click below
click below
Normal Size Small Size show me how
INCOSE
ASEP Preparation
| Question | Answer |
|---|---|
| The processes that invoke the system analysis process to perform interface analysis include: (choose 3) | A. System requirements B. Implementation D. Architecture Definition |
| The data generated during assessment of the creative alternatives step in the Analyze decision information activity is summarized in: | A. objective measure consequence table |
| The Agile SE Framework includes: (choose 2) | A. a predictable process enabling reconfiguration of goals and requirements. B. an agile product architecture that allows changes during development and fabrication |
| ISO 10303-233, that is AP 233, Application Protocol: Systems Engineering is used to exchange data between: (choose 3) | A. XML C. applications in the larger life cycle E. other SE applications |
| A Readiness for Use assessment occurs: (choose 4) | A. during analysis of validation results B. following maintenance actions D. at first article delivery E. completion of production |
| The life cycle of every system includes the following aspects: (choose 3) | A. business B. budget F. technical |
| The process that is executed in parallel with the mode and simulation development that certifies a model or simulation is acceptable for use is: (choose 1) | D. verification, validation, and accreditation (VV&A) |
| Select 3 challenges that influence the engineering of a system of systems: ( choose 3) | B. Constituent systems were often developed for other purposes D. Each constituent system has its own local "owner" E. Determining leadership in the multiple organizational environment is challenging. |
| The "derived measures" are: (choose 2) A. TPM B. MOP C. MOE | A. TPM B. MOP |
| Two characteristics of a reference SE model are: (choose 2) A. adheres to the CMMI B. is tailor-able C. the model includes an SE improvement process D. adopts the language of 1S0/ IEC 15288:2008) | B. is tailor-able C. the model includes an SE improvement process |
| The defining characteristics of a decision gate are: (choose 4) A. it is a review B. it has entry and exit criteria C. it is "pro forma" D. it is included in the project schedule E. it is for the customer F. it is a milestone | A. it is a review B. it has entry and exit criteria D. it is included in the project schedule F. it is a milestone |
| The 4 elements that define the scope of log engineering are: A. design the system for supportability B. provide cost-effective logistics support C. acquire the support D. determine logistics spt requirements E. provide effective system disposal | A. design the system for support-ability B. provide cost-effective logistics support C. acquire the support D. determine logistics support requirements |
| Achieved availability excludes: (choose 2) A. preventive maintenance B. administrative delay time C. logistics delay time | B. administrative delay time C. logistics delay time |
| The resilience of a system is: (choose 2) A. deterministic B. nascent C. emergent D. nondeterministic | C. emergent D. nondeterministic |
| Risk avoidance is insufficient for high-risk technical tasks. Supplmntl approaches to risk treatment are needed. These incl: (4) A. adnl gate reviews B. extnsve analysis and tsting C. initiation of parallel dvlpmnt D. contingency plng E. erly proc't | B. extensive analysis and testing C. initiation of parallel developments D. contingency planning E. early procurement |
| The participating system entities in a Svc or Svc offering dynamically configure 4 types of resources: (4) A. technology/ environment infrastructure B. organizations/ institutions C. people D. shared info/symbolic knowledge E. programs F. projects | A. technology/ environment infrastructure B. organizations/ institutions C. people D. shared information/ symbolic knowledge |
| Methods useful for understanding a complicated system include (choose 3): A. iterative B. linear C. non-linear D. procedural E. holistic F. recursive break down | B. linear D. procedural F. recursive break down |
| Two indicators the qlty policy is not wrking are (choose 2): A. the proj is not compliant to its reqm'ts, but the cust is happy. B. the proj is compliant, but the cust is unhappy. C. the proj is not compliant to its req'ts and the cust is unhappy. D. | A. the project is not compliant to its requirements, but the customer is happy. B. the project is compliant, but the customer is unhappy. |
| The role of the systems engineer in the Agmt Processes includes:(4) A. cndct risk asmnts B. create precise ests of proj impacts for a variety of optns that might be proposed. C. condct trade studies on alts D. assess chng impacts E. sptt the proj mgr | A. conduct risk assessments C. conduct trade studies on alternatives D. assess change impacts E. support the project manager |
| The broadened definition of risk is stated as the "effect of uncertainty on objectives". Objectives can apply at different levels such as: (choose 5) A. product B. process C. organization-wide D. tactical E. market-wide F. strategic G. project | A. product B. process C. organization-wide F. strategic G. project |
