JUnit Questions and Answers – Writing Testable Code

This set of JUnit Multiple Choice Questions & Answers focuses on “Writing Testable Code”.

1. The review process for a particular review begins with a _____________ by the author to the moderator in formal review.
a) Request For Review
b) Requirement Analysis
c) Notice For Review
d) Goal Design
View Answer

Answer: a
Explanation: Planning forms the first step of a formal review which begins with a request for review.

2. Configuration management procedures be implemented during ____________
a) Test Execution
b) Test Planning
c) Test Design
d) Test Success
View Answer

Answer: b
Explanation: Configuration management procedures allow the testers to manage their testware and hence, should be implemented during test planning.

3. ______________ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended.
a) Integrity Testing
b) Unit Testing
c) Security Testing
d) Stress testing
View Answer

Answer: c
Explanation: Typical security requirements may include specific elements of confidentiality, integrity, availability, authentication, authorization and non-repudiation.
advertisement
advertisement

4. _______________ of information refers to protecting information from being modified by unauthorized parties.
a) Confidentiality
b) Authentication
c) Authorization
d) Integrity
View Answer

Answer: d
Explanation: Integrity of information is intended to allow the receiver to determine that the information provided by a system is correct.

5. ________________ means to ensure that a transferred message has been sent and received by the intended parties who are claiming to have sent and received the message.
a) Confidentiality
b) Authentication
c) Non-repudiation
d) Integrity
View Answer

Answer: c
Explanation: Non-repudiation is used to guarantee that the sender of a message cannot later deny having sent the message.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. _____________ looks for known security issues by using automated tools to match conditions with known vulnerabilities.
a) Discovery
b) Vulnerability Scan
c) Security Assessment
d) Penetration Test
View Answer

Answer: b
Explanation: Vulnerability scanning is supplemented with credential based scanning that remove some common false positives.

7. __________ uses discovery and vulnerability scanning to identify security vulnerabilities
a) Discovery
b) Vulnerability Scan
c) Vulnerability Assessment
d) Penetration Test
View Answer

Answer: c
Explanation: Vulnerability Assessment places the findings into the context of the environment under test.
advertisement

8. _________ is driven by an Audit or a Risk function to look at a specific control or compliance issue.
a) Security Audit
b) Vulnerability Scan
c) Vulnerability Assessment
d) Penetration Test
View Answer

Answer: a
Explanation: Characterized by a narrow scope, Security audit is used to diagnose a compliance issue or specific control.

9. ________________ simulates an attack by a malicious party.
a) Security Audit
b) Vulnerability Scan
c) Vulnerability Assessment
d) Penetration Test
View Answer

Answer: d
Explanation: Penetration Test approach looks at the depth of attack in comparison to the Security Assessment approach.
advertisement

10. ______________ builds upon Vulnerability Assessment by adding manual verification to confirm exposure.
a) Security Audit
b) Security Assessment
c) Vulnerability Assessment
d) Penetration Test
View Answer

Answer: b
Explanation: Security Assessment does not include the exploitation of vulnerabilities to gain further access.

Sanfoundry Global Education & Learning Series – JUnit.
To practice all areas of JUnit , here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.