Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CSQA Questions and Answers

Question # 6

Checking if the web page on a internet banking site comes up within 2 seconds is an example of:

A.

Functional Testing

B.

Structural Testing

C.

Stress Testing

D.

Performance Testing

E.

White-Box Testing

Full Access
Question # 7

____________ Listening is when the listener is performing an analysis of what the speaker said.

A.

Therapeutic

B.

Critical

C.

Comprehensive

D.

Appreciative

E.

Discriminative

Full Access
Question # 8

One of the reasons a quality baseline needs to be established is:

A.

Identify missing requirements

B.

Identify perceived quality problems

C.

Measure other organizations' quality

D.

Prepare quality audits

Full Access
Question # 9

Tactical Planning answers the question:

A.

What to do?

B.

How to do it?

C.

What objectives need to be accomplished?

D.

How IT customers will be satisfied?

E.

How customer satisfaction will be exceeded?

Full Access
Question # 10

The factors that need to be addressed during contract negotiations for software developed by an outside organization include the following, except for:

A.

Adequacy of Control

B.

Life of Contract

C.

Warranty

D.

Multi-Contractor Problem Resolution

E.

Penalties for Non-performance

Full Access
Question # 11

SEI's CMMi maturity level 5 focuses on:

A.

Quantitative Project Management

B.

Customer Satisfaction

C.

Quantitative Process Management

D.

Continuous Process Improvement

Full Access
Question # 12

Explain why risk prioritization is important and give two methods used to prioritize risk.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 13

You plan to meet with a project’s business analyst and test team lead to explain why they need to implement static testing techniques early in the product life cycle. Describe below how you plan to describe the benefits of static tests and list at least two types of static tests they should implement.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 14

Why are 'independent' test teams preferred? List three responsibilities of a Test Manager who is the leader of independent test team.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 15

The objective of process improvement is to eliminate which of the following?

A.

Individuals that make the process

B.

Root cause of problems

C.

Incorrect input of processes

D.

Process engineering staff

E.

All of the control personnel

Full Access
Question # 16

Staged models are composed of a number of distinct levels of maturity.

A.

True

B.

False

Full Access
Question # 17

Effective QA reports written to management ___________.

A.

Convey Information

B.

Change the Behavior

C.

Convey Information and Change Behavior

D.

Demonstrate the Value of QA

Full Access
Question # 18

If you want to ensure that individuals can effectively perform work processes, which activity would you implement to achieve that goal?

A.

Measurement

B.

Team Building

C.

Performance Reviews

D.

Career Development

E.

Training

Full Access
Question # 19

Which of the following is not normally included in a contract for an outside organization to develop software for your use?

A.

Why it is needed

B.

What is done

C.

When it is done

D.

Who does what

E.

Penalties for nonperformance

Full Access
Question # 20

Which of the criteria should be followed to select a process model such as CMMI or ISO?

A.

Applicability of the model to the organization’s goals and objectives

B.

Management commitment

C.

Need for baseline assessments

D.

Need for measurable goals and objectives

E.

All of the above

Full Access
Question # 21

When maturing the management process, movement will be from:

A.

Product Focus to Process Focus

B.

Process Focus to Product Focus

C.

Team Focus to Product Focus

Full Access
Question # 22

If you use the PDCA cycle for managing processes, which activity is associated with the planning component?

A.

Process Definition

B.

Process Mapping

C.

Process Measurement

D.

Process Improvement

E.

Process Controls

Full Access
Question # 23

Your manager describes his / her desires and intents concerning a process to you. The manager is describing the:

A.

Policy

B.

Standard

C.

Procedure

Full Access
Question # 24

Which layer of management is the weakest link in a successful quality management program?

A.

Top

B.

Quality Champion

C.

Middle

Full Access
Question # 25

The process of implementing a new or improved approach is called:

A.

Change Process

B.

Improvement Process

C.

Deployment Process

D.

Definition Process

Full Access
Question # 26

The optimal number of task force members is:

A.

1 - 3 members

B.

3 - 8 members

C.

8 - 10 members

D.

No limit

Full Access
Question # 27

Example of a test activity to be performed during Maintenance Phase is:

A.

Determine Test Strategy

B.

Modify and Retest

C.

Determine Adequacy of Design

D.

Design Phase Activities

Full Access
Question # 28

Identify the correct sequence of the 'Management Cycle'.

A.

Plan-Do-Act-Check

B.

Check-Act-Plan-Do

C.

Plan-Check-Do-Act

D.

Plan-Do-Check-Act

Full Access
Question # 29

Capability Maturity Model(s) (CMMs) are defined and managed by:

A.

Software Engineering Institute

B.

Malcolm Baldrige Organization

C.

International Standards Organization

D.

