Question: In the context of software engineering, the term “refactoring” refers to:
Answer Options:
Answer: Improving the internal structure of the software without changing its external behavior.
Question: Which of the following is a key principle of agile methodologies?
Answer Options:
Answer: Customer collaboration
Question: After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?
Answer Options:
Answer: Integration testing
Question: What type of programming is commonly found in airplane and spacecraft control systems?
Answer Options:
Answer: Triple version programming
Question: What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?
Answer Options:
Answer: Black-box testing
Question: Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.
Answer Options:
Answer: False
Question: After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?
Answer Options:
Answer: CMMI-DEV
Question: In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?
Answer Options:
Answer: initial
Question: In the context of developing safety-critical systems, the safety engineer’s role is limited to producing a hazard log.
Answer Options:
Answer: False
Question: Which of the following is true of strategies for engineering quality software?
Answer Options:
Answer: The first release of any software rarely meets all its users’ expectations.
Question: Which of the following is true of the International Organization for Standardization?
Answer Options:
Answer: It is a worldwide federation of national standards bodies from 161 countries.
Question: Products, such as statements of requirements, flowcharts, and user documentation, are known as which of the following?
Answer Options:
Answer: artifacts
Question: When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization’s standard development methodology.
Answer Options:
Answer: False
Question: Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?
Answer Options:
Answer: zero-day attack
Question: Computer forensics is such a new field that there is little training or certification processes available to practitioners.
Answer Options:
Answer: False
Question: Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved?
Answer Options:
Answer: reasonable assurance
Question: Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
Answer Options:
Answer: True
Question: What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?
Answer Options:
Answer: Macro viruses