Principles of Secure coding:- 1. Principle of least Privilege: - Give the least
of privileges to the users. Necessary permissions should be given depending on
the nature of the role................
Read answer
STRIDE model is used to categorize security threats. Each letter in the STRIDE
model has a meaning. S- Spoofing Identity: - Most common form of threat.
Impersonating someone by trying to use the user name and
password...................
Read answer
Code access security prevents systems from the code being accessed from unknown
origins. It helps prevent trusted code from intentionally or accidentally
compromising security..................
Read answer
Role based security allows access to be given to the system based on Roles.
Usually, users with a small role have fewer privileges...............
Read answer
Also read
Once the test is executed, a report of the results is displayed by
WinRunner.......
Add-Ins can be used to load add-in specific functions in memory. WinRunner
throws an error during execution......
Explain how to perform load-testing.
What is Table-Driven testing?
Testing
Estimation Interview
What is TPA Analysis?
Explain function points.
Explain the concept of Application Boundary
What
is Fish Bone Diagram? Or Explain Ishikawa Diagram.
Answer - Fish Bone Diagram is also called Ishikawa Diagram
or Cause and Effect Diagram.......
What
is Black box testing? What is White box testing?
Answer - White box testing is done to test the accuracy of
logic and code of the program. It is done by programmers......
|