how we conduct security testing in realtime,for every project we conduct security testig or not
1 6205How would you do the ollowing Security Testing for web application? 1) Authentication. 2) Authorization. 3) cookies. 4) penetration testing. 5) session testing. 6) encryption and decryption testing
1 4158How to write test case for view the table(i.e it is already stored in database and see the content in the table)
2051If PRS is given to you on say XYZ functionality then which different types of testing you will perform . Please arrange these types in sequential manner in which you will perform?
1 5241Post New TCS Manual Testing Interview Questions
WHAT IS PROTECTION AND INTERLOCK ROTECTION?
What is static and use of it?
How to find peaks in ftir chromatography
How do I lock an excel spreadsheet?
What is feature receiver in sharepoint 2010, its base class along with the methods that needs to be override?
What number of digits that can be accuratly stored in a float (based on the IEEE Standard 754)? a) 6 b) 38 c) An unlimited number
What is the difference between Kryptel and Silver Key?
What are the formatting tags?
What tools are used in sap implementation? How alert messages are created?
Explain the Meaning of a single and double underscore before an object name?
Can I use php in visual studio?
What is gopath environment variable?
Is c# good for games?
Explain soap and xml?
What are the pillars of java?