New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ISTQB-CTFL Questions and Answers

Question # 6

In a two-hour uninterrupted test session, performed as part of an iteration on an Agile project, a heuristic checklist was used to help the tester focus on some specific usability issues of a web application.

The unscripted tests produced by the tester's experience during such session belong to which one of the following testing quadrants?

A.

Q1

B.

Q2

C.

Q3

D.

Q4

Full Access
Question # 7

Which of the following would be the LEAST likely to be used as the basis for a test exit criteria?

A.

Test schedules

B.

Cost of testing performed so far

C.

Confidence of testers in tested code

D.

Number of unfixed defects

Full Access
Question # 8

Which of the following is an example of tasks most associated with the test design activity?

A.

The project manager updates the project schedule as key test tasks are completed

B.

Test data, derived from production data, is loaded into the test environment

C.

Every day. the tester notes the status of his/her test cases in preparation for daily reports

D.

The identification of test execution and test automation tools

Full Access
Question # 9

You are testing a system that is used in motor vehicles to warn the driver of an obstacle when re-versing. Output is provided by a series of LED lights (green, yellow, and red), each illuminated based on clearly defined conditions.

The following summary describes the functionality:

•Object within 10 metres, green LED lit.

•Object within 5 metres, yellow LED lit.

•Object within 1 metre, red LED lit.

•Setting sensitivity mode to "ON" will result in only the red LED being lit when the object is within 1 metre.

The following decision table describes the rules associated with the functioning of this proximity warning system:

Which intended functionality is tested by Rule 5 in the decision table?

A.

Object is within 5 metres of the vehicle and the sensitivity mode is switched "off", resulting in the yellow LED being lit.

B.

Object is within 5 metres of the vehicle and the sensitivity mode is switched "on", resulting in the yellow LED being lit.

C.

Object is within 5 metres of the vehicle and the sensitivity mode is switched "off", resulting in no LED being lit.

D.

Object is within 5 metres of the vehicle and the sensitivity mode is switched "on", resulting in no LED being lit.

Full Access
Question # 10

Which of the following is an example of black-box dynamic testing?

A.

Functional Testing

B.

Code inspection

C.

Checking memory leaks for a program by executing it

D.

Coverage analysis

Full Access
Question # 11

The whole-team approach:

A.

promotes the idea that all team members should have a thorough understanding of test techniques

B.

is a consensus-based approach that engages the whole team in estimating the user stories

C.

promotes the idea that all team members should be responsible for the quality of the product

D.

is mostly adopted in projects aimed at developing safety-critical systems, as it ensures the highest level of testing independence

Full Access
Question # 12

Which of the following characterizations applies to a test tool used for the analysis of a developer's code prior to its execution?

A.

Tool support for test design and implementation.

B.

Tool support for static testing.

C.

Tool support for test execution and logging.

D.

Tool support for performance measurement and dynamic analysis.

Full Access
Question # 13

Which of the following statements about checklist-based testing is TRUE?

A.

Checklist-based testing is a technique for managing the review meeting that can be applied in those reviews where the use of checklists is mandatory, as is often the case in formal reviews.

B.

Checklist-based testing is a review technique that can be used in a formal review process where reviewers, during individual review, try to detect issues within the work product based on a checklist

C.

In checklist-based testing, using checklists at a high level of detail is more likely to produce test cases that are easier to reproduce than those using checklists at a low level of detail

D.

Checklists used in checklist-based testing should be reviewed periodically for updates as, over time, test cases designed using the same checklist may become less effective at finding defects.

Full Access
Question # 14

Which of the following exemplifies how a software bug can cause harm to a company?

A.

"Print" prints the last page twice for a file with 1000 pages

B.

The timeout on the login page of a web site is 9 minutes, while the requirement was for 10 minutes

C.

When uninstalling the application, the uninstall dialog has a spelling mistake

D.

When calculating the final price in a shopping list, the price of the last item is not added

Full Access
Question # 15

Which of the following CORRECTLY matches the roles and responsibilities in a formal review?

A.

Facilitator - Fixes defects in the work product under review

B.

Scribe - Collates potential defects found during the individual review activity

C.

Review Leader - Creates the work product under review

D.

Author - Identify potential defects in the work product under review

Full Access
Question # 16

Which of the following BEST matches the attributes with a level of testing?

I. Stubs and drivers are often used

II The lest environment should correspond to the production environment

III Finding defects is not the main focus

IV Testing can be based on use cases

V Testing is normally performed by testers

VI Testing for functional and non-functional characteristics

A.