| One objective of the Sys engineer is to minimize undesirable emergent properties by: A. reducing the number of sys element interrelationships B. eliminating circular causation C. incl and coord the contributions of a cross disciplinary team of experts | C. including and coordinating the contributions of a cross disciplinary team of experts |
| The desired capabilities of realizing adaptive Sos using the dynamic binding of Network-Centric Systems for service systems are: (chse 2) A. speed of srvc delivery B. real-time behavior emergence C. reliability of srvc delivery D. knowledge emergence | C. reliability of service delivery D. knowledge emergence |
| Project initiation is a formal milestone that should not occur until: A. the project plan has been signed off B. the project plan has been written C. all resources are in place as called for by the project plan | C. all resources are in place as called for by the project plan |
| When measuring affordability, the differentiation between 2 competing systems in terms of their value to system stakeholders will most often be found in which attributes: A. nonfunctional B. architecture C. functional D. design | A. nonfunctional |
| The 8 categories of waste include ( choose 3): A. overprocessing B. inventory depletion C. unnecessary movement D. waiting E. queueing | A. overprocessing C. unnecessary movement D. waiting |
| When joining a project, one of the first jobs of a systems engineer is to: A. establish nomenclature and terminology to support clear, unambiguous communications B. . initiate a function based analysis to establish a foundation for defining a sys archit | A. establish nomenclature and terminology to support clear, unambiguous communication |
| The tailoring process exists at these two levels: (choose two) A. project B. senior management C. organizational D. supervisory | A. project C. organizational |
| KPPs are used to characterize the major drivers of: (choose 3) A. interoperability B. delivery C. maintainability D. operational performance E. support-ability | A. interoperability D. operational performance E. supportability |
| Systems engineers participate heavily in which types of IPDTs: (choose 2) A. PIT B. PDT C. SEIT | A. PIT C. SEIT |
| The collection of elements that do not belong to the system, but do interact with it are called: (choose 2) A. actors B. operating environment C. interfaces d. context | B. operating environment D. context |
| The role of the acquirer requires knowledge of these processes: (choose 3) A. Technical management B. System requirements definition C. Organizational project-enabling D. Technical E. Stakeholder needs and requirements definition | A. Technical management C. Organizational project-enabling D. Technical |
| A valid but unverifiable req't like ''The range shall be as long as possible" is a signal that: A. the req't is singular B. the req't is implementation independent C. a trade study is needed to establish a verifiable maximum range req't D. the req't | C. a trade study is needed to establish a verifiable maximum range requirement. |
| The two integration methods specifically associated with intensive software systems are: (2) A. bottom-up B. top-down C. criterion-driven D. incremental E. with the stream | A. bottom-up B. top-down |
| The multi-year nature of space system development means it must effectively use risk management to deal with: (choose 3) A. programmatic challenges B. inter company agreements C. new technologies D. changing requirements E. funding changes | A. programmatic challenges C. new technologies D. changing requirements |
| Decision trees are well suited as an analysis approach when: (choose 3): A. there are multiple competing objectives that are not easily monetized B. there are few chance nodes C. there are few decision nodes D. end node consequences can be expressed w | B. there are few chance nodes C. there are few decision nodes D. end node consequences can be expressed with a single number |
| Stakeholder concerns related to system architecture usually: A. are related to the critical qlty characteristics of a single life cycle stage B. are related to the critical quality characteristics that span one or more life cycle stages C. are the res | B. are related to the critical quality characteristics that span one or more life cycle stages |
| Modeling languages are intended to be both: (choose 2) A. textual B. analog C. discrete D. human interpretable E. computer interpretable F. symbolic | D. human interpretable E. computer interpretable |
| Three criteria for effective SE management are: (chse 3): A. streamline cntrls B. use a comnd-and-cntrl structure C. simplify paperwork D. build redundancy into the process E. facilitate communication F. utilize effective baseline and confg mgmt | A. streamline controls C. simplify paperwork E. facilitate communication |
| Mass properties include: (choose three) A. weight B. inertia about the center of gravity C. density D. center of gravity location | A. weight B. inertia about the center of gravity D. center of gravity location |
| The agreement is closed through which process: A. project planning B. project assessment and control C. portfolio management D. life cycle model management | C. portfolio management |
| Major challenges in the definition, design, and implementation of services include: (choose 2) A. stakeholder input B. integration of loosely coupled systems C. understanding the information flows D. lack of a formal SE process | B. integration of loosely coupled systems C. understanding the information flows |
| The characteristics of a security architecture suited to counter evolving threats include: (2) A. info hiding security functional sys elmnts B. encapsulated security functional sys elmnts C. cohesive security functional sys elmnnts D. loosely couple | B. encapsulated security functional system elements D. loosely coupled security functional system elements |
| SysML behavior diagrams include: (choose 4) A. Use-case diagrams B. Sequence diagrams C. State Machine diagrams D. Block definition diagram E. Parametric diagrams F. Activity diagrams G. Requirements diagrams | A. Use-case diagrams B. Sequence diagrams C. State Machine diagrams F. Activity diagrams |
| Key attributes of a Decision Management process are: (choose 3) A. analytical B. quantitative C. objective D. structured | A. analytical C. objective D. structured |
| In Systems Engineering the term Cost-Effectiveness Analysis helps to: (2) A. measures the relative effect of component costs on the overall system effectiveness. B. derive design requirements and supports decision-making. C. derive critical system perf | B. derive design requirements and supports decision-making. C. derive critical system performance parameters. |
| The system analysis process is used by the mission and business analysis process to: (2) A. prepare life cycle models B. characterize the solution space C. analyze candidate business models D. analyze candidate OpsCon | C. analyze candidate business models D. analyze candidate OpsCon |
| The two main mitigation strategies that help cope with performance capability gaps that occur as a system ages are:(2) A. perf-based enhancement (PBE) B. perf-based logistics (PBL) C. technology refreshment programs (TRP) D. technolgy enhancement prog | B. performance-based logistics (PBL) C. technology refreshment programs (TRP) |
| The completion of a product development cycle is marked by what audits: (choose 3) A. physical configuration B. functional configuration C. formal D. lnformal E. technical configuration | A. physical configuration C. formal D. informal |
| Graphical depictions of life-cycle stages tend to hide these aspects of the underlying processes: (2) A. iterative B. linear C. incremental D. waterfall | A. iterative C. incremental |
| The term for the fact that Verification applies onto any activity and product resulting from the activity throughout the life cycle is: (choose 1) A. spanning B. orthogonal C. transverse D. transitive | C. transverse |
| Systems thinking occurs through: (choose 2) A. learning B. decomposition C. diagnosis D. simplification | A. learning C. diagnosis |
| The 4 process groups from ISO/ IEC 15288 that support systems engineering include: (choose 2) A. Technical Management Processes B. Model Based Engineering C. Agreement Processes D. Life Cycle Modeling Processes | A. Technical Management Processes C. Agreement Processes |
| Product line management can improve organizational competitiveness by: (3) A. increasing quality B. enlarging the product catalog C. entering markets with larger inherent margins D. driving the adoption of IPDT F. decreasing the development cost | A. increasing quality B. enlarging the product catalog D. driving the adoption of IPDT |
| Obtaining data sufficient to characterize global or detailed behavior of candidate architectures with respect to stakeholder and system requirements requires certain analyses. Those analyses include: (choose 4) A. cost B. efficiency C. maintainabilit | A. cost B. efficiency C. maintainability E. performance |
| The three concepts fundamental to understanding lean thinking are: (choose 3) A. flow B. lean principles C. waste D. perfection E. pull F. value | B. lean principles C. waste F. value |
| The functional safety standard covering the full safety life cycle in the automotive domain is: (choose 1) A. IEC 62196 B. ISO 26262 C. ISO 16949 | B. ISO 26262 |
| Application Protocol (AP) 239, Product Life cycle Support (PLCS) is contained in what ISO document and addresses what topic? (choose 2) A. ISO 10303 B. information requirements for complex systems C. information security D. ISO 17799 | B. information requirements for complex systems |
| The traditional definition of risk includes: (2) A. the potential for the realization of wanted, positive consequences of an event B. generally used only for negative consequences C. combination of the probablity of an event and its consequences D. | B. generally used only for negative consequences C. combination of the probability of an event and its consequences |
| Techniques for requirements elicitation include: (choose 4) A. the Delphi method B. focus groups C. use error analysis D. interviews E. task analysis F. soft systems methodology | A. the Delphi method B. focus groups D. interviews F. soft systems methodology |
