Home/interview questions/Page 11
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Describe the three-way handshake.
A three-way handshake is a procedure used in a TCP/IP network to establish a client-host connection and exchange packets. Here’s the three-step procedure: The client sends an SYN (synchronization) to check for available ports and whether the server is online. If the client has open ports, the serverRead more
A three-way handshake is a procedure used in a TCP/IP network to establish a client-host connection and exchange packets. Here’s the three-step procedure:
Why do organizations use firewalls? What does it do?
A firewall is a type of network security device installed on a system or network perimeter. It monitors and manages network traffic. Cyber security professionals use firewalls to safeguard systems and networks from malware, worms, and other threats. They also allow you to block content filtering andRead more
A firewall is a type of network security device installed on a system or network perimeter. It monitors and manages network traffic. Cyber security professionals use firewalls to safeguard systems and networks from malware, worms, and other threats. They also allow you to block content filtering and remote access.
See lessHow is encryption different from hashing?
Hashing and encryption change one type of data into another. Encrypted data can be decrypted and converted to the original, while hashed data cannot be reconverted.
Hashing and encryption change one type of data into another. Encrypted data can be decrypted and converted to the original, while hashed data cannot be reconverted.
See lessHow do IDS and IPS differ from one another?
The administrator must stop incursion once the IDS, or intrusion detection system, discovers them. Contrarily, in an IPS (intrusion prevention system), the system not only detects the intrusion but also addresses it.
The administrator must stop incursion once the IDS, or intrusion detection system, discovers them. Contrarily, in an IPS (intrusion prevention system), the system not only detects the intrusion but also addresses it.
See lessWhat is cryptography?
Cryptography assures secure communication even with malicious outside actors or adversaries. An algorithm and a key are used in encryption. The key converts plaintext from input into an encrypted output (i.e., cipher text). The same plaintext will always be converted into the same ciphertext if theRead more
Cryptography assures secure communication even with malicious outside actors or adversaries. An algorithm and a key are used in encryption. The key converts plaintext from input into an encrypted output (i.e., cipher text). The same plaintext will always be converted into the same ciphertext if the same key is used, according to a particular algorithm.
See lessHow can you make sure your testing is exhaustive and thorough?
You can use the Requirement Traceability Matrix and Test Coverage Matrix to ensure thorough testing.
You can use the Requirement Traceability Matrix and Test Coverage Matrix to ensure thorough testing.
See lessHow well do you comprehend data-driven testing?
Using a table or spreadsheet to hold test data, data-driven testing is a method of software testing. With data-driven testing, testers can create a single test script that can execute tests on all test data from a table and anticipate that the test results will be delivered in the same table. You miRead more
Using a table or spreadsheet to hold test data, data-driven testing is a method of software testing. With data-driven testing, testers can create a single test script that can execute tests on all test data from a table and anticipate that the test results will be delivered in the same table. You might also hear data-driven testing referred to as table-driven testing or parameterized testing.
See lessWhat does the defect leakage ratio mean in the context of quality control?
Defect leakage is a statistic used by software testers to assess Quality Assurance (QA) testing efficacy. It represents the proportion between the overall number of flaws assigned to a stage (which are recorded in later stages) and the total number of defects assigned to a stage (which are capturedRead more
Defect leakage is a statistic used by software testers to assess Quality Assurance (QA) testing efficacy. It represents the proportion between the overall number of flaws assigned to a stage (which are recorded in later stages) and the total number of defects assigned to a stage (which are captured in subsequent stages).
A measurement known as defect leakage shows the efficiency of software testers’ testing by tracking the percentage of flaws that pass from one testing step to the next. On the other hand, little defect leaks just serve to confirm the value of the testing team.
See lessWhat do you know about the Traceability Matrix (TM) in relation to quality control?
A traceability matrix connects any two baseline documents that need a many-to-many link to ensure a complete relationship. It is employed to monitor requirements and confirm they are being met on the current project.
A traceability matrix connects any two baseline documents that need a many-to-many link to ensure a complete relationship. It is employed to monitor requirements and confirm they are being met on the current project.
See lessDistinguish between a test strategy and a test plan.
Test Plan A test plan is a written description of the test's goals, locations, schedule, estimation, and expectations, as well as the resources required for the test. It encourages us to calculate the amount of work necessary to approve the type of application under test. Test Strategy A test strateRead more
Test Plan
A test plan is a written description of the test’s goals, locations, schedule, estimation, and expectations, as well as the resources required for the test. It encourages us to calculate the amount of work necessary to approve the type of application under test.
Test Strategy
A test strategy is a group of guiding concepts used in software testing that define the test design and regulate how the process is carried out. It aims to provide software testing with a systematic methodology to guarantee quality, traceability, reliability, and improved planning.
See less