Component - VI

Integration - IV

System -1

Acceptance - 111

B.

Component - IV

Integration -1

System - VI

Acceptance - V

C.

Component-I

Integration - V

System - II

Acceptance - IV

D.

Component - V

Integration - II

System - IV

Acceptance - VI

Full Access
Question # 17

Which of the following about typical information found within a test plan is FALSE?

A.

The need to temporarily have additional test personnel available for specific test phases and/or test activities

B.

The conditions that must be met in order for the test execution activities to be considered completed.

C.

The list of the product risks which have not been fully mitigated at the end of test execution.

D.

The conditions that must be met for part of all the planned activities to be suspended and resumed.

Full Access
Question # 18

A bank offers a savings account with various interest rates based on the current balance in the account. The balance ranges and respective interest rates are:

Up to $100.00 =2%

$100.01 to $500.00 = 4%

$500.01 to $1,000.00 = 5%

Above $1,000.00 = 7%

Using two-point boundary value analysis, which of the following sets of test inputs provides the relatively highest level of boundary coverage?

A.

$5.00.$100.00,$499.99,$1,000.00,$1,000.01

B.

$100.00. $100.01,$100.02,$500.00,$999.99

C.

$100.00, $500.00,$1,000.00,$1,000.01

D.

$5.00.$100.00,$500.00,$1,000.01

Full Access
Question # 19

Which of the following is a test-first approach, where tests that express a shared understanding from stakeholders of how the application is expected to work, are first written in business-readable language (following the Given/When/Then format), and then made executable to drive development?

A.

Test-Driven Development (TDD)

B.

Acceptance Test-Driven Development (ATDD)

C.

Behavior-Driven Development (BDD)

D.

Domain-Driven Design (DDD)

Full Access
Question # 20

For each test case to be executed, the following table specifies its dependencies and the required configuration of the test environment for running such test case:

Assume that C0NF1 is the initial configuration of the test environment Based on this assumption, which of the following is a test execution schedule that is compatible with the specified dependencies and allows minimising the number of switches between the different configurations of the test environment^

A.

TC4, TC3, TC2, TC1, TC5.

B.

TCI, TC5, TC4, TC3, TC2

C.

TC4, TC3, TC2, TC5, TC1.

D.

TC4, TC1, TC5, TC2, TC3

Full Access
Question # 21

Which of the following is a typical product risk?

A.

Poor usability of the software

B.

A problem in the code developed by a 3rd party

C.

Low quality of the configuration data, test data and tests

D.

Problem in defining the right requirements

Full Access
Question # 22

Which of the following best describes the relationship between a test progress report and a test summary report?

A.

The test report prepared during a test activity may be referred to as a test progress report, while a test report prepared at the end of a test activity may be referred to as a test summary report.

B.

The test report prepared during a test activity may be referred to as a test summary report, while a test report prepared at the end of a test activity may be referred to as a test progress report.

C.

There is no difference between a test progress report and a test summary report.

D.

Both the test progress report and the test summary report should always be generated via an automated tool.

Full Access
Question # 23

Out of the following. what is not needed to specify in defect report?

A.

Test environment details

B.

How to reproduce the defect

C.

How to fix the defect

D.

Seventy and priority

Full Access
Question # 24

Which of the following statements is TRUE?

A.

User acceptance tests are usually automated and aim to verify the acceptance criteria for user stories

B.

Acceptance criteria for user stories can include details on data definitions, for example by describing the format, allowed values, and default values for a data item

C.

Acceptance criteria for user stones should focus on positive scenarios, while negative scenarios should be excluded

D.

Tests derived from acceptance criteria for user stories are not included in any of the four testing quadrants

Full Access
Question # 25

An alphanumeric password must be between 4 and 7 characters long and must contain at least one numeric character, one capital (uppercase) letter and one lowercase letter of the alphabet.

Which one of the following sets of test cases represents the correct outcome of a two-value boundary value analysis applied to the password length? (Note: test cases are separated by a semicolon)

A.

1xA;aB11;Pq1ZZab;7iDD0a1x

B.

aB11;99rSp:5NnN10;7iDD0a1x

C.

1xB: aB11: 99rSp: 5NnN10; 4NnN10T; 44ghWn19

D.

