71. Regarding incident handling, which of the following deceptive measures is used during incidents to represent a honeypot?
a.
False data flowsb.
False status measuresc.
False state indicatorsd.
False production systems72. For large software development projects, which of the following models provides greater satisfactory results on software reliability?
a.
Fault count modelb.
Mean-time-between-failures modelc.
Simple ratio modeld.
Simple regression model73. The objective “To provide management with appropriate visibility into the process being used by the software development project and of the products being built” is addressed by which of the following?
a.
Software quality assurance managementb.
Software configuration managementc.
Software requirements managementd.
Software project managementThe objectives of software configuration management are to establish and maintain the integrity of products of the software project throughout the project’s software life cycle. The objectives of software requirements management are to establish a common understanding between the customer and the software project requirements that will be addressed by the software project. The objectives of software project management are to establish reasonable plans for performing the software engineering activities and for managing the software development project.
74. Which of the following identifies required functionality to protect against or mitigate failure of the application software?
a.
Software safety analysisb.
Software hazard analysisc.
Software fault tree analysisd.
Software sneak circuit analysisSoftware hazard analysis is incorrect because it is a part of software safety. Hazard analysis is the process of identifying and evaluating the hazards of a system, and then making change recommendations that either eliminate the hazard or reduce its risk to an acceptable level. Software hazard analysis makes recommendations to eliminate or control software hazards and hazards related to interfaces between the software and the system (includes hardware and human components). It includes analyzing the requirements, design, code, user interfaces, and changes. Software hazards may occur if the software is improperly developed (designed), the software dispatches incorrect information, or the software fails to transmit information when it should.