This set of JUnit Multiple Choice Questions & Answers focuses on “Writing Testable Code”.
1. The review process for a particular review begins with a _____________ by the author to the moderator in formal review.
a) Request For Review
b) Requirement Analysis
c) Notice For Review
d) Goal Design
View Answer
Explanation: Planning forms the first step of a formal review which begins with a request for review.
2. Configuration management procedures be implemented during ____________
a) Test Execution
b) Test Planning
c) Test Design
d) Test Success
View Answer
Explanation: Configuration management procedures allow the testers to manage their testware and hence, should be implemented during test planning.
3. ______________ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended.
a) Integrity Testing
b) Unit Testing
c) Security Testing
d) Stress testing
View Answer
Explanation: Typical security requirements may include specific elements of confidentiality, integrity, availability, authentication, authorization and non-repudiation.
4. _______________ of information refers to protecting information from being modified by unauthorized parties.
a) Confidentiality
b) Authentication
c) Authorization
d) Integrity
View Answer
Explanation: Integrity of information is intended to allow the receiver to determine that the information provided by a system is correct.
5. ________________ means to ensure that a transferred message has been sent and received by the intended parties who are claiming to have sent and received the message.
a) Confidentiality
b) Authentication
c) Non-repudiation
d) Integrity
View Answer
Explanation: Non-repudiation is used to guarantee that the sender of a message cannot later deny having sent the message.
6. _____________ looks for known security issues by using automated tools to match conditions with known vulnerabilities.
a) Discovery
b) Vulnerability Scan
c) Security Assessment
d) Penetration Test
View Answer
Explanation: Vulnerability scanning is supplemented with credential based scanning that remove some common false positives.
7. __________ uses discovery and vulnerability scanning to identify security vulnerabilities
a) Discovery
b) Vulnerability Scan
c) Vulnerability Assessment
d) Penetration Test
View Answer
Explanation: Vulnerability Assessment places the findings into the context of the environment under test.
8. _________ is driven by an Audit or a Risk function to look at a specific control or compliance issue.
a) Security Audit
b) Vulnerability Scan
c) Vulnerability Assessment
d) Penetration Test
View Answer
Explanation: Characterized by a narrow scope, Security audit is used to diagnose a compliance issue or specific control.
9. ________________ simulates an attack by a malicious party.
a) Security Audit
b) Vulnerability Scan
c) Vulnerability Assessment
d) Penetration Test
View Answer
Explanation: Penetration Test approach looks at the depth of attack in comparison to the Security Assessment approach.
10. ______________ builds upon Vulnerability Assessment by adding manual verification to confirm exposure.
a) Security Audit
b) Security Assessment
c) Vulnerability Assessment
d) Penetration Test
View Answer
Explanation: Security Assessment does not include the exploitation of vulnerabilities to gain further access.
Sanfoundry Global Education & Learning Series – JUnit.
To practice all areas of JUnit , here is complete set of 1000+ Multiple Choice Questions and Answers.
If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]
- Check Programming Books
- Apply for Computer Science Internship
- Check JUnit Books
- Practice Programming MCQs