1RhT;rSp53;3N3e10;8sBdby

Full Access
Question # 26

You are responsible for applying the correct technique for a review of the requirements document for a project to develop a new software application. You identify the reviewers and the required roles, including the meeting leader, who is the requirements document author, and a separate role for a scribe. Additionally, you decide to take a relatively informal approach to the requirements review. The goal of the review is to find defects in the requirements document, such as omissions, Inconsistencies, and duplications. Another goal of the review is to improve the software application's usability and accessibility by considering the various stakeholders' viewpoints.

Which of the following statements BEST describes this scenario?

A.

This scenario is using a pair review type and a perspective-based review technique

B.

This scenario is using a walkthrough review type and a checklist-based review technique

C.

This scenario is using a walkthrough review type and a perspective-based review technique

D.

This scenario is using a pair review type and a checklist-based review technique

Full Access
Question # 27

Match each objective to the correct test level

Objective:

A)Verifying whetherthe functionalandnon-functlonalbehaviorsof the system are as designed andspecified.

B)Verifying whetherthe functionalandnon-functlonalbehaviorsof the interfaces are as designed.

C)Verifying whetherthe functionalandnon-functionalbehaviorsof the components are as designedand specified.

D)Establishing confidence in the quality of the systemas a whole.

Test Level:

1.Component testing.

2.Integration testing.

3.System testing.

4.Acceptance testing.

A.

A3, B2. C4. D1

B.

A2, B3, Cl, D4

C.

A3. B2. C1. D4

Full Access
Question # 28

Which of the following statements about Experience Based Techniques (EBT) is correct?

A.

EBT use tests derived from the test engineers' previous experience with similar technologies.

B.

EBT is based on the ability of the test engineer to implement various testing techniques.

C.

EBT is done as a second stage of testing, after non-experienced-based testing took place.

D.

EBT require broad and deep knowledge in testing but not necessarily in the application or technological domain.

Full Access
Question # 29

Which ONE of the following statements about state transition testing is correct?

A.

The state transition diagram explicitly shows all invalid transitions.

B.

The size of the state table depends on the number of possible transitions between the states

C.

Usually it is not possible to create tests to cover ell transitions and all stales

D.

All transitions between states are explicitly shown in the state table.

Full Access
Question # 30

Which of the following is NOT a common objective of testing?

A.

Finding defects in the software

B.

Preventing defects

C.

Debugging the software to find the reason for defects

D.

Providing information on the status of the system

Full Access
Question # 31

Given the following review types and review characteristics:

a.Pair review

b.Walkthrough

c.Technical review

d.Inspection

1.Formal

2.Informal

3.Purposes include evaluating the quality of the work product under review and generating new ideas (e.g., brainstorming solutions)

4.Purposes include Improving the software product and training the review participants

Which of the following BEST matches the review type with the review characteristic?

A.

a-1. b-4, c-3. d-2

B.

a-4, b-3. c-2. d-1

C.

a-2, b-3, c-4, d-1

D.

a-2, b-4, c-3. d-1

Full Access
Question # 32

Which of the following BEST describes checklist-based testing?

A.

Checklist-based testing includes formal tests from detailed lists of test conditions, allowing much repeatability

B.

Checklist-based testing may involve a list of tests based on what is important to the user as well as an understanding of why and how software fails

C.

Checklist-based testing, while popular, provides little consistency and few guidelines concerning test case development

D.

Checklist-based testing is restricted to non-functional testing, including usability, performance, and security test

Full Access
Question # 33

A class grade application for instructors assigns letter grades based on students' numerical grades.

The letter grades for different numerical grades should be:

Above 89, up to 100 - A

Above 79, up to 89 • B

Above 69, up to 79 • C

Above 59, up to 69 - D

Below 60- F

Which of the following sets of test inputs would achieve the relatively highest equivalence partition coverage?

A.

0, 58.59,70, 80

B.

74, 79.84,85, 89

C.

79, 89.90,99, 100

D.

69, 79. 80, 89, 90

Full Access
Question # 34

Which of the following applications will be the MOST suitable for testing by Use Cases

A.

Accuracy and usability of a new Navigation system compared with previous system

B.

A billing system used to calculate monthly charge based or large number of subscribers parameters

C.

The ability of an Anti virus package to detect and quarantine a new threat

D.

Suitability and performance of a Multi media (audio video based) system to a new operating system

Full Access
Question # 35

Which sequence of stated in the answer choices is correct in accordance with the following figure depicting the life-cycle of a defect?

A.

S0->S1->S2->S3->S5->S1

B.

S0->S1->S2->S3->S5->S1->S2->S3

C.

S0->S1->S2~>S3->S4

D.

S0->S1 ->S2->S3->S5->S3->S4

Full Access
Question # 36

STION NO: 105

A requirement specifies that a certain identifier (ID) must be between 5 and 10 characters long, must contain only alphanumenc characters, and its first character must be a letter As a tester, you want to apply one-dimensional equivalence partitioning to test this ID. This means that you have to apply equivalence partitioning individually: to the length of the ID, the type of characters contained within the ID, and the type of the first character of the ID. What is the number of partitions to cover?

A.

7.

B.

6.

C.

5.

D.

3.

Full Access
Question # 37

The following chart represents metrics related to testing of a project that was competed. Indicate what is represented by tie lines A, B and the axes X.Y

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

Given the following requirement:

Requirement ID: 2 8

Requirement Description Additional Entrance Fee

Detailed Description

An additional fee of S3 is charged during the weekend, but

1) Visitors aged under 7 are not charged.

2) Visitors aged 7 to 13 inclusive get a 20% discount off the additional fee.

3) Visitors aged greater than 65 get a 50% discount off the additional fee.

Age should be an integer of 0 or above.

Weekend means Friday to Sunday inclusive.

Which of the following statements is NOT correct?

A.

Thursday is a valid input boundary value.

B.

A minimum of 6 valid test cases are derived from boundary value analysis based on input age.

C.

$3.01 is a valid output boundary value.

D.

7 and 13 are boundary values for the equivalence partition including age 10.

Full Access
Question # 39

Determining the schedule for each testing activity and test milestones for a test project, using activity estimates, available resources, and other constraints is a typical task performed during

A.

Test execution

B.

Test design.

C.

Test analysis.

D.

Test planning

Full Access
Question # 40

Which of the following lists factors That contribute to PROJECT risks?

A.

skill and staff shortages; problems in defining the right requirements, contractual issues.

B.

skill and staff shortages; software does not perform its intended functions; problems in defining the right requirements.

C.

problems in defining the right requirements; contractual issues; poor software quality characteristics.

D.

poor software quality characteristics; software does not perform its intended functions.

Full Access
Question # 41

Which statement about use case testing is true?

A.

The lest cases are designed to find defects in the data flew.

B.

The test cases are designed to be used by real users, not by professional testers

C.

The test cases are always designed by customers or end users.

D.

The test cases are designed to find defects in the process flow.

Full Access
Question # 42

Which of the following is NOT a deciding factor m determining the extent of testing required?

A.

Level of risk of the product or features

B.

Budget to do testing

C.

A particular tester involved in testing

D.

Time available to do testing

Full Access
Question # 43

The following part of a business process flow is specified; REPEAT (book a bill) UNTIL (User presses Cancel). How many test cases are necessary in order to achieve 100% branch coverage of the process flow?

A.

4

B.

1

C.

2

D.

Infinite

Full Access
Question # 44

Mark the correct sentences:

* Defects are a result of environmental conditions and are also referred to as "Failures"

* A human mistake may produce a defect

* A system mil totally fail to operate correctly when a failure exists in it

* When a defect exists in a system it may result in a failure

* Defects occur only as a result of technology changes

A.

II, IV

B.

I, II

C.

IV, V

D.

II, III, IV

Full Access
Question # 45

Which of the following statements best describes the difference between product risk and project risk in software testing?

A.

Product risk refers to the risk associated with the project's schedule, budget, and resources, while project risk refers to the risk associated with the quality and functionality of the software product.

B.

Product risk refers to the risk associated with issues such as delays in work product deliveries, inaccurate estimates, while project risk refers to the risk associated with the project's schedule, budget, and resources.

C.

Product risk and project risk are essentially the same and can be used interchangeably.

D.

Product risk refers to the risk associated with delays in elements such as work product deliveries and inaccurate estimates, while project risk refers to the risk associated with issues such as user dissatisfaction.

Full Access
Question # 46

A virtual service emulating a real third-party service and the automated test scripts (aimed at testing the system under test) that interact with that service, are test work products that are typically created during:

A.

Test monitoring and control

B.

Test implementation

C.

Test design

D.

Test analysis

Full Access
Question # 47

A system computes prices for bus tickets. The price depends on

- the passenger type (baby, child, adult, senior citizen, student, military)

- the travelling type (as single or in a group)

- the distance (zone 1. 2. 3)

- the kind of transport (ordinary, express)

Which of the following test techniques is the most appropriate one for testing the price computation?

