Copyright

Software Verification & Validation Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Optimizing code efficiency involves _____.

Question 2 2. Programming Best Practices serve to _____

Question 3 3. Which of the following statements is NOT considered a best practice when programming for reliability?

Question 4 4. Which of the following is NOT a type of information security?

Question 5 5. In regards to information security, which of the following is part of identity and access management?

Page 2

Question 6 6. Why does data need to have a recorded owner?

Question 7 7. Which of the following is NOT considered by network security testing?

Question 8 8. Which of the following network security threats concerns unexplained failures?

Question 9 9. Which of the following is NOT considered a network security threat?

Question 10 10. Reliability is defined as the ability of a product or system to perform its required functions _____.

Page 3

Question 11 11. _____ is the mechanism which can be used to determine the reliability of a system or product.

Question 12 12. Tests which are _____ generally prove the absence of reliability.

Question 13 13. Which of the following does NOT happen during dynamic testing?

Question 14 14. What is a software requirements specification (SRS) document?

Question 15 15. A seamstress is considering purchasing software to manage her customers and sewing orders. Which of the following is a component of validation and verification?

Page 4

Question 16 16. Which of the following is NOT a characteristic of formal methods?

Question 17 17. Having others looks at your code is also known as?

Question 18 18. Which of the following is NOT a way to avoid errors in software?

Question 19 19. As applied to dependable information systems, what best defines CIA?

Question 20 20. Also known as _____, resilience in a system is marked by a system's ability to remain functional when components are impaired.

Page 5

Question 21 21. Which of the following is a consequence of a system that is not dependable?

Question 22 22. You are being told by the vendor that their software as a three-nines reliability (uptime). This means the system will be available _____ of the time (or so they claim).

Question 23 23. You have been told your system is unreliable. In order to support these claims, you ask for measurement. Which metrics should you look at?

Question 24 24. Which of the following could negatively impact reliability?

Question 25 25. Validation checks ensure _____.

Page 6

Question 26 26. Why should security testing be a part of information security requirements?

Question 27 27. Which of the following network security testing considerations deals with wireless access points?

Question 28 28. Reliability engineering is a sub-phase of the _____ phase of the software development life cycle (SDLC).

Question 29 29. What happens during static testing?

Question 30 30. _____ is one reason why the software industry hasn't adopted formal methods.

Software Verification & Validation Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 307: Software Engineering  /  Computer Science Courses
Support