Circumstances that have potential to cause loss or harm is known as ? A. Attack B. Threat C. Vulnerability D. Control View Answer B. Threat You Might Also Like A weakness in a computer-based system that may be exploited to cause loss or harm is known as ? December 7, 2021 An erroneous system state that can lead to system behavior that is unexpected by system users is known as ? December 7, 2021 Which of the following is incorrect with respect to Model Checking ? December 6, 2021 POFOD stands for ? December 6, 2021 How many stages are there in Risk-driven requirements specification ? December 6, 2021 A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________ with respect to security systems ? December 7, 2021 At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ? December 6, 2021 Choose the fault class in which the following automated static analysis check would fall: Pointer Arithmetic ? December 6, 2021 What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ? December 6, 2021 A system resource that has a value and has to be protected is known as ? December 6, 2021 Which level of Static Analysis allows specific rules that apply to a program to be checked ? December 6, 2021 What are security controls ? December 6, 2021 An assessment of the worst possible damage that could result from a particular hazard is known as ? December 7, 2021 Static analysis is now routinely used in the development of many safety and security critical systems ? December 6, 2021 The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ? December 7, 2021 What is a Range check ? December 6, 2021 To specify security requirements, one should identify the risks that are to be dealt with ? December 6, 2021 An impersonation of an authorised user is an example of a security threat ? December 6, 2021 A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ? December 7, 2021 Which of the following is a technique covered in Static Analysis ? December 6, 2021 Controls that are intended to ensure that attacks are unsuccessful is analogous to _________ in dependability engineering ? December 6, 2021 Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ? December 7, 2021 Which of the following is a layer of protection for Security ? December 6, 2021 What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ? December 6, 2021 A characteristic of a software system that can lead to a system error is known as ? December 7, 2021 Which of the following examples does not involve dependability engineering ? December 7, 2021 Static Analysis involves executing a program ? December 6, 2021 Which reliability requirements are concerned with maintaining copies of the system ? December 6, 2021 What is Life cycle risk assessment ? December 6, 2021 An event that occurs at some point in time when the system does not deliver a service as expected by its users is called ? December 6, 2021
A weakness in a computer-based system that may be exploited to cause loss or harm is known as ? December 7, 2021
An erroneous system state that can lead to system behavior that is unexpected by system users is known as ? December 7, 2021
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________ with respect to security systems ? December 7, 2021
At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ? December 6, 2021
Choose the fault class in which the following automated static analysis check would fall: Pointer Arithmetic ? December 6, 2021
What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ? December 6, 2021
Which level of Static Analysis allows specific rules that apply to a program to be checked ? December 6, 2021
An assessment of the worst possible damage that could result from a particular hazard is known as ? December 7, 2021
Static analysis is now routinely used in the development of many safety and security critical systems ? December 6, 2021
The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ? December 7, 2021
To specify security requirements, one should identify the risks that are to be dealt with ? December 6, 2021
A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ? December 7, 2021
Controls that are intended to ensure that attacks are unsuccessful is analogous to _________ in dependability engineering ? December 6, 2021
Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ? December 7, 2021
What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ? December 6, 2021
Which reliability requirements are concerned with maintaining copies of the system ? December 6, 2021
An event that occurs at some point in time when the system does not deliver a service as expected by its users is called ? December 6, 2021