A.

Statement coverage

B.

State transition testing

C.

Equivalence partitioning

D.

Use case testing

Full Access
Question # 48

Which of the following is correct with regards to debugging?

A.

Debugging identifies the cause of a failure

B.

Debugging is often performed by test engineers

C.

Debugging is considered part of the testing activities

D.

Debugging is intended to find as many defects as possible in the code

Full Access
Question # 49

Which of the following is an example of the absence-of-errors fallacy?

A.

Repeating the same test cases will continue to find new defects, even after dozens of executions

B.

A small number of modules contains the most defects

C.

Since testing found very few defects, the system certainly will be successful

D.

Other than trivial cases, it is not feasible to test all combinations of inputs and preconditions

Full Access
Question # 50

A Static analysis tool analyzes a given program's CONTROL FLOW among other things. Which of the following options represents the most likely outcome of the control flow analysis:

A.

Identification of unreachable code

B.

Report on adherence to the coding standards

C.

Number of comment lines

D.

Number of source code lines

Full Access
Question # 51

Which one of the following is a typical entry criteria for testing?

A.

Planned tests have been executed.

B.

Availability of testable requirements.

C.

The number of unresolved defects is within an agreed limit.

D.

The number of estimated remaining defects is sufficiently low.

Full Access
Question # 52

How can testing contribute to higher quality?

A.

Testing help to measure the quality of software.

B.

Testing ensures that remaining defects are documented.

C.

Testing removes errors in the software.

D.

Testing eliminates the risk with software.

Full Access
Question # 53

Consider the following user story about an e-commerce website's registration feature that only allows registered users to make purchases ; As a new user, I want to register to the website, so that I can start shopping online"

The following are some of the acceptance criteria defined for the user story

[a] The registration form consists of the following fields: username, email address, first name, last name, date of birth, password and repeat password.

[b] To submit the registration request, the new user must fill in all the fields of the registration form with valid values and must agree to the terms and conditions.

[c] To be valid, the email address must not be provided by free online mail services that allow to create disposable email addresses. A dedicated error message must be presented to inform the new user when an invalid address is entered.

[d] To be valid, the first name and last name must contain only alphabetic characters and must be between 2 and 80 characters long A dedicated error message must be presented to inform the new user when an invalid first name and/or the last name is entered

[e] After submitting the registration request, the new user must receive an e-mail containing the confirmation link to the e-mail address specified in the registration form

Based only on the given information, which of the following ATDD tests is MOST LIKELY to be written first?

A.

The new user enters valid values in the fields of the registration form, except for the email address, where he/she enters an e-mail address provided by a free online mail service that allow to create disposable email addresses. Then he/she is informed by the website about this issue.

B.

The new user enters valid values in the fields of the registration form, except for the first name, where he/she enters a first name with 10 characters that contains a number. Then he/she is informed by the website about this issue.

C.

The user accesses the website with a username and password, and successfully places a purchase order for five items, paying by Mastercard credit card

D.

The new user enters valid values in all the fields of the registration form, confirms to accept all the terms and conditions, submits the registration request and then receives an e-mail containing the confirmation link to the e-mail address specified in the registration form

Full Access
Question # 54

Which of the following BEST defines risk level?

A.

Risk level is determined by calculating the absolute value of the sum of all potential issues that may occur on the project

B.

Risk level is calculated by adding the probabilities of all planned risks to a project

C.

Risk level is calculated by dividing the sum of all known risks by the sum of all unknown risks

D.

Risk level is determined by the likelihood of an event happening and the impact or harm from that event

Full Access
Question # 55

A typical objective of testing is to

A.

Determine the most appropriate level of detail with which to design test cases.

B.

Verify the compliance of the test object with regulatory requirements.

C.

Plan test activities in accordance with the existing test policy and test strategy

D.

Verify the correct creation and configuration of the test environment

Full Access
Question # 56

Which of the following is the BEST reason for selecting a particular type of software development lifecycle model?

A.

The project manager's preference

B.

Tester skill level with the software development lifecycle model

C.

The project team's overall familiarity with the model

D.

The type of product being developed

Full Access
Question # 57

A test status report SHOULD:

A.

Specify the impediments to carrying out the planned test activities in the reporting period and the corresponding solutions put in place to remove them

B.

Be produced as part of test completion activities and report unmitigated product risks to support the decision whether or not to release the product

C.

