Deck 10: Testing for Quality and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 10: Testing for Quality and Security
1
Reliability testing is a technique that feeds random input data into applications just to see what happens to the results.
False
2
A testing script needs to be created for every possible situation and attack that the program could encounter.
True
3
The application will never be 100% secure.
True
4
Unit testing catches errors that compilers won't find.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Reliability of an application is when the application produces correct results despite being under attack or under extreme use.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The more complexity that is added to the system, the more secure it becomes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
It is better to use programmers for general testing because they are familiar with the architecture and code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The testing phase of any applications is only a minor phase of the lifecycle.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Fuzz testing and reliability testing are conducted during system testing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Use cases are a great starting point for functional test scripts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Testing should generate error-free software.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Unit testing is the lowest level of testing a developer can conduct.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
There are two types of resourcres needed to execute the test case: -Internal -External
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Internal threats don't pose any real problems and do not need to be considered.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Testing software consists of running a battery of test cases using multiple techniques against a specific use case and evaluating the results for pass or fail marks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Security code scanners also report a number of false positives.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Integrations testing is when two or more modules, web services, or platforms are linked together and tested.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Penetrations testing is a very rare practice in the security field.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Source-based fault injections is when you go into the source code and force an error or an attack non-manually.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
A system test involves only a portion of the application.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
What type of resources are tools or people who are hired on a temporary basis to come into a project, test the application, and report findings?
A) Internal
B) Tools
C) Application Guide
D) External
A) Internal
B) Tools
C) Application Guide
D) External
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
When testing for resiliency, what is being evaluated?
A) Security vulnerabilities
B) Policies and procedures
C) Documentation
D) Software
A) Security vulnerabilities
B) Policies and procedures
C) Documentation
D) Software
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
What type of testing implies executing the current use case using valid inputs and then comparing the real results with expected results for pass or failures
A) Dynamic
B) Static
C) Load
D) Stress
A) Dynamic
B) Static
C) Load
D) Stress
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Code reviews, if conducted right can have a very positive effect on the team.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
What type of scripts are specifically created for testing the security of the application?
A) Secure testing
B) automated
C) functional testing
D) User based
A) Secure testing
B) automated
C) functional testing
D) User based
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
What are people-intensive verification techniques that are conducted either formally or informally that allow peers to read code statements and look for common security vulnerabilities, such as hard-coded IDs or passwords,and general quality features?
A) Code scanners
B) Code Reviews
C) Load testers
D) Fuzzing
A) Code scanners
B) Code Reviews
C) Load testers
D) Fuzzing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
What defines how effective security is tested and implemented within the software?
A) Software test plan
B) User Acceptance reports
C) Types of testing tools
D) Software Assurance
A) Software test plan
B) User Acceptance reports
C) Types of testing tools
D) Software Assurance
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
What tool scans (parse) through static code and analyze the code base for security vulnerabilities
A) static code analyzers
B) Application Guide
C) Load testing
D) Brute force tools
A) static code analyzers
B) Application Guide
C) Load testing
D) Brute force tools
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Coding for resiliency means accepting the fact that something bad will happen and that when it does, you will be ready.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Static testing involves executing methods and techniques to test the code while running the application.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
What type of errors does unit testing find?
A) errors with third party code modules
B) heap management
C) logic errors
D) load balancing
A) errors with third party code modules
B) heap management
C) logic errors
D) load balancing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
What is a technique that feeds random input data into applications just to see what happens to the results?
A) Brute force
B) Concurrent users
C) Load test
D) Fuzzing
A) Brute force
B) Concurrent users
C) Load test
D) Fuzzing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Who creates and approves the test plan?
A) Developers
B) Testers
C) Project Management
D) Business Analysts
A) Developers
B) Testers
C) Project Management
D) Business Analysts
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
What are step-by-step instructions that depict a specific scenario or situation that the use case will encounter as well as the expected result?
A) Secure test scripts
B) Functional test scripts
C) User acceptance
D) Load testing
A) Secure test scripts
B) Functional test scripts
C) User acceptance
D) Load testing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Code review needs to include the developer who coded the software and one other person on the development team.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Manually going into the source code and forcing an error or attack is called?
A) Unit testing
B) Source-based fault injections
C) fuzzing
D) code reviews
A) Unit testing
B) Source-based fault injections
C) fuzzing
D) code reviews
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
What test is when two or more modules or platforms are linked together and tested?
A) System
B) Integration
C) Unit
D) Load
A) System
B) Integration
C) Unit
D) Load
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
Making something bad happen actually tests the dependencies and resiliency of the software.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
What is tested when the application produces correct results despite being under attack?
A) Integrity
B) Confidentiality
C) Fuzzing
D) Reliability
A) Integrity
B) Confidentiality
C) Fuzzing
D) Reliability
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
What type of test involves a complete front-to-back execution of the entire application?
A) System
B) Unit
C) Integration
D) Acceptance
A) System
B) Unit
C) Integration
D) Acceptance
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
What is the Holodeck tool used for?
A) Load testing
B) Heap management
C) fault simulation
D) brute force
A) Load testing
B) Heap management
C) fault simulation
D) brute force
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
What type of errors do code scanners catch?
A) Security vulnerabilities
B) Heap management
C) Load testing
D) Logic errors
A) Security vulnerabilities
B) Heap management
C) Load testing
D) Logic errors
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
What type of errors does integration testing find?
A) calls to services or third party modules
B) logic problems
C) syntax errors
D) reporting problems
A) calls to services or third party modules
B) logic problems
C) syntax errors
D) reporting problems
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
What is a simulation tool used for?
A) Syntax errors
B) Concurrent users
C) Security vulnerabilities
D) logic errors
A) Syntax errors
B) Concurrent users
C) Security vulnerabilities
D) logic errors
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
What type of errors does compilers find?
A) Log errors
B) Reporting errors
C) Heap managements
D) syntax
A) Log errors
B) Reporting errors
C) Heap managements
D) syntax
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck