. A security audit performed on the internal network of an
organization by the network administration is also known as
___________.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing

1 Answer

Answer :

C. White-box testing

Related questions

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing

Last Answer : c. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing

Last Answer : C. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing

Last Answer : C. White-box testing

Description : Acceptance testing is also known as a) Grey box testing b) White box testing c) Alpha Testing d) Beta testing

Last Answer : Ans : d

Description : Behavioral testing is a) White box testing b) Black box testing c) Grey box testing d) None of the mentioned

Last Answer : Ans : b

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : SRS is also known as specification of (A) White box testing (B) Stress testing (C) Integrated testing (D) Black box testing

Last Answer : (D) Black box testing

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : A testing which checks the internal logic of the program is A. Black box testing B. White box testing C. Both (A) and (B) D. None of the above

Last Answer : B. White box testing

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke

Last Answer : A. Security professional

Description : Which type of hackers are invited by the software vendors to find the security flaws in their system? a. White hat hackers b. Black hat hackers c. Grey hat hackers d. Blue hat hackers

Last Answer : d. Blue hat hackers

Description : Which of the following statement based describe a white hat hackers (a) Security professional (b) Former black hat (c) Former grey hat (d) Malicious hackers

Last Answer : (a) Security professional

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Which of the following procedures ordinarily performed during an audit are also performed in review? a. Assessment of accounting and internal control systems b. Test of controls c. Tests of records and of responses to inquiries d. Inquiry and analytical procedures

Last Answer : Inquiry and analytical procedures

Description : __________ testing assumes that the path of logic in a unit or program is known. A. Black Box testing B. Performance Testing C. White Box testing D. Functional testing

Last Answer : C. White Box testing

Description : Management's attitude toward aggressive financial reporting and its emphasis on meeting projected profit goals most likely would significantly influence an entity's control environment when a. External ... d. The audit committee is active in overseeing the entity's financial reporting policies

Last Answer : Management is dominated by one individual who is also a shareholder

Description : Acceptance testing means A. Testing performed on a single stand - alone module or unit of code B. Testing after changes have been made to ensure that no unwanted changes were introduced C. ... the needs of the organization and end user. D. Users test the application in the developers environment

Last Answer : C. Testing to ensure that the system meets the needs of the organization and end user.

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : D. Script kiddies

Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies

Last Answer : (c) disgruntled employees

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies

Last Answer : A. Disgruntled employees

Description : White Box techniques are also classified as a) Design based testing b) Structural testing c) Error guessing technique d) None of the mentioned

Last Answer : Ans : b

Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Description : Which of the following is required to be performed in an audit but not in review engagement? a. Complying with the "Code of Professional Ethics for Certified Public Accountants" promulgated ... engagement c. Agreeing on the terms of engagement d. Studying and evaluating internal control structure

Last Answer : Studying and evaluating internal control structure

Description : The external auditor should obtain a sufficient understanding of the internal audit function because a. The understanding of the internal audit function is an important substantive test to be performed by ... factor in determining the nature, timing, and extent of the external auditor's procedures.

Last Answer : The work performed by internal auditors may be a factor in determining the nature, timing, and extent of the external auditor's procedures.

Description : Operational audits generally have been conducted by internal and COA auditors, but may be performed by certified public accountants. A primary purpose of an operational audit is to provide: ... statements. d. A means of assurance that internal accounting controls are functioning as planned

Last Answer : A measure of management performance in meeting organizational goals

Description : Internal auditing relates to an a. Audit which is performed by a practitioner as an independent contractor. b. Audit which is incidentally concerned with the detection and prevention of fraud. c. ... . Audit wherein the auditor should be independent of management both in fact and in mental attitude

Last Answer : Audit which serves the needs of management

Description : A/An ________ is a formal evaluation of an organization's financial statements, performed either by an outside accounting firm or by an internal department. (a) Revenue operating budget ; (b) Incident log ; (c) Financial audit ; (d) Balance sheet budget

Last Answer :  (c) Financial audit ;

Description : What Is Black Box Testing And White Box Testing?

Last Answer : Black box testing is an external perspective of the object that is to be tested to obtain test cases. These tests may be functional or non functional. The valid and invalid inputs are tested ... chosen by the tester to exercise paths through the code to determine the outputs that are appropriate.

Description : Which of the following is true about White and Black Box Testing Technique:- a) Equivalance partitioning, Decision Table and Control flow are White box Testing Techniques. b) Equivalence partitioning ... , State Transition , Use Case Testing and Decision Table are White Box Testing Techniques.

Last Answer : c) Equivalence partitioning , State Transition , Use Case Testing are black box Testing Techniques.

Description : Which testing methods are used by end-users who actually test software before they use it? A. Alpha & Beta Testing B. White Box Testing C. Black Box Testing D. Trial & Error Testing

Last Answer : A. Alpha & Beta Testing

Description : The testing that focuses on the variables is called (A) black box testing (B) white box testing (C) data variable testing (D) data flow testing

Last Answer : (A) black box testing

Description : A fault simulation testing technique is (A) Mutation testing (B) Stress testing (C) Black box testing (D) White box testing

Last Answer : (A) Mutation testing

Description : V- model uses -------- test models a) Component testing, integration testing, system testing and acceptance testing b) alpha testing, beta testing , acceptance testing and user testing c) black box testing, white box testing and gray box testing

Last Answer : a

Description : The testing in which code is checked a) Black box testing b) White box testing c) Red box testing d) Green box testing

Last Answer :  Ans :b

Description : Boundary value analysis belong to? a) White Box Testing b) Black Box Testing c) White Box & Black Box Testing d) None of the mentioned

Last Answer : Ans: b

Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing

Last Answer : (B) Black-box testing

Description : Explain the concept of black box testing and white box testing.

Last Answer : Black Box Testing: * It is a way of software testing in which the internal structure or the program or the code is hidden and nothing is known about it. * It also known as ... implementation. * White-box testing is time-consuming, bigger programming applications take the time to test fully.

Description : ______ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers

Last Answer : a) Grey Hat hackers

Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker

Last Answer : b) White Hat Hackers

Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None

Last Answer : C)Combination of White and black hat hackers

Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies

Last Answer : A. White Hat Hacking

Description : The term cracker refers to_____ A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.

Last Answer : A. Black hat hacker.

Description : Which hacker refers to ethical hacker? A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.

Last Answer : B. White hat hacker.

Description : ________ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers

Last Answer : a) Grey Hat hackers

Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None

Last Answer : C)Combination of White and black hat hackers