M C Q s D r i v e

Software Engineering Mcqs 840 MCQs [All-Courses]

thumb

Software Engineering MCQs for job test and interview preparation, especially for fresh graduates, students, and candidates appearing in competitive exams. These multiple-choice questions cover a wide range of topics, including the fundamentals of software engineering, its various types, advanced concepts, software design, development processes, testing methods, software evolution, and security aspects.

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?
A Preliminary risk analysis
B Life-cycle risk analysis
C Operational risk analysis
D All of the mentioned
Correct Answer: Life-cycle risk analysis
Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?
A POFOD
B ROCOF
C AVAIL
D None of the mentioned
Correct Answer: ROCOF
To specify security requirements, one should identify the risks that are to be dealt with ?
A True
B False
C
D
Correct Answer: False
Which reliability requirements are concerned with maintaining copies of the system ?
A Checking requirements
B Recovery requirements
C Redundancy requirements
D Ambiguous requirements
Correct Answer: Recovery requirements
Which of the following is not a functional reliability requirement for a system ?
A Checking requirements
B Recovery requirements
C Redundancy requirements
D Ambiguous requirements
Correct Answer: Ambiguous requirements
POFOD stands for___________________?
A Possibility of failure of data
B Probability of failure of data
C Possibility of failure on demand
D Probability of failure on demand
Correct Answer: Probability of failure on demand
How many stages are there in Risk-driven requirements specification ?
A three
B four
C five
D six
Correct Answer: four
An event that occurs at some point in time when the system does not deliver a service as expected by its users is called __________________?
A Human error or mistake
B System fault
C System error
D System failure
Correct Answer: System failure
Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
A Loss of service
B Incorrect service delivery
C System/data corruption
D None of the mentioned
Correct Answer: Loss of service
A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
A Vulnerability
B Attack
C Threat
D Exposure
Correct Answer: Vulnerability