MEANS to provide the same functionality in different ways so that CRITICAL components of a dependable system will not fail in the same way. |
|
| 25. |
The use of a well-defined, repeatable process is essential if faults in a system are to be minimized.(a) True(b) FalseThis question was addressed to me in exam.My question is based upon Dependability Engineering topic in section Dependability and Security of Software Engineering |
|
Answer» The CORRECT ANSWER is (a) True |
|
| 26. |
Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants”?(a) Diverse(b) Documentable(c) Auditable(d) None of the mentionedThe question was posed to me in an interview for internship.This interesting question is from Dependability Engineering topic in division Dependability and Security of Software Engineering |
|
Answer» Right ANSWER is (c) Auditable |
|
| 27. |
Which of the following is not a Protection system ?(a) System to stop a train if it passes a red light(b) System to indicate not returning of the library book(c) System to shut down a reactor if temperature/pressure are too high(d) None of the mentionedI had been asked this question in an international level competition.I'd like to ask this question from Dependability Engineering in section Dependability and Security of Software Engineering |
|
Answer» The CORRECT choice is (b) System to indicate not returning of the LIBRARY book |
|
| 28. |
What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?(a) Fault Avoidance(b) Fault detection(c) Fault tolerance(d) None of the mentionedI got this question in exam.Question is from Dependability Engineering in section Dependability and Security of Software Engineering |
|
Answer» The correct ANSWER is (a) FAULT AVOIDANCE |
|
| 29. |
What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?(a) Fault Avoidance(b) Fault detection(c) Fault tolerance(d) None of the mentionedI had been asked this question in an internship interview.This intriguing question originated from Dependability Engineering topic in section Dependability and Security of Software Engineering |
|
Answer» RIGHT ANSWER is (C) FAULT tolerance Explanation: NONE. |
|
| 30. |
Which of the following examples does not involve dependability engineering ?(a) Medical Systems(b) Power Systems(c) Library Management(d) TelecommunicationsI had been asked this question during an online exam.The above asked question is from Dependability Engineering in division Dependability and Security of Software Engineering |
|
Answer» Right CHOICE is (c) Library Management |
|
| 31. |
To specify security requirements, one should identify the risks that are to be dealt with.(a) True(b) FalseI have been asked this question by my college director while I was bunking the class.My question comes from Dependability and Security Specification topic in section Dependability and Security of Software Engineering |
|
Answer» The correct ANSWER is (B) False |
|
| 32. |
The aim of preliminary risk analysis and assessment process is to derive security requirements for the system as a whole.(a) True(b) FalseThe question was posed to me during an interview for a job.The above asked question is from Dependability and Security Specification topic in chapter Dependability and Security of Software Engineering |
|
Answer» Correct answer is (a) True |
|
| 33. |
Which reliability requirements are concerned with maintaining copies of the system?(a) Checking requirements(b) Recovery requirements(c) Redundancy requirements(d) Ambiguous requirementsI had been asked this question by my college professor while I was bunking the class.The doubt is from Dependability and Security Specification in division Dependability and Security of Software Engineering |
|
Answer» RIGHT choice is (b) Recovery requirements Best explanation: These requirements are GEARED to helping the system RECOVER after a FAILURE has OCCURRED. |
|
| 34. |
At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions?(a) Preliminary risk analysis(b) Life-cycle risk analysis(c) Operational risk analysis(d) All of the mentionedThis question was posed to me in an online interview.This interesting question is from Dependability and Security Specification in division Dependability and Security of Software Engineering |
|
Answer» The correct choice is (b) LIFE-cycle risk analysis |
|
| 35. |
Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period?(a) POFOD(b) ROCOF(c) AVAIL(d) None of the mentionedI got this question in quiz.This question is from Dependability and Security Specification in chapter Dependability and Security of Software Engineering |
|
Answer» The correct OPTION is (b) ROCOF |
|
| 36. |
Which of the following is not a functional reliability requirement for a system?(a) Checking requirements(b) Recovery requirements(c) Redundancy requirements(d) Ambiguous requirementsThe question was posed to me in an interview.The above asked question is from Dependability and Security Specification topic in portion Dependability and Security of Software Engineering |
|
Answer» The correct CHOICE is (d) Ambiguous requirements |
|
| 37. |
POFOD stands for(a) Possibility of failure ofdata(b) Probability of failure of data(c) Possibility of failure on demand(d) Probability of failure on demandThis question was addressed to me during an interview.This intriguing question originated from Dependability and Security Specification in chapter Dependability and Security of Software Engineering |
