Which of the following testing approaches will she apply to accomplish this task?

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been
tasked to perform network security testing to find out the vulnerabilities and shortcomings of the
present network infrastructure. Which of the following testing approaches will she apply to
accomplish this task?

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been
tasked to perform network security testing to find out the vulnerabilities and shortcomings of the
present network infrastructure. Which of the following testing approaches will she apply to
accomplish this task?

A.
Gray-box testing

B.
White-box testing

C.
Black-box testing

D.
Unit testing

Explanation:
Maria is new for this organization and she does not have any idea regarding the
present infrastructure. Therefore, black box testing is best suited for her. Blackbox testing is a
technique in which the testing team has no knowledge about the infrastructure of the organization.
The testers must first determine the location and extent of the systems before commencing their
testing, also known as Clear box or Glass box testing, takes into account the internal mechanism
of a system or application. The connotations of “Clear box” and “Glass box” indicate that a tester
has full visibility of the internal workings of the system. It uses knowledge of the internal structure
of an application. It is applicable at the unit, integration, and system levels of the software testing
process. It consists of the following testing methods: Control flow-based testing Create a graph
from source code. Describe the flow of control through the control flow graph. Design test cases to
cover certain elements of the graph. Data flow-based testing Test connections between variable

definitions. Check variation of the control flow graph. Set DEF (n) contains variables that are
is a combination of whitebox testing and blackbox testing. In graybox testing, the test engineer is
equipped with the knowledge of system and designs test cases or test data based on system
knowledge. The security tester typically performs graybox testing to find vulnerabilities in software
independent unit of an application is tested separately. During unit testing, a developer takes the
smallest unit of an application, isolates it from the rest of the application code, and tests it to
determine whether it works as expected. Unit testing is performed before integrating these
independent units into modules. The most common approach to unit testing requires drivers and
stubs to be written. Drivers and stubs are programs. A driver simulates a calling unit, and a stub
simulates a called unit.



Leave a Reply 0

Your email address will not be published. Required fields are marked *