Tag: technology

Questions Related to technology

  1. log should have url accessed by user

  2. Date and time logged in the logs should be in IST format

  3. logs have to be in W3C format

  4. System time is in sync with INDIA domain time and the logs should have uniquely identifiable information about the user


Correct Option: D
Explanation:

To ensure that audit and access logs of the application are valid in the court of law, the following requirements have to be met:

A. The log should have the URL accessed by the user: This is an important requirement as it helps in identifying the exact action taken by the user on the application.

B. Date and time logged in the logs should be in IST format: This requirement ensures that the date and time mentioned in the logs are accurate and can be easily correlated with other events.

C. Logs have to be in W3C format: This is not a mandatory requirement, but logs in W3C format are widely accepted as a standard format for web server logs.

D. System time is in sync with INDIA domain time and the logs should have uniquely identifiable information about the user: This is a crucial requirement as it helps in establishing the authenticity of the logs and the actions taken by the user. Uniquely identifiable information about the user can include the user's IP address, username, or any other information that can uniquely identify the user.

Therefore, options A, B, and D are all mandatory for the audit and access logs of the application to be valid in the court of law.

The Answer is: D

When you are performing EQA of an application developed by another project, you are doing

  1. white box testing

  2. black box testing

  3. security testing

  4. vulnerability testing


Correct Option: A

AI Explanation

To answer this question, you need to understand the concepts of white box testing and black box testing.

White box testing, also known as structural testing or glass box testing, involves testing an application while having complete knowledge of its internal workings. This includes examining the source code, design documents, and implementation details. White box testing aims to test the internal logic of the application, such as control flow, data flow, and error handling.

Black box testing, on the other hand, involves testing an application without having any knowledge of its internal workings. Testers focus on the functional requirements of the application, and the testing is based on inputs and expected outputs. Black box testing aims to test the application from an end-user perspective, without considering the internal implementation.

In the given scenario, when you are performing EQA (External Quality Assurance) of an application developed by another project, you are doing black box testing. This is because you are testing the application without having knowledge of its internal workings, similar to how a typical end-user would interact with the application.

Therefore, the correct answer is B. black box testing.

An application is developed and deployed in production. A bug was found and a CR was raised and modified code is ready for deployment after following SSA and SDLC. This interim release of the application is called

  1. Release of CR

  2. maintenance of application

  3. release of patch

  4. interim release of CR


Correct Option: C

AI Explanation

To answer this question, we need to understand the terms related to software development and deployment.

Option A) Release of CR - This option is incorrect because a CR (Change Request) is a formal request to make a modification or fix in an application. It does not refer to the interim release of the application.

Option B) Maintenance of application - This option is incorrect because while the bug fix is a part of application maintenance, it does not specifically refer to the interim release of the modified code.

Option C) Release of patch - This option is correct because a patch is a small piece of code that is used to fix a specific issue or bug in an application. When the modified code is ready for deployment to fix the bug, it is released as a patch to address the issue.

Option D) Interim release of CR - This option is incorrect because the interim release refers to the temporary release of the modified code before the final release. CR (Change Request) is not specifically mentioned in this context.

The correct answer is C) release of patch. This option is correct because when a bug is found and a CR is raised, the modified code is released as a patch to fix the issue in the application.

The application logs are backed up in a media and retained for years as required by law. One of the media found defective after a long period of time. What do we need to do with the media

  1. Use it for overwriting current logs

  2. Inform stakeholders and degauss the media

  3. Keep it safely and securely in the fire proof safe

  4. format the media


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge of data retention policies and best practices for managing defective media.

Option A: Using the defective media for overwriting current logs is not recommended. The data on the defective media is potentially corrupted or lost, and using it for overwriting current logs can result in further data loss or inconsistency.

Option B: This is the correct answer. Informing stakeholders and degaussing the media is the best approach for managing defective media. Degaussing the media involves exposing it to a magnetic field to erase all data stored on it. This is a secure and effective way to dispose of defective media.