|
Answer» Correct OPTION is (d) PROBABILITY of FAILURE on demand |
|
| 38. |
Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here?(a) Loss of service(b) Incorrect service delivery(c) System/data corruption(d) None of the mentionedI have been asked this question during an interview.Enquiry is from Dependability and Security Specification topic in section Dependability and Security of Software Engineering |
|
Answer» RIGHT CHOICE is (C) System/data corruption For EXPLANATION: NONE. |
|
| 39. |
Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here?(a) Loss of service(b) Incorrect service delivery(c) System/data corruption(d) None of the mentionedI have been asked this question during an internship interview.I'm obligated to ask this question of Dependability and Security Specification topic in portion Dependability and Security of Software Engineering |
|
Answer» Right choice is (a) LOSS of service |
|
| 40. |
How many stages are there in Risk-driven requirements specification?(a) three(b) four(c) five(d) sixThis question was addressed to me in class test.Query is from Dependability and Security Specification topic in section Dependability and Security of Software Engineering |
|
Answer» Correct choice is (B) four |
|
| 41. |
The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment.(a) True(b) FalseThis question was addressed to me during a job interview.My question is from Dependability and Security in portion Dependability and Security of Software Engineering |
|
Answer» RIGHT ANSWER is (a) True To ELABORATE: NONE. |
|
| 42. |
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems.(a) risk(b) control(c) attack(d) assetThis question was addressed to me at a job interview.Query is from Dependability and Security in section Dependability and Security of Software Engineering |
|
Answer» Right CHOICE is (b) control |
|
| 43. |
A weakness in a computer-based system that may be exploited to cause loss or harm is known as?(a) Vulnerability(b) Attack(c) Threat(d) ExposureThis question was addressed to me in an interview.I would like to ask this question from Dependability and Security in division Dependability and Security of Software Engineering |
|
Answer» The CORRECT CHOICE is (a) Vulnerability |
|
| 44. |
which of the following terms is a measure of the probability that the system will cause an accident?(a) Risk(b) Hazard probability(c) Accident(d) DamageI got this question in quiz.This intriguing question comes from Dependability and Security topic in chapter Dependability and Security of Software Engineering |
|
Answer» Correct answer is (a) RISK |
|
| 45. |
An assessment of the worst possible damage that could result from a particular hazard is known as(a) Risk(b) Hazard probability(c) Hazard severity(d) MishapThe question was asked during an interview.My question is taken from Dependability and Security topic in division Dependability and Security of Software Engineering |
|
Answer» The correct answer is (c) Hazard severity |
|
| 46. |
An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states?(a) Hazard avoidance(b) Damage limitation(c) Hazard detection(d) Hazard detection and removalThe question was asked by my school principal while I was bunking the class.I'm obligated to ask this question of Dependability and Security in portion Dependability and Security of Software Engineering |
|
Answer» Right answer is (b) Damage limitation |
|
| 47. |
A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states?(a) Hazard avoidance(b) Damage limitation(c) Hazard detection(d) Hazard detection and removalThis question was posed to me by my school principal while I was bunking the class.My question is taken from Dependability and Security in portion Dependability and Security of Software Engineering |
|
Answer» The CORRECT choice is (d) Hazard detection and removal |
|
| 48. |
A characteristic of a software system that can lead to a system error is known as?(a) Human error or mistake(b) System fault(c) System error(d) System failureI had been asked this question during a job interview.I need to ask this question from Dependability and Security in portion Dependability and Security of Software Engineering |
|
Answer» CORRECT CHOICE is (b) System fault The best I can EXPLAIN: NONE. |
|
| 49. |
An erroneous system state that can lead to system behavior that is unexpected by system users is known as?(a) Human error or mistake(b) System fault(c) System error(d) System failureThe question was asked in semester exam.I want to ask this question from Dependability and Security topic in chapter Dependability and Security of Software Engineering |
|
Answer» RIGHT choice is (C) SYSTEM error Easiest explanation: NONE. |
|
| 50. |
An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____________(a) Human error or mistake(b) System fault(c) System error(d) System failureThe question was asked in unit test.This interesting question is from Dependability and Security topic in division Dependability and Security of Software Engineering |
|
Answer» CORRECT ANSWER is (d) SYSTEM failure To EXPLAIN: NONE. |
|