For what items should the protocols in assurance testing test a system?

What will be an ideal response?

Those protocols should test how well the system traps real-world errors and handles the unanticipated events that might come up in normal, day-to-day activity (that is, anything feasibly covered by Murphy's First Law of computer operation). This requires such common sense activities as verifying the software's functioning under typical operating conditions. An example of this would be testing when the database is loaded that such things as exception handling under that normal operational load can be confirmed and that the normal security and disaster recovery controls are present and work correctly.

Computer Science & Information Technology

You might also like to view...

The Start menu can be described as being divided into four areas

Indicate whether the statement is true or false

Computer Science & Information Technology

Match the following questions to their considerations

I. What am I looking for? A. Identify the operating system or network topology II. What is the skill level of the user? B. There may be fingerprints or other trace evidence III. What kind of hardware is involved? C. You would use different tools to locate different items such as photographs or spreadsheets IV. Do I need to preserve other evidence? D. This determines how you will extract the data V. What is the computer environment? E. The more skilled the user, the more likely it is that he can alter or destroy evidence

Computer Science & Information Technology