42 Questions
What is the phase change that Nitinol undergoes to change its shape?
Solid to solid
What is the purpose of business analysts in software development?
To gather requirements from end-users and interpret them into meaningful documentation
True or false: Business Analysts are responsible for interpreting software requirements into meaningful documentation.
True
What are requirements in software applications?
A representation of a need in software applications.
What is the difference between functional and non-functional requirements in software development?
Functional requirements describe what a product should do and how it should behave, while non-functional requirements describe additional properties of the system, such as quality attributes.
True or false: Implementing strong security measures does not require additional resources and processing time.
False
Who gathers requirements from end-users and interprets them into meaningful documentation?
Business analysts
What is UML, and how is it used in software development?
UML is a pictorial language used to create software blueprints. It provides 13 diagrams to capture the behavior of the system.
What are the two types of software requirements?
Functional requirements and non-functional requirements
What is a misuse case, and how is it different from a use case?
A misuse case is a function that the system should not allow, while a use case describes the intended behavior of the system. Misuse cases identify potential system vulnerabilities.
What do software requirements include?
Both functional and non-functional requirements
True or false: Security requirements only include functionality.
False
What is the difference between functional and non-functional requirements?
Functional requirements describe how a product must behave, while non-functional requirements specify additional properties of the system to be built.
What is the association in a misuse case, and what are the two types of associations?
Association in a misuse case includes "threatens" and "mitigates." "Threatens" describes a goal that is a threat to the system, while "mitigates" describes a function that reduces the risk of a threat.
What is UML?
A pictorial language used to make software blueprints
What might implementing strong security measures require?
Additional resources and processing time
True or false: Non-functional requirements are also known as quality attributes.
True
What are the two aspects of security requirements?
Functionality and security
Can you provide an example of a misuse case and its associated goal?
A misuse case example involves a hostile agent as the misuse case, and a loss of assets as the goal.
True or false: UML provides 10 diagrams to capture the behavior of the system.
False
How many diagrams does UML provide to capture the behavior of the system?
13
What do functional requirements describe?
The behavior of the system
What do misuse cases help to identify?
Potential system vulnerabilities
True or false: Misuse cases help to identify potential system vulnerabilities.
True
True or false: A scenario is a sequence of actions leading to a goal desired by an individual or organization.
True
What is a negative scenario?
A scenario whose goal is desired not to occur by the organization
What do non-functional requirements specify?
The quality attributes of the system
What is UML?
A pictorial language used to make software blueprints
True or false: A negative scenario is a scenario whose goal is desired by an organization.
False
What is a misuse case?
A completed sequence of actions that result in loss for the organization or some specific stakeholder
How many diagrams does UML provide to capture the behavior of the system?
13
True or false: Association in a misuse case includes "include" and "extends."
False
What are the two associations in use case?
Includes and extends
What is a goal in a misuse case?
A threat to the system
True or false: A goal is a function that the system should not allow in a misuse case.
False
What do misuse cases help to identify?
Potential system vulnerabilities
True or false: An ATM use case diagram involves the customer and bank actor, as well as cash robbery and fake card misuse cases.
True
What is a negative scenario?
A scenario whose goal is desired not to occur by the organization or desired by a hostile agent
What is included in an ATM misuse case diagram?
Cash robbery, fake card, smart card authentication, PIN authentication, capturing card, side channel attacks, checked blocked cards
What is a misuse case example?
A completed sequence of actions that result in loss for the organization or some specific stakeholder
True or false: A misuse case example involves a friendly agent and a gain of assets.
False
What is a misuse case?
The function that the system should not allow
Study Notes
- Requirements are a representation of a need in software applications.
- Business Analysts gather requirements from end-users and interpret them into meaningful documentation.
- Software Requirements include functional and non-function requirements.
- Implementing strong security measures may require additional resources and processing time.
- Two aspects of security requirements: functionality and security.
- Functional requirements describe how a product must behave, what its features and functions.
- Non-functional requirements specify additional properties of the system to be built, other than functionality, also known as quality attributes.
- UML is a pictorial language used to make software blueprints.
- UML provides 13 diagrams to capture the behavior of the system.
- Misuse cases help to identify potential system vulnerabilities.- A scenario is a sequence of actions leading to a goal desired by an individual or organization.
- A negative scenario is a scenario whose goal is desired not to occur by the organization or desired by a hostile agent.
- A misuse case is the function that the system should not allow.
- One could define a misuse case as a completed sequence of actions that result in loss for the organization or some specific stakeholder.
- Association in use case includes "include" and "extends," while association in a misuse case includes "threatens" and "mitigates."
- A goal is a threat to the system in a misuse case.
- An ATM use case diagram involves the customer and bank actor, while the misuse case diagram includes cash robbery, fake card, smart card authentication, PIN authentication, capturing card, side channel attacks, checked blocked cards.
- A misuse case example involves a hostile agent, which is a misuse case, and a loss of assets, which is the goal.
Test your knowledge on software requirements and security with this quiz! From understanding functional and non-functional requirements, to implementing strong security measures and utilizing UML diagrams, this quiz covers a range of topics related to software development. You'll also explore the concept of misuse cases and how they can help identify potential system vulnerabilities. Whether you're a business analyst or a software developer, this quiz is a great way to brush up on your skills and stay up-to-date on the latest industry trends.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free