Software Requirements and Security Quiz

FastPacedLobster avatar
FastPacedLobster
·
·
Download

Start Quiz

Study Flashcards

42 Questions

What is the phase change that Nitinol undergoes to change its shape?

Solid to solid

What is the purpose of business analysts in software development?

To gather requirements from end-users and interpret them into meaningful documentation

True or false: Business Analysts are responsible for interpreting software requirements into meaningful documentation.

True

What are requirements in software applications?

A representation of a need in software applications.

What is the difference between functional and non-functional requirements in software development?

Functional requirements describe what a product should do and how it should behave, while non-functional requirements describe additional properties of the system, such as quality attributes.

True or false: Implementing strong security measures does not require additional resources and processing time.

False

Who gathers requirements from end-users and interprets them into meaningful documentation?

Business analysts

What is UML, and how is it used in software development?

UML is a pictorial language used to create software blueprints. It provides 13 diagrams to capture the behavior of the system.

What are the two types of software requirements?

Functional requirements and non-functional requirements

What is a misuse case, and how is it different from a use case?

A misuse case is a function that the system should not allow, while a use case describes the intended behavior of the system. Misuse cases identify potential system vulnerabilities.

What do software requirements include?

Both functional and non-functional requirements

True or false: Security requirements only include functionality.

False

What is the difference between functional and non-functional requirements?

Functional requirements describe how a product must behave, while non-functional requirements specify additional properties of the system to be built.

What is the association in a misuse case, and what are the two types of associations?

Association in a misuse case includes "threatens" and "mitigates." "Threatens" describes a goal that is a threat to the system, while "mitigates" describes a function that reduces the risk of a threat.

What is UML?

A pictorial language used to make software blueprints

What might implementing strong security measures require?

Additional resources and processing time

True or false: Non-functional requirements are also known as quality attributes.

True

What are the two aspects of security requirements?

Functionality and security

Can you provide an example of a misuse case and its associated goal?

A misuse case example involves a hostile agent as the misuse case, and a loss of assets as the goal.

True or false: UML provides 10 diagrams to capture the behavior of the system.

False

How many diagrams does UML provide to capture the behavior of the system?

13

What do functional requirements describe?

The behavior of the system

What do misuse cases help to identify?

Potential system vulnerabilities

True or false: Misuse cases help to identify potential system vulnerabilities.

True

True or false: A scenario is a sequence of actions leading to a goal desired by an individual or organization.

True

What is a negative scenario?

A scenario whose goal is desired not to occur by the organization

What do non-functional requirements specify?

The quality attributes of the system

What is UML?

A pictorial language used to make software blueprints

True or false: A negative scenario is a scenario whose goal is desired by an organization.

False

What is a misuse case?

A completed sequence of actions that result in loss for the organization or some specific stakeholder

How many diagrams does UML provide to capture the behavior of the system?

13

True or false: Association in a misuse case includes "include" and "extends."

False

What are the two associations in use case?

Includes and extends

What is a goal in a misuse case?

A threat to the system

True or false: A goal is a function that the system should not allow in a misuse case.

False

What do misuse cases help to identify?

Potential system vulnerabilities

True or false: An ATM use case diagram involves the customer and bank actor, as well as cash robbery and fake card misuse cases.

True

What is a negative scenario?

A scenario whose goal is desired not to occur by the organization or desired by a hostile agent

What is included in an ATM misuse case diagram?

Cash robbery, fake card, smart card authentication, PIN authentication, capturing card, side channel attacks, checked blocked cards

What is a misuse case example?

A completed sequence of actions that result in loss for the organization or some specific stakeholder

True or false: A misuse case example involves a friendly agent and a gain of assets.

False

What is a misuse case?

The function that the system should not allow

Study Notes

  • Requirements are a representation of a need in software applications.
  • Business Analysts gather requirements from end-users and interpret them into meaningful documentation.
  • Software Requirements include functional and non-function requirements.
  • Implementing strong security measures may require additional resources and processing time.
  • Two aspects of security requirements: functionality and security.
  • Functional requirements describe how a product must behave, what its features and functions.
  • Non-functional requirements specify additional properties of the system to be built, other than functionality, also known as quality attributes.
  • UML is a pictorial language used to make software blueprints.
  • UML provides 13 diagrams to capture the behavior of the system.
  • Misuse cases help to identify potential system vulnerabilities.- A scenario is a sequence of actions leading to a goal desired by an individual or organization.
  • A negative scenario is a scenario whose goal is desired not to occur by the organization or desired by a hostile agent.
  • A misuse case is the function that the system should not allow.
  • One could define a misuse case as a completed sequence of actions that result in loss for the organization or some specific stakeholder.
  • Association in use case includes "include" and "extends," while association in a misuse case includes "threatens" and "mitigates."
  • A goal is a threat to the system in a misuse case.
  • An ATM use case diagram involves the customer and bank actor, while the misuse case diagram includes cash robbery, fake card, smart card authentication, PIN authentication, capturing card, side channel attacks, checked blocked cards.
  • A misuse case example involves a hostile agent, which is a misuse case, and a loss of assets, which is the goal.

Test your knowledge on software requirements and security with this quiz! From understanding functional and non-functional requirements, to implementing strong security measures and utilizing UML diagrams, this quiz covers a range of topics related to software development. You'll also explore the concept of misuse cases and how they can help identify potential system vulnerabilities. Whether you're a business analyst or a software developer, this quiz is a great way to brush up on your skills and stay up-to-date on the latest industry trends.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser