71. Regarding incident handling, which of the following deceptive measures is used during incidents to represent a honeypot?
a. False data flows
b. False status measures
c. False state indicators
d. False production systems
72. For large software development projects, which of the following models provides greater satisfactory results on software reliability?
a. Fault count model
b. Mean-time-between-failures model
c. Simple ratio model
d. Simple regression model
73. The objective “To provide management with appropriate visibility into the process being used by the software development project and of the products being built” is addressed by which of the following?
a. Software quality assurance management
b. Software configuration management
c. Software requirements management
d. Software project management
The objectives of software configuration management are to establish and maintain the integrity of products of the software project throughout the project’s software life cycle. The objectives of software requirements management are to establish a common understanding between the customer and the software project requirements that will be addressed by the software project. The objectives of software project management are to establish reasonable plans for performing the software engineering activities and for managing the software development project.
74. Which of the following identifies required functionality to protect against or mitigate failure of the application software?
a. Software safety analysis
b. Software hazard analysis
c. Software fault tree analysis
d. Software sneak circuit analysis
Software hazard analysis is incorrect because it is a part of software safety. Hazard analysis is the process of identifying and evaluating the hazards of a system, and then making change recommendations that either eliminate the hazard or reduce its risk to an acceptable level. Software hazard analysis makes recommendations to eliminate or control software hazards and hazards related to interfaces between the software and the system (includes hardware and human components). It includes analyzing the requirements, design, code, user interfaces, and changes. Software hazards may occur if the software is improperly developed (designed), the software dispatches incorrect information, or the software fails to transmit information when it should.