Q1. An interface test is done to ascertain:
Pressure, temperature, and environment conditions
Metrics for code coverage
The round-trip time of a request response
Security during interactions between user to interfaces and interface to modules
Q2. Identity management includes:
The enrollment of user identifiers
The provisioning or deprovisioning of user identities to different systems
Whenever there is a change in user information then updating all associated accounts
All of the above
Q3. When an identified vulnerability is not published by the application vendor then it is called:
Zero-day vulnerability
Zero-day exploit
Zero-day logic bomb
Zero-day threat
Q4. Which one of the following is not a password attack?
Dictionary attack
Brute force attack
Code attack
Hybrid attack
Q5. The reverse of a use case test is a:
Vulnerability case test
Penetration case test
Nonuse case test
Misuse case test
Q6. A person, process, or technology component that either seeks access or controls the access is called:
Subject...