| Standardization, measurement, and control are used within sequential methods to: (choose 1) A. drive requirements trace-ability B. increase process capability C. drive the collection of historical data D. drive the completeness of documentation | B. increase process capability |
| The value propositions of organization-wide Life-cycle processes include: (2) A. the ability to xfer effective processes across the organization B. repeatable/predictable performance across projects C. ISO 9001 compliance D. the ability to be audited | A. the ability to transfer effective processes across the organization B. repeatable/predictable performance across projects |
| The first step of the second activity of the concept stage is: A. identify, clarify, and document the stakeholders' conceptual operation of the system B. explore risks and opportunities C. creation of engineering models and prototypes D. integration, | A. identify, clarify, and document the stakeholders' conceptual operation of the system |
| The four risk categories are: (choose 4) A. Cost B. Avoided C. Programmatic D. Mitigated E. Schedule F. Technical | A. Cost C. Programmatic E. Schedule F. Technical |
| IPDTs should not: (choose 1) A. be required to justify their decisions B. be empowered with full life cycle responsibility C. be looking to higher management for key decisions D. be required to justify their actions | C. be looking to higher management for key decisions |
| Maintenance constraints need to be fed back to: (3) A. System analysis prcs B. System req'ts definition prcs C. Stakeholder needs and req'ts definition prcs D. Design def prcs E. Business or mission analysis prcs F. Transition prcs G. Arch def prcs | B. System requirements definition process D. Design definition process G. Architecture definition process |
| The Organization Strategic Plan is an output of: A. Quality Management Process B. Project Portfolio Management Process C. Human Resources Management Process D. Life Cycle Model Management Process | B. Project Portfolio Management Process |
| The tailoring should occur: A. over the system life-cycle B. infrequently to avoid disrupting the flow of work C. when projects are demonstrating poor performance D. at the start of the project | A. over the system life-cycle |
| The "derived measures" are: (choose 2) A. MOP B. TPM C. MOE | A. MOP B. TPM |
| The term for the fact that Verification applies onto any activity and product resulting from the activity throughout the life cycle is: (choose 1) A. transitive B. spanning C. orthogonal D. transverse | D. transverse |
| When measuring affordability, the differentiator between 2 competing systems in terms of their value to system stakeholders will most often be found in which attributes: (choose 1) A. architecture B. design C. nonfunctional D. functional | C. nonfunctional |
| Systems science is both: (choose 2) A. systems approach to science B. isolationist in its search for simplicity C. science of systems D. reductionist | A. systems approach to science C. science of systems |
| Inputs to the Stakeholder Needs and Requirements Definition Process include: (choose 3) A. Stakeholder Needs B. Concept Documents C. Project Constraints D. Source Documents E. Validation Criteria | A. Stakeholder Needs C. Project Constraints D. Source Documents |
| The two benefits of modeling and simulation are:(2) A. provide a means for analyzing complex dynamic behavior of systems B. confirm the need for the sys and the sys behaviors before conducting the actual development C. provide an abstraction of a D. | B. confirm the need for the system and the system behaviors before conducting the actual development D. present a clear, coherent design to maximize productivity |
| Obtaining data sufficient to characterize global or detailed behavior of candidate architectures with respect to stakeholder and system requirements requires certain analyses. Those analyses include (choose 4): A. maintainability B. disposability C. | A. maintainability C. cost F. performance |
| The Incremental Commitment Spiral Model draws on aspects from these life cycle models: (choose 6) A. Rational Unified Process B. agile C. concurrent engineering D. spiral E. lean F. waterfall G. evolutionary H. vee | A. Rational Unified Process B. agile C. concurrent engineering D. spiral E. lean H. vee |
| Inputs to the System Requirements Definition Process include: (choose2) A. Industry Standards B. Concept Documents C. Initial RVTM D. System Requirements Document | B. Concept Documents C. Initial RVTM |
| Agility measures are enabled and constrained principally by: (2) A. the time required by the team to understand a rspnc is required B. the time required by the team to accomplish the response C. the product architecture D. the process architecture | C. the product architecture D. the process architecture |
| One of the keys to interoperability is: A. testing B. compliance with standards C. architecture D. design | B. compliance with standards |
