Which one is not key term used in internal control and
security
Option 1 Threat
Option 2 Risk Control
Option 3 Vulnerability
Option 4 Exposure
Answer Posted / akash
thereat
Is This Answer Correct ? | 3 Yes | 5 No |
Post New Answer View All Answers
Hi, I was asked following question during a interview. Please answer it: Password field is there,we can accepts every character except underscore and semicolon. It can accept min 6 characters and maximum 12 characters. Prepare boundary value and equivalence class test cases.
Please Provide me the link to download Testing Category questions and answers If some body has downloaded it pleae send it to me Pavan : Email pavan_cd@yahoo.com Quetion2 : Can any body Explain me about Testing thumb rules
What is the difference between SIT AND IST?
How a test engineer will convince a test lead when he didn't approve the bug as a report ???
How do you test google or gmail application??tell me step by step process??
What do you plan to become after say 2-5yrs (Ex: QA Manager, Why?)
What is difference between web site testing, desktop application testing and wireless application testing? what is the difference in testing strategy to test them?
10 scenarios for security testing using gmail applications?
What is boundary value testing? Give an example.
Need to know about Quality Center in brief
name poneno dept sun 9894433467 computer This is the xls sheet a programs written to transfer this data into database write test cases and test scenario?
what type of quetion may be asked for experienced person in manual tester of 1 year?
what risks do u faced u r projest how do you solve
any one please send me any test case examples with tabular columns in manual testing
when database testing comes into manual tesing