Monday, April 30, 2012
How does penetration testing tool emphasize on network security?
Posted by
Sunflower
at
4/30/2012 11:24:00 PM
0
comments
 
 
Labels: Active, Analysis, Application, Attackers, Authorization, Emphasize, Errors, Functionality, Methodology, Network, Network Security, Penetration testing, Reasons, Requirements, Security, Software testing, Tools
|  | Subscribe by Email |  | 
What are basic practices of iterative development?
- Rational
     unified process or RUP
- Extreme
     programming or XP and 
- Various
     other agile software development methods
What is meant by Iterative Development?
- The
     Initialization step
- The
     iteration step and 
- Project
     control list
- Simplicity
- Straight
     forward
- Modular
- Redesigning
     supportive at that particular stage etc.
- Structure
     of the iteration
- Modularity
- Usability
- Reliability
- Achievement
     of goals and
- Efficiency
Phases of Iterative Development
- Inception
     phase: It involves identification of the project scope, risks and both the
     functional as well the non functional requirements.
- Elaboration
     phase: It involves the delivery of a working architecture fulfilling all the
     requirements and mitigation of the top risks.
- Construction
     phase: It involves implementing the production ready code in to the
     architecture.
- Transition
     phase: It involves delivery of the project in to the production environment.
Posted by
Sunflower
at
4/30/2012 02:58:00 PM
0
comments
 
 
Labels: Agile Software Development, Analyze, Approaches, Defects, Developers, Development, Errors, Interaction, Iteration, Iterative Planning, Phases, Practices, Procedure, Requirements, Software testing, Strategy, Testers
|  | Subscribe by Email |  | 
Sunday, April 29, 2012
What is meant by penetration testing?
About Penetration Testing
Steps in Penetration Testing
Advantages of Penetration Testing
- It is
     effective for the determination of the feasibility of the similar vectors
     of attack. 
- Helps
     in the identification of the vulnerabilities which possess a very high
     risk when the exploitation of a combination of low level risks is done
     following a particular sequence.
- Proves
     quite effective in the determination of the vulnerabilities that cannot be
     detected with the help of application vulnerability scanning software or
     automated testing processes.
- Assists
     in the assessment of the measure of the operational and business impacts
     of the attacks on the computer network or system. 
- Successfully
     tests the effectiveness of the network defenders in detecting and
     responding to the attacks.
- Provides
     the evidences in support of the investments that need to be made in the
     security field of the computer system or network. 
Penetration testing if carried through white box testing
Posted by
Sunflower
at
4/29/2012 03:30:00 PM
0
comments
 
 
Labels: Advantages, Application, attacks, Audit, Authorization, Black box testing, Code, Components, Methodology, Network, Penetration testing, Security, Software System, Steps, Techniques, Testers, Tools, White box testing
|  | Subscribe by Email |  | 
Saturday, April 28, 2012
What is meant by production verification testing?
- Business process flows
- Proper functioning of the data entry functions
- Proper running of any batch processes against the
     actual data values of the production process. 
About Production Verification Testing
Entry and Exit Criterion for Production Verification Testing
- The completion of the User acceptance testing is
     over and has been approved by all the involved parties.
- The documentation of the known defects is ready.
- The documentation of the migration package has
     been completed, reviewed and approved by all the parties and without fail
     by the production systems manager.
- The processing of the migration package is
     complete.
- The installation testing has been performed and
     its documentation is ready and signed off. 
- The documentation of the mock testing has been
     approved and reviewed.
- A record of the system changes has been prepared and approved.
Posted by
Sunflower
at
4/28/2012 04:33:00 PM
0
comments
 
 
Labels: Application, Data, Defects, Entry, Errors, Exit, Functions, Methodology, Parallel testing, Production Verification testing, Simulation, Software Development Methodology, STLC, User Acceptance, Verification, Verify
|  | Subscribe by Email |  | 
Friday, April 27, 2012
What kinds of people are involved in software testing?
- Developer: A developer as the name suggests is
     responsible for taking care of all the development activities like:
- Data architect or Data Modeler: Data architect
     is responsible for taking care of the management of all the issues
     regarding the architecture and build of the software system or
     application:
- Senior Developer or System Tester: A team
     consists of more than one senior developers or system testers and they are
     responsible for taking care of the actual software testing of the software
     system or application. They share some responsibilities with the
     developers: 
- Data base Administrator: They share the
     responsibilities of the following tasks:
- Integration Tester or Senior ETL Designer: They are responsible for:
- Quality assurance people
- QA software tester
- User acceptance tester
- Release manager
- Production support specialists
Posted by
Sunflower
at
4/27/2012 11:36:00 PM
0
comments
 
 
Labels: Bugs, Code, Data, Data architect, Database administrator, Defects, Developer, Errors, ETL designer, Integration tester, QA Tester, SDLC, Software testing, STLC, System Tester, Test Manager, Test Plan, Testers
|  | Subscribe by Email |  | 
What is meant by correct filtering of user input?
About Filtering of User Input
- Logical
     filtering: It involves a strong and stringent analysis of the input data,
     checking for the correctness of the formats and the expected type is
     returned if the data passes the test.
- Sanitizing
     filtering: It involves determining whether or not to allow certain
     characters in a string. The data format is really not cared about in this
     type of filtering and a string is always returned. 
How can filters be useful?
Posted by
Sunflower
at
4/27/2012 01:35:00 PM
0
comments
 
 
Labels: Advantages, Application, Data, Data Filtering, Filters, Functions, Input, Interface, Languages, Logical, Modules, Risks, Security, Software Systems, Software testing, Tasks, Useful, Users, Variables, Web form
|  | Subscribe by Email |  | 
Thursday, April 26, 2012
What is a testing framework? What are different unit testing frameworks?
What is a testing framework?
Types of Testing Frameworks
- Linear testing framework: This is commonly used for the code that is procedure oriented and is generated by the tools using techniques such as recording and playback.
- Structured
     testing framework: This testing frame work is composed of the control
     structures and hence got the name. It is constituted by control structures
     such as switch, while, for, if-else condition statement etc. 
- Data driven
     testing framework: This testing
     frame work involves persisting of the data outside a test in either a
     spreadsheet or a database.
- Key word
     driven testing framework
- Hybrid testing framework: This type of frame work is the resultant of the combination of two or more types of above mentioned testing frame works.
What does testing framework account for?
- Definition
     of the format so that the expectations can be expressed.
- Creation of
     a mechanism for driving or hooking an application that is under test.
- Execution
     of the tests.
- Reporting
     of the results.
Posted by
Sunflower
at
4/26/2012 11:50:00 PM
0
comments
 
 
Labels: Application, Approach, Assumptions, Automated, Concepts, Control, Cost, Development, Efficiency, Environment, Frameworks, Object Oriented, Software System, Test cases, Testers, Testing Framework, Time, Tools, Types
|  | Subscribe by Email |  | 
Explain Test plan, Test Strategy and Test Scenario?
2. Test Strategy
3. Test Scenario
Posted by
Sunflower
at
4/26/2012 01:52:00 PM
0
comments
 
 
Labels: Application, Approach, Complex, Components, Criterion, Development, Entry, Exit, Outline, Requirements, Software testing, Specifications, Tasks, Test Plan, Test Scenario, Test Strategy, Testers, Tests, Work flow
|  | Subscribe by Email |  |