Question: In the context of software engineering, the term “refactoring” refers to:

Answer Options:

Adding new features to the software.
Fixing bugs in the software.
Improving the internal structure of the software without changing its external behavior.
Rewriting the software from scratch.

Answer: Improving the internal structure of the software without changing its external behavior.

 

Question: Which of the following is a key principle of agile methodologies?

Answer Options:

Comprehensive documentation
Following a strict plan
Customer collaboration
Process optimization

Answer: Customer collaboration

 

Question: After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of testing?

Answer Options:

Integration testing
Static testing
System testing
Black-box testing

Answer: Integration testing

 

Question: What type of programming is commonly found in airplane and spacecraft control systems?

Answer Options:

Triple version programming
Object programming
Root programming
Structured programming

Answer: Triple version programming

 

Question: What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?

Answer Options:

User acceptance testing
Static testing
Integration testing
Black-box testing

Answer: Black-box testing

 

Question: Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.

Answer Options:

True
False

Answer: False

 

Question: After an organization decides to adopt which of the following, it must conduct an assessment of its software development practices to determine where they fit in the capability model?

Answer Options:

software quality management
CMMI-DEV
QA
software development methodology

Answer: CMMI-DEV

 

Question: In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?

Answer Options:

initial
defined
quantitatively managed
managed

Answer: initial

 

Question: In the context of developing safety-critical systems, the safety engineer’s role is limited to producing a hazard log.

Answer Options:

True
False

Answer: False

 

Question: Which of the following is true of strategies for engineering quality software?

Answer Options:

The first release of any software rarely meets all its users’ expectations.
High-quality software systems are tough to learn and use because they perform slowly.
Developers develop high-quality software instantaneously without a set of principles.
Software defects never lead to injury.

Answer: The first release of any software rarely meets all its users’ expectations.

 

Question: Which of the following is true of the International Organization for Standardization?

Answer Options:

It issued the 9000 series of business standards in 1987.
It is an American organization founded in 2001.
The ISO 9000:2007 provides a set of standardized requirements for a quality management system.
It is a worldwide federation of national standards bodies from 161 countries.

Answer: It is a worldwide federation of national standards bodies from 161 countries.

 

Question: Products, such as statements of requirements, flowcharts, and user documentation, are known as which of the following?

Answer Options:

intermediate systems
deliverables
outputs
artifacts

Answer: artifacts

 

Question: When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization’s standard development methodology.

Answer Options:

True
False

Answer: False

 

Question: Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?

Answer Options:

rootkit
zero-day attack
DDoS attack
logic bomb

Answer: zero-day attack

 

Question: Computer forensics is such a new field that there is little training or certification processes available to practitioners.

Answer Options:

True
False

Answer: False

 

Question: Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved?

Answer Options:

separation of duties
reasonable assurance
risk assessment
competitive intelligence

Answer: reasonable assurance

 

Question: Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.

Answer Options:

True
False

Answer: True

 

Question: What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?

Answer Options:

Macro viruses
Zombies
Logic bombs
Trojan horses

Answer: Macro viruses