| Choose the true statements about requirements: (4) A. they can be verified B. multiple requirements may be traced to a single need C. they can be validated D. stakeholder need is resolved into a requirement E. they are formal structured statements | A. they can be verified B. multiple requirements may be traced to a single need C. they can be validated E. they are formal structured statements |
| Business aspect issues include: (choose 3) A. product B. affordability C. funding D. market demand E. cost F. realistic schedules | B. affordability D. market demand F. realistic schedules |
| The verification process can be applied to: (2) A. only elements that contribute to the realization of the system B. any element that contributes to the realization of the system C. any element that contributed to the definition of the system D. onl | B. any element that contributes to the realization of the system C. any element that contributed to the definition of the system |
| Even within a single stage in the system life cycle the FBSE process is: (choose 1) A. iterative B. recursive C. incremental | A. iterative |
| The elements of behavior associated with the more typical sort of system include: (4) A. exchange of resources B. self -organization C. exchange of information D. exchange of energy E. viability maintenance F. state change G. dynamically evolving | A. exchange of resources C. exchange of information D. exchange of energy F. state change |
| It Is recommended to start drafting the validation plan: A. during the system requirements definition process B. during the architecture definition process C. as soon as the first OpsCon, scenarios, and stakeholder requirements are known | C. as soon as the first OpsCon, scenarios, and stakeholder requirements are known |
| Choose the correct statement: A. Corrective maintenance tasks are primarily identified using FMECA, while preventive maintenance tasks are identified using RCM. B. Corrective maintenance tasks are primarily identified using RCM, while preventive ma | A. Corrective maintenance tasks are primarily identified using FMECA, while preventive maintenance tasks are identified using RCM. |
| The service value chain is described in terms of: A. links among the system entities connected via the NCS B. a service metamodel of system entities and their attributes C. strategic capabilities that consistently provide superior value D. a request | A. links among the system entities connected via the NCS |
| The three types of IPDT's are: (choose 3) A. Systems Engineering and Integration Team (SEIT) B. Product Integration Team (PIT) C. Product Development Team (PDT) D. Process Development Team (PDT) | A. Systems Engineering and Integration Team (SEIT) B. Product Integration Team (PIT) C. Product Development Team (PDT) |
| Alternatives to the N2 (N-squared) diagram include:(choose 2) A. DSM B. ibd C. SysML D. UML E. CFD | A. DSM B. ibd |
| The goal of systems science is to identify, explore, and understand: A. cross disciplinary fields B. patterns of complexity C. areas of application D. interdisciplinary patterns | B. patterns of complexity |
| Select the characteristics that apply to the Analysis verification technique: (3) A. checks properties best determined by observation B. no intervention on the submitted element C. uses samples to verify characteristics D. uses modeling and/ or simu | B. no intervention on the submitted element D. uses modeling and/ or simulation E. shows theoretical compliance |
| System security scenarios are useful for: (choose 3) A. verification B. support C. validation D. integration E. system requirements definition | A. verification C. validation E. system requirements definition |
| Organizational goal categories are: (choose 3) A. market share B. revenue C. quality D. personnel E. cost F. schedule G. price H. resources I. profit | C. quality E. cost F. schedule |
| Characteristics associated with an IPDT environment include: (choose 3) A. improved recognition of progress B. reduced project rotation C. establishment of mentoring programs D. increased project rotation | A. improved recognition of progress B. reduced project rotation C. establishment of mentoring programs |
| A measure in decision management must have what characteristics: (choose 5) A. comprehensible B. operational C. unambiguous D. maintainable E. direct F. restricted G. specific H. comprehensive I. understandable | B. operational C. unambiguous E. direct H. comprehensive I. understandable |
| Everyone in the organization should know: a. the project management policy B. the knowledge management policy C. the quality policy D. the human resource policy | C. the quality policy |
| A product line approach is recommended when:(2) A. the org has high confidence in the underlying system architecture B. different customers need similar systems with some customization C. return-on-investment (ROI) is not sufficiently high with a si | B. different customers need similar systems with some customization D. different customers need the same systems |
| The Transition Process relies heavily on: (choose 2) A. correct integration B. quality assurance documentation C. skilled operators D. configuration management documentation | B. quality assurance documentation D. configuration management documentation |