Tag: security

Questions Related to security

  1. Integration testing

  2. System testing

  3. Penetration testing

  4. Unit testing


Correct Option: C
  1. Security URS

  2. Security URS and SRS

  3. Security Design Guidelines

  4. All of the above


Correct Option: B
  1. Group based access control should be implemented to assign permissions to application users

  2. Consistent authorization checking should be performed on all application pages

  3. A set of all allowable actions should be defined for each user role and all other's denied

  4. All failed access authorization requests should be logged to a secure location for review by administrators


Correct Option: C
  1. During testing

  2. During development

  3. During all phases of development starting with requirement analysis and ending with rollout

  4. During design


Correct Option: C
  1. Capture the customer requirements

  2. Update the project plan

  3. Capture and update the URS and SRS with security requirements for the project

  4. None of the above


Correct Option: C
  1. Time and Money, Fixed price

  2. Offshore, Onshore, Offshore-Onshore

  3. Full-Fledged, Staggered, Fast Track

  4. None of the above


Correct Option: C
  1. Integration testing

  2. System testing

  3. Penetration testing

  4. Unit testing


Correct Option: C