401. A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal

Explanation:
The system is designed so that hazards are detected and removed before they result in an accident.

402. The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment ?
A. True
B. False

Explanation:
None.

403. An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure

404. An assessment of the worst possible damage that could result from a particular hazard is known as _________________?
A. Risk
B. Hazard probability
C. Hazard severity
D. Mishap

405. A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
A. risk
B. control
C. attack
D. asset

Explanation:
A control protective measure that reduces a system’s vulnerability.

406. A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
A. Vulnerability
B. Attack
C. Threat
D. Exposure

407. Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned

Explanation:
One may separate this into loss of critical services and loss of non-critical services, where the consequences of a failure in non-critical services are less than the consequences of critical service failure.

408. An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?
A. Human error or mistake
B. System fault
C. System error
D. System failure

409. How many stages are there in Risk-driven requirements specification ?
A. three
B. four
C. five
D. six

Explanation:
These include Risk identification, Risk analysis, Risk reduction and Risk decomposition

410. POFOD stands for___________________?
A. Possibility of failure of data
B. Probability of failure of data
C. Possibility of failure on demand
D. Probability of failure on demand

NOTE
IF YOU THINK ANY OF THE MCQ ABOVE IS WRONG.
PLEASE COMMENT WITH CORRECT ANSWER AND ITS DETAIL EXPLANATION IN COMMENT BOX.
THANK YOU