Answer Posted / suresh
Attacking on the host in order to find out the security
volunarabilities..
| Is This Answer Correct ? | 5 Yes | 1 No |
Post New Answer View All Answers
Can you explain tailoring?
Define what is a critical bug.
I have to give weights to 5 stones so that using a simple balance and the stone i should be able to weight any number between 1-100
Which is the best testing model?
I want to know about satyam manual testing questions
Can you explain the workbench concept?
Test approach to windows scheduler?
what is API 2.0?
Are there more defects in the design phase or in the coding phase?
What is an mr?
How do you perform configuration management with typical revision control systems?
Hi Can any one tell wht type of questions will be asked in project manager round...urgent plz...
Being an Manual tester, what will be the role or activity in test plan ?
what are the various techniques you will use as soon as the srs was given to you to speedup the testing?
i have source and target having same data structure 500 fields and one lacks records. how to validate data. write 5 scenarios.