Which of the following is a type of testing ?
Recovery Testing
Security Testing
Stress Testing
All of above

1 Answer

Answer :

All of above

Related questions

Description : Frequencyof failure and network recovery time after a failure are measures of the_______of a network. A) Performance B) Reliability C) Security D) Feasibility

Last Answer : Reliability

Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above

Last Answer : they contain clock recovery circuits

Description : The synchronous modems are more costly than the asynchronous modemsbecause A. they produce largevolumeof data B. they contain clock recovery circuits C. they transmit thedata with stop and start bits. D. they operate witha largerbandwidth E. None of the above

Last Answer : they contain clock recovery circuits

Description : In OSI model, session layer is responsible for a. Recovery b. Check pointing c. Both a and b d. None of the above

Last Answer : c. Both a and b

Description : There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1) Testing 2) Backup and recovery 3) Firewall development 4) Design

Last Answer : 3) Firewall development

Description : There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1 Testing 2 Backup and recovery 3 Firewall development 4 Design

Last Answer : 3 Firewall development

Description : Recovery Testing aims at verifying the system's ability to recover from varying degrees of failure. A. True B. False

Last Answer : A. True

Description : ..... is a black box testing method ? Boundary value analysis Basic path testing Code path analysis None of above

Last Answer : Boundary value analysis

Description : The objective of testing is ? Debugging To uncover errors To gain modularity To analyze system

Last Answer : To uncover errors

Description : Black box testing sometimes called ? Data Flow testing Loop Testing Behavioral Testing Graph Based Testing

Last Answer : Behavioral Testing

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : Black box testing sometimes called ? Data Flow testing Loop Testing Behavioral Testing Graph Based Testing

Last Answer : Behavioral Testing

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service

Last Answer : . Quality of service

Description : The behaviour of a metal specimen, which when plastically strained in tension reduces its yield stress in compression and vice versa; is termed as the (A) Work hardening (B) Bauschinger effect (C) Creeping effect (D) Stress recovery effect

Last Answer : (B) Bauschinger effect

Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)

Last Answer : both (a) and (b)

Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov

Last Answer : site local

Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above

Last Answer : link local

Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above

Last Answer : more

Description : An enterprise solution withdata storage, a client interface and a security system isa(n) __________ system. A) 2-tier B) 3-tier C) 4-tier D) n-tier

Last Answer : 3-tier

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer

Last Answer : d. Transport layer

Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails

Last Answer : A. application layer, e-mails

Description : What is the best home security system based on consumer testing?

Last Answer : The best home security system is called Protect America, which I think can give you the best security and save money

Description : Security falls under _______ A. Compliance testing B. Disaster testing C. Verifying compliance to rules D. Functional testing E. Ease of operations

Last Answer : A. Compliance testing

Description : The testing attempts to violate those procedures, which should test the adequacy of the security procedures. A. Disaster testing B. Functional testing C. Regression testing D. Compliance testing

Last Answer : D. Compliance testing

Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls

Last Answer : a. Avoiding Detection

Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing

Last Answer : C. White-box testing

Description : what is the primary goal of an Ethical Hacker ?  Avoiding detection  Testing security controls  Resolving security vulnerabilities  Determining return on investment for security measures

Last Answer :  Resolving security vulnerabilities

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing

Last Answer : c. White-box testing

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing

Last Answer : C. White-box testing

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing

Last Answer : C. White-box testing

Description : Non-ferrous metals and hard steels do not exhibit a definite yield point, when pulled in the testing machine and hence for these cases, a better measure of their elastic properties is defined by the __________ stress. (A) Ultimate (B) Yield point (C) Proof (D) None of these

Last Answer : (C) Proof

Description : While testing a cast iron beam (2.5 cm × 2.5 cm) in section and a metre long simply supported at  the ends failed when a 100 kg weight is applied at the centre. The maximum stress induced is:  (A) 960 kg/cm2 (B) 980 kg/cm2 (C) 1000 kg/cm2 (D) 1200 kg/c

Last Answer : (A) 960 kg/cm

Description : Consider the following salient points in a stress-strain curve of a mild steel bar: 1. Yield point 2. Braking point 3. Yield plateau 4 . Proportionality limit 5. Ultimate point The correct sequence in which they occur while testing the mild ... , 5 and 2 (c) 4, 1, 3, 5 and 2 (d) 1, 4, 2, 3 and 5

Last Answer : (c) 4, 1, 3, 5 and 2

Description : Load testing emphasizes on performance under load while stress testing emphasizes on _______ A. Breaking load B. Performance under stress C. Performance under load D. There is no such difference, both are same

Last Answer : A. Breaking load

Description : Testing error messages fall under _________category of testing. A. Incremental Testing B. Thread Testing C. Documentation Testing D. Stress Testing

Last Answer : C. Documentation Testing

Description : How many batches should be considered for stress testing under basic conditions testing as per ICH? A. At least 3 B. At least 2 C. At least 1 D. At least 5

Last Answer : A. At least 3

Description : SRS is also known as specification of (A) White box testing (B) Stress testing (C) Integrated testing (D) Black box testing

Last Answer : (D) Black box testing

Description : A fault simulation testing technique is (A) Mutation testing (B) Stress testing (C) Black box testing (D) White box testing

Last Answer : (A) Mutation testing

Description : One of the fault base testing techniques is (A) unit testing. (B) beta testing. (C) Stress testing. (D) mutation testing.

Last Answer : (D) mutation testing.

Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing

Last Answer : (B) Black-box testing

Description : Is Post Traumatic Stress Disorder something that would qualify someone for social security disability?

Last Answer : To receive social security disability for post traumatic stress disorder, it could vary from state to state. To find out if your eligible for social security disability, you should first contact your local social security services.