Always be based on the same template within an organisation, as its structure and contents should not be affected by the audience to which the report is presented.

D.

Specify the lines of communication between testing, other lifecycle activities, and within the organisation that were chosen at the outset of the test project.

Full Access
Question # 58

Given the following examples of entry and exit criteria:

1.A defined level of code coverage has been achieved

2.The test automation tool has been installed and properly configured

3.The number of unresolved defects is within the predefined limit

4.The performance test environment has been set-up and is available

5.The user stories have proper acceptance criteria defined

6.The testing budget has been spent and the project sponsor bears the risk of not testing any further

Which of the following BEST categorizes them as entry and exit criteria:

A.

Entry criteria - 2, 4, 5 Entry criteria -1, 3, 4

B.

Entry criteria - 2, 4 Entry criteria - 2, 4, 5, 6

C.

Exit criteria -1,3,6 Exit criteria - 2, 5. 6

D.

Exit criteria -1,3,56 Exit criteria -1,3

Full Access
Question # 59

Which of the following BEST distinguishes the terms "validation" and "verification"?

A.

Verification is confirmation through the provision of objective evidence that the specified requirements have been met while validation is confirmation through the provision of objective evidence that the requirements for a specific intended use have been met

B.

Verification is confirmation through the provision of subjective evidence that the specified requirements have been met while validation is confirmation through the provision of subjective evidence that the designs for a specific intended use have been met

C.

Validation is confirmation through the provision of objective evidence that the specified requirements have been met while verification is confirmation through the provision of objective evidence that the requirements for a specific intended use have been met

D.

Validation is confirmation through the provision of subjective evidence that the specified requirements have been met while verification is confirmation through the provision of subjective evidence that the designs for a specific intended use have been met

Full Access
Question # 60

Which test approach will best fit a new project, with little documentation and high probability for bugs?

A.

Exploratory testing

B.

Requirements based testing

C.

Metric based approach

D.

Regression testing

Full Access
Question # 61

You are performing the role of tester on an Agile project. Which of the following tasks would be your responsibility?

i. Understanding, implementing, and updating the test strategy.

II. Ensuring the proper use of testing tools.

Hi. Coaching other team members in the relevant aspects of testing.

iv. Actively collaborating with developers and business stakeholders to clarify requirements, especially in terms of testability, consistency, and completeness.

v. Participating proactively in team retrospective meeting, suggesting and implementing improvements.

Select the correct answer:

A.

i, iv and v

B.

i, ii and iii

C.

i, iii and v

D.

iii. iv and v

Full Access
Question # 62

Which type of software development product can undergo static testing?

A.

Any software development product can undergo static testing, including requirements specifications, design specifications and code.

B.

Static tests should be performed on the installation and user guide documents as these documents are used by the end user.

C.

Static testing is done only on the code as part of the "code review" sessions Other documents are reviewed, but not by static testing.

D.

Static testing is done only on the requirements You need to execute the software in order to find defects in the code.

Full Access
Question # 63

A new web app aims at offering a rich user experience. As a functional tester, you have run some functional tests to verify that, before releasing the app, such app works correctly on several mobile devices, all of which are listed as supported devices within the requirements specification. These tests were performed on stable and isolated test environments where you were the only user interacting with the application. All tests passed, but in some of those tests you observed the following issue: on some mobile devices only, the response time for two web pages containing images was extremely slow.

Based only on the given information, which of the following recommendation would you follow?

A.

You should open a defect report providing detailed information on which devices and by running which tests you observed the issue

B.

The issue is related to performance efficiency, not functionality. Thus, as a functional tester, you should not open any defect report as all the functional tests passed

C.

You should not open any defect report as the problem is most likely due to poor hardware equipment on the devices where you observed the issue

D.

You should not open any defect report and inform the test manager that the devices on which you observed the issue should no longer be supported so that they will be removed from the requirements specification

Full Access
Question # 64

Consider an estimation session in which a six-member Agile team (Memb1..... Memb6) uses the planning poker technique to estimate a user story (in story points). The team members will use a set of cards with the following values: 1,2, 3,5, 8,13,21. Below is the outcome of the first round of estimation for this session:

Which of the following answers BEST describes how the estimation session should proceed?

A.

The final estimate of the user story in story points is determined by applying the three-point estimation technique with the following input values most optimistic estimate - 1, most likely estimate - 3, and most pessimistic estimate - 21

B.