Quality Assurance Institute

Full Access
Question # 30

The first step in the Complaint-Resolution Process is:

A.

Gather detailed supporting information

B.

Establish an action plan

C.

Judge the complaints validity

D.

Get on the customer's wavelength

Full Access
Question # 31

Which is the best positioning of a quality manager within the IT organization?

A.

Senior IT Manager

B.

Manager of Systems Programming

C.

Manager of Computer Operations

D.

Outside of the IT Function

Full Access
Question # 32

After establishing the team for conducting security baseline, the first step should be to:

A.

Set up the process

B.

Set the measures

C.

Set the requirements and goals

Full Access
Question # 33

The primary responsibility of a quality program, from a consumer's standpoint, is that the product should be:

A.

Gold plated

B.

Is completed on time

C.

Fit for use by the end user or consumer

D.

Does not exceed budgeted costs

Full Access
Question # 34

For maturing the management process at Level 3, which of the following should be in focus?

A.

Employee Suggestion System

B.

End-user Feedback System

C.

Employee Surveys

D.

Quality Planning

E.

None of the above

Full Access
Question # 35

Tracking the status of each requirement throughout the development and test phases is called:

A.

Requirements Checking

B.

Requirements Verification

C.

In-Process Review

D.

Requirements Tracing

E.

Phase-End Review

Full Access
Question # 36

The two common types of Matrixes are:

A.

L-Type and Y-Type

B.

T-Type and X-Type

C.

L-Type and T-Type

D.

Y-Type and X-Type

Full Access
Question # 37

A process is a vehicle of communication, specifying the methods used to produce:

A.

A Service

B.

A Product

C.

Both Product and Service

D.

None of the above

Full Access
Question # 38

Which one of the following is NOT a responsibility of management committees (or process management committees)?

A.

Developing quality charter

B.

Deploying quality management practices

C.

Establish teams or work groups

D.

Defining mission and goals

Full Access
Question # 39

An objective baseline relies on judgment being applied in making the measure.

A.

True

B.

False

Full Access
Question # 40

The stakeholders of security system should be trained on security data collection methods and:

A.

Organization mission

B.

Security baseline program and charter

C.

Requirements

Full Access
Question # 41

If the data in a pie chart represent five components of a total population and four of the five sections of the pie chart represent 15%, 25%, 20%, and 20% of the total population, what percentage of the total population is the fifth section?

A.

100%

B.

40%

C.

20%

D.

5%

E.

None of the above

Full Access
Question # 42

Planning for system test process begins when:

A.

After coding phase

B.

At start of system testing phase

C.

At project start

D.

After design phase

Full Access
Question # 43

The theory of levels of maturity is that organizations can skip a level if business needs require them to be at a higher maturity level.

A.

True

B.

False

Full Access
Question # 44

In which company was the concept known as "Just in Time" first implemented?

A.

Toyota

B.

Motorola

C.

Honda

D.

Microsoft

Full Access
Question # 45

The check sheet is used to record data gathered over a period of time to determine frequency of an event.

A.

True

B.

False

Full Access
Question # 46

Requirements reviews, code walkthroughs, and inspections are examples of:

A.

Verification

B.

Validation

Full Access
Question # 47

If you were to download a software package, which had been developed and placed on the internet for general usage, the one thing you could not control is:

A.

Ability to test the software

B.

Defining the requirements

C.

Determining how the software will be used

D.

Training IT staff in how to use the software

E.

Deciding not to use the software

Full Access
Question # 48

-- Exhibit –

-- Exhibit --

The diagram is called a:

A.

Run Chart

B.

Pie Chart

C.

Bar Chart

D.

Pareto Chart

E.

Control Chart

Full Access
Question # 49

Audits can be performed by the individuals involved in conducting the work.

A.

True

B.

False

Full Access
Question # 50

Which of the following is NOT normally considered one of the questions that must be answered in performing quality planning?

A.

Where are we?

B.

Where do we want to go?

C.

How are we going to get there?

D.

When will it be done?

E.

If it fails, who is responsible?

Full Access
Question # 51

You have been appointed the Information Security Manager of the organization. List and give details the three steps for adequate 'security awareness program'.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 52

Explain how in QFD the customer and quality are at the foundation for downstream product design-and-development decisions.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 53

Good quality management principles state that any organization committed to quality should have a IT Quality Plan in place. What are five key points that the IT Quality Plan should include?

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 54

As more of an organization’s business goes online the need for security increases. As a quality assurance manager, your IT Director knows that security is comprised of technical controls and management controls. The technical controls such as virus protecting software are very complex and its effectiveness would be difficult to evaluate by the average quality assurance professional. However, quality assurance professionals should be able to evaluate the management controls over security. To accomplish this, your IT Director has asked you to develop a ten question checklist that could be used to determine whether or not adequate management security controls exist over online software systems.

