Answer Posted / pa
In computer security, the word vulnerability refers to a
weakness in a system allowing an attacker to violate the
confidentiality, integrity, availability [i.e (C.I.A)
NSTISSC's triangle], access control, consistency or audit
mechanisms of the system or the data and applications it
hosts. Vulnerabilities may result from bugs or design flaws
in the system. A vulnerability can exist either only in
theory, or could have a known exploit. Vulnerabilities are
of significant interest when the program containing the
vulnerability operates with special privileges, performs
authentication or provides easy access to user data or
facilities (such as a network server or RDBMS).
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is a checkpoint? How many check points are there in qtp?
What are the 3 main stages involved in testing with qtp?
Explain the views in the QTP GUI?
How does qtp identify gui object?
How to add synchronisation points in qtp?
i'm using the qtp to test to vb appliction,i wanted to get the new application's title.i didn't want to use the winAPI to get it ,i 'd like to know whether a QTP function can do it. Eg: SystemUtil.Run "C:\Program Files\.....","","","" 'run an application, and misure the application is activating,then how to get the hwn wihtout using windowns api
What are the flaws in water fall model and how to overcome it?
How qtp identifies objects?
What are the various types of Actions in UFT?
How extensive or customized are the server logging and reporting requirements; are they considered an integral part of the system and do they require testing?
i am new QTP... please tell me automation frameworks , types & for whiich type of applications frameworks are used & how to generate script in keyword driven framework
What is a programmatic description?
What is QTP and the use of QTP in TD?
In the website, the protocol has been changed http: to https what you will do? Tell me your approach?
How many ways is to parameterize the value?