Which one is not key term used in internal control and
security
Option 1 Threat
Option 2 Risk Control
Option 3 Vulnerability
Option 4 Exposure
Answer Posted / prithviraj
Vulnerability
| Is This Answer Correct ? | 13 Yes | 2 No |
Post New Answer View All Answers
What is coverage and what are the different types of coverage techniques?
What is bidirectional traceability ??? and how it is implemented
Hello Varun, Kindly send me the material as well as sample question papers as i am interested in doing the certification. Kindly help me out in this regard. Here is my mail ID: bjyothitesting@gmail.com
do we need to write test cases for workflow of the product for instance: there is 2 module "TRAINING ASSIGN MODULE" and "EMPLOYEE" in TRAINING assign MODULE iam assigning training to employee setp is 1.selct traning "oracle" 2.select employee u want assign "peter" 3.apply. now to check whether training assign or not GOTO EMPLOYEE module 1.click on "peter" 2.click on 'view assign to employee'link.now this is a flow do i need to write test cases for this fllow.plz help me guy mail me nirmal_rawatt@rediff.com
HI can i know who is taking real time testing classes in banglore? i am preparing to put 3+year experience in testing if possible anybody give suggestions for preparing 3+exp
online demo for bug tracker tool(let me know the website)
Do submit teststrategy to customer if yes at what time
When do we perform smoke testing?
iam new testing, i want improve writing test cases and bug defect etc? any on give suggestion pls?
What makes a good software qa engineer?
What is sanity?
What knowledge I must have as a 3 yrs. manual tester??
What is the difference between Functional testing and Unit Functionality testing?
Can you explain tpa analysis?
Is an "A fast database retrieval rate" a testable requirement?