- Q Why union all faster than union?
- Q Give Rule 2 of Cæsura pause.
- Q Deleting the Duplicate rows in the table
- Q When Pakistan gave an application to the United Nations to become its member which country opposed it?
- Q Under which water body is the famous 'Shiva Crater' situated?
- Q Who provided protection to third Buddhist council?
- Q What is tuberculosis? How is the disease transmitted? Is there treatment for tuberculosis?
- Q Where do you define behavior, insertion and general properties of a component?
- Q How to create table using wml
- Q The first women Supreme Court judge.
- Q How would you manage your team for pahrmaceutical representatives?
Answers
Methodologies in Security testing are:
White Box- All the information are provided to the testers.
Black Box- No information is provided to the testers and they can test the system in real world scenario.
Grey Box- Partial information is with the testers and rest they have to rest on their own. Your Comment
White Box- All the information are provided to the testers.
Black Box- No information is provided to the testers and they can test the system in real world scenario.
Grey Box- Partial information is with the testers and rest they have to rest on their own. Your Comment
- 0
- 0
- New Answer
- Contributors: *,
More Software,security Questions..
What is the inputsplit in map reduce software?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What is software configuration management?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
Explain "roles" in sap security?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 0 )
- Tags: security,
What Is Java Api For Xml-based Rpc (jax-rpc)?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
How can you implement fine-grained auditing?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What is IBM’s simple explanation for Big Data’s four critical features?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What is static synchronized method in JDBC API? Give an example?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What does the NULLIF function do?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What happens if a start method is not invoked and the run method is directly invoked?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
Should we override finalize method
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
what is the difference between mysql_fetch_array and mysql_fetch_object?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
How will XML affect my document links?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
Why to use Style Sheets?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What are Filters in MVC?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
Can you explain Application layer in OSI model?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
How to define new testplan attributes?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What are the different types of security services involved in infrastructure management?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 0 )
- Tags: security,
What are the minimum system requirements to run Photoshop? Is it possible to run Photoshop over linux?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
Which oracle package is used to manage the oracle lock management services?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,
What is Latch Up? Explain Latch Up with cross section of a CMOS Inverter. How do you avoid Latch Up?
- 0
- 0 |
- |
- Post Answer |
- Answers ( 1 )
- Tags: Software,