Answer Posted / suresh
Attacking on the host in order to find out the security
volunarabilities..
| Is This Answer Correct ? | 5 Yes | 1 No |
Post New Answer View All Answers
What is quality center? How many built in tables does quality center have?
What are the main key components in client and server applications?
tell me 5 new requirements in ur project? plz urgent
Did any one completed CSTE certiication? can u send sample question papers? how to apply that? pls send it to my mail id - dsnathi@gmail.com THANKS IN ADVANCE
Can u give me explanation about section 508 testcase and Testcase for this section. It need a details checklist for the same Manimozhi
Our software designers use UML for modeling applications. Based on their use cases, we would like to plan a test strategy. Do you agree with this approach or would this mean more effort for the testers.
Please is there any one working with ITR.COM? Having interview with them. Any tips will help.
what is acid testing?
*) Internal review defect gets detected… 1) During peer review. 2) By the own stuff member onsite/offshore. 3) During Informal review process. 4) None of these 5) All of these
what are the types of Bug?
Can you explain the various elements of function points ftr, ilf, eif, ei, eo, eq, and gsc?
Give an example for pre testing and post testing ?
What is early testing?
tell me some major and minor defects in ur net banking project?
what is the difference between website and web based application ?