List below the ten questions you would put on that checklist.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 55

Businesses often make the mistake of developing both a business plan and a quality plan but failing to integrate them. Explain what it is meant to integrate the business plan and quality plan and how this improves the overall quality of the IT products and/or services.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 56

Approximately ten years ago, your IT department organized a process management committee. The committee determined what processes were needed, wrote those processes, incorporated them into the process inventory, and delivered them to the appropriate staff for implementation. After ten years, it is generally agreed that the process improvement program is not working. The IT staff does not follow many of the processes and management rarely enforces compliance to processes. You, as the Quality Assurance Manager, have been asked to develop a new process improvement program.

Indicate what you believe is the responsibility of the following groups in implementing an effective standards program.

1. IT Management

2. Process Management Committee

3. Users of the Processes

4. Quality Assurance Manager

5. Quality Control Function

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 57

The “cost of quality” (COQ) is not the price of creating a quality product or service. It is the cost of NOT creating a quality product or service. Name and describe the three COQ categories. Provide one example of a cost associated with each COQ category.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 58

Define measure and metric. Give two examples of a measure and two examples of a metric.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 59

There are four main "testing stages" in a structured software development process. Name the four testing stages and describe what the primary purpose of that test stage is.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 60

When developing a contract for software developed by an outside organization, one concern that should be addressed in the contract is "foreign attachments". Describe what is meant by foreign attachments and why it is important (assume the project will have foreign attachments) to be included in the software contract.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 61

One of the tools used by many quality assurance functions is the cause-and-effect diagram. This diagram can be used to describe the attributes that drive the accomplishment of an objective. Assume that your IT organization had an objective to achieve high customer satisfaction. Identify what you believe are the six causes that either cause high customer satisfaction to occur or the lack of these attributes results in poor customer satisfaction, describe each cause, and give an example of each type of cause. (NOTE: You do NOT need to draw the diagram.)

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 62

Quality cannot be delegated.

A.

True

B.

False

Full Access
Question # 63

The definition for Reliability is:

A.

The amount of computing resources and code required by a program to perform a function.

B.

Extent to which access to software or data by unauthorized persons can be controlled.

C.

Effort required learning, operating, preparing input, and interpreting output of a program.

D.

Effort required locating and fixing an error in an operational program.

E.

None of the above

Full Access
Question # 64

The plan of organization in methods and procedures adopted by management to ensure that resource use is consistent with laws, regulations, and policies; that resources are safeguarded against waste, loss, and misuse; and that reliable data are obtained, maintained, and fairly disclosed in reports. The previous statement is the definition of:

A.

Auditing

B.

Internal Control

C.

Infrastructure

D.

Truth in Reporting

E.

Risk Analysis

Full Access
Question # 65

Process improvement is most effective when __________ are involved in improving the process.

A.

Users of the Process

B.

Quality Assurance Function

C.

Staff

D.

Management

Full Access
Question # 66

Successful IT security programs consist of all the following EXCEPT:

A.

Developing an IT security policy that reflects business needs

B.

Informing users of their IT security responsibilities

C.

Establishing processes for monitoring and reviewing the program

D.

Gathering data on violations only

Full Access
Question # 67

Within ISO 9001, Resource Management includes:

A.

Only Human Resources

B.

Only Work Environment

C.

Human and Infrastructure Resources

D.

Human, Infrastructure, Work Environment, and Facilities

Full Access
Question # 68

A measure can be reliable, but invalid. An unreliable measure cannot be valid.

A.

True

B.

False

Full Access
Question # 69

Which of the following is NOT a QFD vertical deployment?

A.

Technology Deployment

B.

Reliability Deployment

C.

Customer Deployment

D.

Cost and Schedule Deployment

Full Access
Question # 70

A "task force" is a cross-functional group organized for a specific purpose. Task force management principles include:

A.

Task force leader should be an expert in leading groups

B.

Task force should be organized for multiple purposes

C.

Task force needs a clear description of what is to be addressed

D.

All of the above

E.

A and C above

Full Access
Question # 71

____________ provides teams an opportunity to reach high-quality decisions with total team commitment.

A.

Consensus

B.

Compatibility

C.

Agreement

Full Access
Question # 72

At a minimum, the acceptance test for contracted software should validate:

A.

The documentation is consistent with the software execution

B.

The documentation is understandable

C.

Users will be adequately trained in the software

D.

It is operable within the operational constraints of the organization

E.

All of the above

Full Access
Question # 73

Which of the following is NOT an example of Programmed Controls?

A.

A Control Total

B.

A Hash Total

C.

