Podcast
Questions and Answers
Which phase of the bathtub curve is characterized by a constant failure rate?
Which phase of the bathtub curve is characterized by a constant failure rate?
- Normal operating phase (correct)
- Wear-out phase
- Burn-in phase
- Infant mortality phase
What is the primary cause of failures during the wear-out phase?
What is the primary cause of failures during the wear-out phase?
- Aging or wear-out mechanisms (correct)
- Human error
- Poor design or manufacturing defects
- Random failures
Which of the following is not a phase of the bathtub curve?
Which of the following is not a phase of the bathtub curve?
- Wear-out phase
- Burn-in phase (correct)
- Normal operating phase
- Infant mortality phase
What is the primary goal of exception handling?
What is the primary goal of exception handling?
Which software quality model is not mentioned among the options?
Which software quality model is not mentioned among the options?
What is MTTF an abbreviation for?
What is MTTF an abbreviation for?
How many product quality factors are proposed in McCall quality model?
How many product quality factors are proposed in McCall quality model?
What is the 'Useful Life' phase of the 'bathtub curve' characterized by?
What is the 'Useful Life' phase of the 'bathtub curve' characterized by?
What is software reliability defined as?
What is software reliability defined as?
Time Behavior and Resource Behavior fall under which quality attribute of ISO 9126?
Time Behavior and Resource Behavior fall under which quality attribute of ISO 9126?
How are reliability and failure intensity related?
How are reliability and failure intensity related?
What is the main goal of combining historical data and systematic techniques in software project estimation?
What is the main goal of combining historical data and systematic techniques in software project estimation?
Who is responsible for designing security into a system?
Who is responsible for designing security into a system?
What is the main benefit of using diverse technologies in distributed systems?
What is the main benefit of using diverse technologies in distributed systems?
What is social engineering in the context of system security?
What is social engineering in the context of system security?
Why is it difficult to protect against social engineering in large organizations?
Why is it difficult to protect against social engineering in large organizations?
What is infrastructure security engineering responsible for?
What is infrastructure security engineering responsible for?
What is the goal of application security engineering?
What is the goal of application security engineering?
What is the main advantage of distributing assets in a distributed system?
What is the main advantage of distributing assets in a distributed system?
What is the primary focus of configuration management policies and processes?
What is the primary focus of configuration management policies and processes?
What is the purpose of process analysis in process improvement?
What is the purpose of process analysis in process improvement?
What is the relationship between the attribute that can be measured and the external quality attribute?
What is the relationship between the attribute that can be measured and the external quality attribute?
What is the most significant factor that affects the accuracy and efficacy of estimates?
What is the most significant factor that affects the accuracy and efficacy of estimates?
What describes the data and control to be processed?
What describes the data and control to be processed?
What is the approach to requirements gathering that encourages the creation of a joint team of customers and developers?
What is the approach to requirements gathering that encourages the creation of a joint team of customers and developers?
What is the primary objective of configuration management?
What is the primary objective of configuration management?
What is the outcome of process analysis in process improvement?
What is the outcome of process analysis in process improvement?
What is the primary goal of the resistance strategy in enhancing system survivability?
What is the primary goal of the resistance strategy in enhancing system survivability?
Why might you recommend against software reuse in critical applications?
Why might you recommend against software reuse in critical applications?
What is a potential risk of using COTS components?
What is a potential risk of using COTS components?
What is the primary goal of the recognition strategy in enhancing system survivability?
What is the primary goal of the recognition strategy in enhancing system survivability?
In what circumstances might you recommend against software reuse?
In what circumstances might you recommend against software reuse?
What is the primary goal of the recovery strategy in enhancing system survivability?
What is the primary goal of the recovery strategy in enhancing system survivability?
What is a potential risk of using COTS components?
What is a potential risk of using COTS components?
Why might you recommend against software reuse in systems where performance is critical?
Why might you recommend against software reuse in systems where performance is critical?
What is the main reason why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system?
What is the main reason why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system?
Which of the following is a circumstance where software reuse is not recommended?
Which of the following is a circumstance where software reuse is not recommended?
What is a potential additional cost that may arise when deploying software as a service?
What is a potential additional cost that may arise when deploying software as a service?
What is the main distinction between application security engineering and infrastructure security engineering?
What is the main distinction between application security engineering and infrastructure security engineering?
Why might a reliable system be unsafe?
Why might a reliable system be unsafe?
In what type of system would software reuse not be recommended, even if source code is available?
In what type of system would software reuse not be recommended, even if source code is available?
Why might deploying software as a service reduce IT support costs for a company?
Why might deploying software as a service reduce IT support costs for a company?
Flashcards are hidden until you start studying
Study Notes
Bathtub Curve Phases
- The infant mortality phase is characterized by a high initial failure rate.
- The primary cause of failures during the infant mortality phase is defects in materials or manufacturing.
Constant Failure Rate Phase
- The constant failure rate phase is characterized by a constant failure rate.
Wear-Out Phase
- The primary cause of failures during the wear-out phase is deterioration due to aging.
Non-Phases of the Bathtub Curve
- There is no "random failure phase" in the bathtub curve.
Exception Handling
- Exception handling is a type of forward error recovery mechanism.
Software Quality Models
- ISO 9000 is not a software quality model.
- McCall model and Boehm model are software quality models.
Reliability
- MTTF stands for Mean Time To Failure.
- Reliability is defined as the ability of a system to perform its required functions under stated conditions for a specified period of time.
- Reliability and failure intensity are inversely related.
CMM Model
- CMM (Capability Maturity Model) is a technique to improve the software process.
Security
- Configuration management policies and processes define how to record and process proposed system changes.
- An independent relationship must not exist between the attribute that can be measured and the external quality attribute.
- Social engineering is when accredited users of a system are fooled into giving away secret information.
- It is difficult to protect against social engineering in large organizations because of their hierarchical structure and size.
Estimation
- Project size is an important factor that can affect the accuracy and efficacy of estimates.
- Software scope describes the data and control to be processed.
- Facilitated Application Specification Techniques (FAST) is a team-oriented approach to requirements gathering.
Application and Infrastructure Security Engineering
- Application security engineering is the responsibility of system designers who design security into the system.
- Infrastructure security engineering is the responsibility of system managers or administrators who configure the existing infrastructure software.
Diversity in Distributed Systems
- Diverse technologies provide protection against common vulnerabilities in different elements of the distributed system.
- Distributing assets so that attacks on one element do not disable the entire system enhances availability.
Survivability Strategies
- Resistance involves built-in mechanisms to resist attacks.
- Recognition involves recognizing that an attack is underway.
- Recovery involves built-in features to support recovery and resume normal system service quickly after a successful attack.
Software Reuse
- Software reuse is not recommended in certain circumstances, including:
- If the business status of the code provider is dubious.
- In critical applications where source code is not available.
- In small systems where the costs of reuse are comparable to the savings.
- In systems where performance is a critical requirement.
COTS Risks
- Risks that can arise when systems are constructed using COTS include:
- Vendor risks (e.g., failure of vendor to provide support).
- Product risks (e.g., incompatibility with other systems).
Reliability and Safety
- A reliable system can still be unsafe, and vice versa.
- It is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.