Further estimation rounds should be performed until all team members will pick the card having the same value: this value will represent the final estimate of the user story in story points.

C.

The final estimate of the user story in story points is determined by calculating the average value between the most optimistic estimate of 21 story points (Memb4> and the most pessimistic estimate of 1 story point (Memb6)

D.

Memb6 and Memb4 which have produced the most pessimistic and the most optimistic estimates respectively, should explain the reasons of their choices to stimulate a discussion between all members before proceeding to another estimation round

Full Access
Question # 65

Given the following priorities and dependencies for these test cases:

SEE ATTACHMENT

Which of the following test execution schedules BEST takes into account the priorities and technical and logical dependencies?

A.

TC1 - TC3 - TC2 - TC4 - TC6 - TC5

B.

TC3 - TC4 - TC2 - TC6 - TC1 - TC5

C.

TC1 - TC3 - TC2 - TC4 - TC5 - TC6

D.

TC2 - TC4 - TC1 - TC3 - TC5 - TC6

Full Access
Question # 66

Which of the following statements about how different types of test tools support testers is true?

A.

The support offered by a test data preparation tool is often leveraged by testers to run automated regression test suites

B.

The support offered by a performance testing tool is often leveraged by testers to run load tests

C.

The support offered by a bug prediction tool is often used by testers to track the bugs they found

D.

The support offered by a continuous integration tool is often leveraged by testers to automatically generate test cases from a model

Full Access
Question # 67

Which of the following BEST describes a benefit of test automation?

A.

More subjective assessment

B.

Reduction in repetitive manual work

C.

Availability of the test automation tool vendor

D.

Negligible effort to maintain the test assets generated by the tool

Full Access
Question # 68

A company runs a pilot project for evaluation of a test automation tool. Which of the following is NOT a valid object of this pilot project?

A.

Get familiar with the functionality and options of the tool

B.

Check haw the tool fits to the existing test processes

C.

Train all testers on using the tool

D.

Decide upon standards for tool implementation

Full Access
Question # 69

Why should you choose a test technique?

A.

Because you need to match the way you test to the content of the product under test

B.

Because of the time constraints that usually accompany a test project

C.

Because this way you cover the full scope of the product's functionality

D.

Because choosing a test technique is a common practice in software testing

Full Access
Question # 70

Which of the following is a typical potential risk of using test automation tools?

A.

Reduced feedback times regarding software quality compared to manual testing.

B.

Reduced test execution limes compared to manual testing.

C.

Reduced repeatability and consistency of tests compared to manual testing

D.

Underestimation of effort required to maintain test scripts.

Full Access
Question # 71

A program got 100% decision coverage in a test. Which of the following statements is then guaranteed to be true?

A.

Every executable statement Is covered.

B.

Every output equivalence class has been tested.

C.

Every input equivalence class has been tested.

D.

The "dead" code has not been covered.

Full Access
Question # 72

For the following pseudo-code determine number of tests required for 100% statement coverage

IF Gender = Boy

If Age > 3 AND Age < 5

Shoe Size = 1

ELSE IF Age >=5 AND Age < 7

Shoe Size = 2

ENDIF

ELSE

IF Age > 3 AND Age < 5

Shoe Size = 0

ELSE IF Age >=5 AND Age < 7

Shoe Size = 1

ENDIF

ENDIF

A.

6

B.

4

C.

2

D.

6

Full Access
Question # 73

In which one of the following test techniques are test cases derived from the analysis of the software architecture?

A.

Black-box test techniques.

B.

Experience-based test techniques.

C.

Checklist-based test techniques.

D.

White-box test techniques.

Full Access
Question # 74

Which of the following statements best describes the way in which decision coverage is measured?

A.

Measured as the number of statements executed by the tests, divided by the total number of executable statements in the code.

B.

Measured as the number of lines of code executed by the tests, divided by the total number of lines of code in the test object.

C.

Measured as the number of decision outcomes executed by the tests, divided by the total number of decision outcomes in the test object.

D.

It is not possible to accurately measure decision coverage.

Full Access
Question # 75

A system has valid input numbers ranging between 1000 and 99999 (both inclusive). Which of the following inputs are a result of designing tests for all valid equivalence classes and their boundaries?

A.

999.1000.23232.99999.100000

B.

999.1000.50000.100000.100001

C.

999.100000

D.

1000,50000,99999

Full Access
Question # 76

ON NO: 94

Which ONE of the following statements does NOT describe how testing contributes to higher quality?

A.