Logic Test

D.

Limit Checks

Full Access
Question # 74

There are five levels of ISO Process Capability.

A.

True

B.

False

Full Access
Question # 75

Describe various ways of measuring a process, with examples.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 76

Define what “force-field analysis” is, and describe the steps a team would use to employ force-field analysis.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 77

It is generally agreed that people are the key to providing an adequate and appropriate level of security. One of the most effective methods for involving people in security is:

A.

Write a security policy

B.

Conduct security awareness training

C.

Evaluate people on following security procedures

D.

Write detailed security procedures

E.

Develop security response programs

Full Access
Question # 78

Which of the following three questions would NOT be answered by establishing a security baseline?

A.

What are we doing about computer security?

B.

How effective is our computer security program?

C.

Who is responsible for software system security?

Full Access
Question # 79

As the type of product changes on the process maturity continuum, the work processes also change.

A.

True

B.

False

Full Access
Question # 80

Organizations use many ways to determine the size of a program. Which of the following methods for measuring the size of a program can be used before the coding process is complete?

A.

Lines of code

B.

Programmer hours expended to write the code

C.

Function points

D.

Cyclomatic complexity

Full Access
Question # 81

If you acquired COTS software and were attending a demonstration of that software, what aspects of that software would you want to observe during the demonstration?

A.

Understandability

B.

Clarity of Communication

C.

Functionality of the Software

D.

Effectiveness of Help Routines

E.

All the above

Full Access
Question # 82

Which one of the following is NOT one of the change control procedures?

A.

Proposed change should be formally approved

B.

Developers should make the program changes.

C.

An independent person, other than the person who made the change, should test the final revised program.

D.

Developer should provide access rights for the change in configuration management tool.

E.

The documentation system should be updated with all change sheets or change registers

Full Access
Question # 83

What is the risk that an organization faces if management does not take action to alter the risk's likelihood or impact?

A.

Risk Management

B.

Risk Appetite

C.

Enterprise Risk Management

D.

Residual Risk

E.

Inherent Risk

Full Access
Question # 84

The development of the approach for process deployment is much harder than the actual deployment of the process.

A.

True

B.

False

Full Access
Question # 85

Process inventories can be developed by:

A.

Referencing existing manuals

B.

Conduct affinity group sessions

C.

Survey employees

D.

All of the above

E.

A and C above

Full Access
Question # 86

These five components (environment, risk assessment, control activities, information communication, and monitoring) are associated with which of the following control models:

A.

COSO Internal Control Framework Model

B.

ISO Model

C.

Malcolm Baldrige National Quality Award Model

D.

Enterprise Risk and Management Model

E.

CobiT Model

Full Access
Question # 87

Which of the following would be considered an important prerequisite to quality planning?

A.

Establishing a Quality Assurance Function

B.

Defining the IT Vision, Mission, and Goals

C.

Defining the Quality Assurance Mission and Goals

D.

Adopting the Six Sigma Concept

E.

Calculating Cost-of-Quality for the IT Organization

Full Access
Question # 88

Which of the following activities should occur before processes are defined to ensure that the most critical processes are defined first.

A.

Do

B.

Design

C.

Implementation

D.

Check

E.

None of the above

Full Access
Question # 89

Branch testing technique is included in which of the following test data categories?

A.

Functional

B.

Structural

C.

Error Oriented

Full Access
Question # 90

The rules used to evaluate products and identify non-conformance are:

A.

Audits

B.

Policies

C.

Standards

D.

Templates

Full Access
Question # 91

Which category of control methods is the most acceptable to the individual?

A.

Automatic

B.

Auditors

C.

Peer Reviews

D.

Supervisory

E.

Third Party

Full Access
Question # 92

Which of the following is not one of the four major purposes of recording defects?

A.

To ensure the defect is corrected

B.

To determine who made the defect

C.

To report the status of the application

D.

To gather statistics used to develop defect expectations and future applications

E.

To improve the software development process

Full Access
Question # 93

Which of the following Quality Management principle(s) are incorporated into the ISO 9001 standard?

A.

System approach to management

B.

Process approach

C.

Mutually beneficial supplier relationships

D.

Factual approach decision making

E.

All of the above

Full Access
Question # 94

What should post-implementation audits NOT be used for?

A.

Determine if system objectives were met

B.

Determine if standards were followed

C.

Determine who is to blame for project problems

D.

Determine if IT quality objectives were achieved

Full Access
Question # 95

Internal control systems have two components. The first is_____________ ,and the second is the __________ within an individual business application

A.

Environmental Controls, Transaction Processing Controls

B.

Transaction Processing Controls, Environmental Controls

C.

General Control, Environmental Control

D.

Environmental Control, General Control

Full Access