Option C: Keeping the defective media safely and securely in a fireproof safe may seem like a good idea, but it is not an effective way to manage defective media. The data on the defective media is still potentially corrupted or lost, and there is no guarantee that it will remain secure in the safe.

Option D: Formatting the media is not recommended. Formatting may not be effective in erasing all data, and it may also overwrite any remaining data on the media, making it difficult or impossible to recover.

Therefore, the correct answer is:

The Answer is: B. Inform stakeholders and degauss the media.

  1. At the design stage

  2. At the beginning of testing phase

  3. During requirements collection phase

  4. HP Webinspect performs the Threat Modeling, I do not need to do anything


Correct Option: C
  1. MITM proxy can be used to change the URL to a non secured one

  2. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user

  3. Firewall logs will have the credentials in plain text

  4. proxy logs will have the credentials in plain text


Correct Option: B
Explanation:

To develop an application that includes both secured and non-secured web pages, it is important to have the login page SSL (Secure Sockets Layer) enabled in order to protect sensitive user information. The SSL protocol is used to establish a secure and encrypted connection between the user's web browser and the web server.

Now, let's go through each option and explain why it is right or wrong:

A. MITM proxy can be used to change the URL to a non-secured one - This option is a possible security vulnerability. A Man-in-the-Middle (MITM) attack can be used to intercept the user's traffic and redirect them to a non-secured URL. However, enabling SSL on the login page does not directly mitigate this threat.

B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and Attacker can sniff the credentials supplied by the user - This option is correct. If the login page is not SSL enabled, the credentials supplied by the user will be transmitted in plain text, which can be sniffed by attackers. This can lead to sensitive information such as usernames and passwords being compromised.

C. Firewall logs will have the credentials in plain text - This option is incorrect. Enabling SSL on the login page does not directly affect the firewall logs. Firewall logs can capture network traffic, including login credentials, regardless of whether SSL is enabled or not.

D. Proxy logs will have the credentials in plain text - This option is also correct. If SSL is not enabled on the login page, the credentials supplied by the user will be transmitted in plain text, which can be captured by proxies. This can lead to sensitive information such as usernames and passwords being compromised.

Therefore, the correct answer is:

The Answer is: B. If the login page is not SSL enabled, the credentials will be transmitted in plain text to the web server and attacker can sniff the credentials supplied by the user.

  1. During multi-staged login, the application should validate the credentials supplied at each stage only

  2. Hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at server end

  3. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages

  4. Credentials supplied at the prevoius stage should be saved in cookie and current stage supplier credentials to be validated at server end


Correct Option: C
Explanation:

To ensure application security during multi-staged login in an application, the developer should ensure that the credentials supplied at each stage are validated before moving to the next stage.

Option A states that the application should validate the credentials supplied at each stage only. This option is partially correct. Validation of credentials at each stage is necessary, but validating only at each stage is not enough. It is important to validate the credentials of previous stages as well to ensure security.

Option B suggests that hidden variables should be used to remember the previous stage values and current stage supplier credentials to be validated at the server end. Hidden variables can be used to store data, but they do not guarantee security. Attackers can access and modify hidden variables, which can lead to security vulnerabilities.

Option C is the correct answer. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages. This ensures that all supplied credentials are correct and valid before allowing access to the application.

Option D suggests that credentials supplied at the previous stage should be saved in a cookie and current stage supplier credentials to be validated at the server end. Saving credentials in cookies can also lead to security vulnerabilities as attackers can access and modify cookies.

Therefore, the correct answer is:

The Answer is: C. During multi-staged login, the application should validate the credentials supplied at each stage and previous stages.

  1. Static Code Analysis is the analysis of software code by actually executing the binaries resulting from this code

  2. Static Code Analysis is the analysis of software code without actually executing the binaries resulting from this code

  3. Static Code Analysis is the analysis of executables resulting from this code

  4. None of the above


Correct Option: B