Answer / pa
In computer security, the word vulnerability refers to a
weakness in a system allowing an attacker to violate the
confidentiality, integrity, availability [i.e (C.I.A)
NSTISSC's triangle], access control, consistency or audit
mechanisms of the system or the data and applications it
hosts. Vulnerabilities may result from bugs or design flaws
in the system. A vulnerability can exist either only in
theory, or could have a known exploit. Vulnerabilities are
of significant interest when the program containing the
vulnerability operates with special privileges, performs
authentication or provides easy access to user data or
facilities (such as a network server or RDBMS).
|Is This Answer Correct ?||0 Yes||0 No|
what is descriptiveprograming? how to do object identification thrugh Descriptive and is possible smart identification or not
what is run-time data?
How can i use Output Check points in QTP
How to use Environment parameterization in QTP? Explain with an example.
In QTP can we feed the out of one browser(internet explorer) as an input to the another browser(mozilla firefox)? If yes explain how to do it with an example.
How do we run the scripts in QTP ?? what are the three options....
I have to pass all the test cases into gmail userid and password using functions please give me code thanks have anice and greate day
What is the meaning Work bench?
Without QTP (or any Testing tool) can we able to test the GUI part of the Applications. for Example generating the Scripts in Notepad and Executing them Using VB. Is it Possible to do so.. Correct me if iam wrong some where.
I have developed and executed a script successfully, and saved the same to QC. When I tried to execute the script from QC, the script is not executing. What are the possible reasons?”
What is Parameterizing Tests?
How the smart identification is used in real time?Please explain with an example