Properly designed tests that pass reduce the level of risk in a system.

B.

The testing of software demonstrates the absence of defects.

C.

Software testing identifies defects, which can be used to improve development activities.

D.

Performing a review of the requirement specifications before implementing the system can enhance quality.

Full Access
Question # 77

The following incident report that was generated during test of a web application.

What would you suggest as the most important report improvement?

Defect detected date: 15 8.2010

Defect detected by: Joe Smith

Test level System test

Test case: Area 5/TC 98

Build version: 2011-16.2

Defect description After having filled out all required fields in screen 1, t click ENTER to continue to screen 2 Nothing happens, no system response at all.

A.

Add information about which web browser was used

B.

Add information about which developer should fix the bug

C.

Add the time stamp when the incident happened

D.

Add an impact analysis

Full Access
Question # 78

Which of the following statements is true?

A.

Functional testing focuses on what the system should do while non-functional testing on the internal structure of the system

B.

Non-functional testing includes testing of both technical and non-technical quality characteristics

C.

Testers who perform functional tests are generally expected to have more technical skills than testers who perform non-functional tests

D.

The test techniques that can be used to design white-box tests are described in the ISO/IEC 25010 standard

Full Access
Question # 79

Manager responsibilities in formal review includes ad except one of the following:

A.

Planning the review

B.

Determines if the review objectives have been met

C.

Decide on the execution of reviews

D.

Allocate time for review

Full Access
Question # 80

Which review type, also known as a “buddy check”, is commonly used in Agile development?

A.

Inspection.

B.

Walkthrough.

C.

Technical review.

D.

Informal review.

Full Access
Question # 81

Which of the following statements about test reports are TRUE?

I Test reports shall be approved by the test team.

II. Test reports shall give stakeholders information as basis for decisions.

Ill Test reports shall summarize what happened through a period of testing.

IV. Test reports shall be approved by the development team, the test team and the customer

V. Test reports shall include information about remaining risks.

A.

II, III, V

B.

I, II, IV

C.

I, III, v

D.

II, III, IV

Full Access
Question # 82

The following state transition diagram describes the functionality involved in a system using fingerprint and password authentication to log onto a system.

How many distinct states of the system are visible in the above diagram?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 83

Which of the following answers describes a reason for adopting experience-based testing techniques?

A.

Experience-based test techniques provide more systematic coverage cnteria than black-box and white-box test techniques

B.

Experience-based test techniques completely rely on the tester's past experience for designing test cases.

C.

Experience-based test techniques allow designing test cases that are usually easier to reproduce than those designed with black-box and white-box test techniques.

D.

Experience-based test techniques tend to find defects that may be difficult to find with black-box and white-box test techniques and are often useful to complement these more systematic techniques.

Full Access
Question # 84

A software application incorrectly provided customers discounts of 50% off their total purchases if the purchases exceeded S100. It was discovered through an audit that the discount should have been only 5% off these purchases. A root cause analysis uncovered that the requirements Incorrectly stated 50% instead of 5% in this scenario.

Which of the following MOST accurately reflects this scenario?

A.

The audit finding Is the root cause, the incorrect calculation of 50% Is the defect, and the Incorrect requirement Is the effect

B.

The incorrect customer discount is the effect and the reason for the requirement error is the root cause

C.

The incorrect discount is the root cause, requiring a root cause analysis which led to investigating the software code, design, and requirements

D.

A defect in the code is determined to be the root cause of the incorrect calculation

Full Access
Question # 85

During component testing of a program if 100% decision coverage is achieved, which of the following coverage criteria is also guaranteed to be 100%?

A.

100% Stale transition coverage

B.

100% Equivalence class coverage

C.

100% Boundary value coverage

D.

100% Statement coverage

Full Access
Question # 86

Consider a given test plan which, among others, contains the following three sections: "Test Scope", "Testing Communication", and "Stakeholders". The features of the test object to be tested and those excluded from the testing represent information that is:

A.

not usually included in a test plan, and therefore in the given test plan it should not be specified neither within the three sections mentioned, nor within the others

B.

usually included in a test plan and, in the given test plan, it is more likely to be specified within "Test Scope" rather than in the other two sections mentioned

C.

usually included in a test plan and, in the given test plan, it is more likely to be specified within "Testing Communication" rather than in the other two sections mentioned

D.

usually included in a test plan and, in the given test plan, it is more likely to be specified within "Stakeholders" rather than in the other two sections mentioned

Full Access