ISTQB- All Chapters Exam17

40 Questions

Settings
ISTQB- All Chapters Exam17

.


Questions and Answers
  • 1. 
    Which of the following are triggers for maintenance testing? 1. The period of time since last regression testing a system 2. New operating system installations 3. Changes in corporate policies and government regulations 4. Converting a legacy system to a software package 5. Developing a new software application  Select one:
    • A. 

      2, 3, 4, and 5

    • B. 

      1, 2, 3, and 4

    • C. 

      2, 3, and 4

    • D. 

      2, 3, and 5

  • 2. 
    Regression testing means: 
    • A. 

      Testing of a previously tested program to ensure that defects have not been introduced or uncovered due to program modifications

    • B. 

      Going back and re-executing a previous test level when defects are found() For example, testing the design when coding errors are found()

    • C. 

      Testing with respect to user needs, requirements, and business processes to determine whether the system meets its acceptance criteria

    • D. 

      Testing to determine the system's or component's compliance to standards, regulations, or conventions

  • 3. 
    An impact analysis after maintenance to an existing system evaluates: Select one:
    • A. 

      The skills and knowledge of testers to perform regression testing

    • B. 

      Different test design techniques to use for re-testing after a change

    • C. 

      How changes to a system might affect the unchanged areas of the system

    • D. 

      How long a legacy system can remain operational and not need replacement

  • 4. 
    Risk is generally expressed in the two dimensions of: Select one:
    • A. 

      Impact and likelihood

    • B. 

      User loss and organizational loss

    • C. 

      Anticipated loss and mitigation cost

    • D. 

      Probability and possibility

  • 5. 
    Which of the following is a product risk? Select one:
    • A. 

      Poor system reliability

    • B. 

      Poor communication between developers and testers

    • C. 

      Poor quality of test data

    • D. 

      Lack of needed tester training

  • 6. 
    Which of the following is a project risk?  Select one:
    • A. 

      System too costly to operate

    • B. 

      Skill and/or staff shortage

    • C. 

      Poor system performance

    • D. 

      Vital function not implemented

  • 7. 
    Which of the following is NOT a part of the risk management process? Select one:
    • A. 

      Controlling and mitigating risks

    • B. 

      Identifying risks

    • C. 

      Comparing identified risks to actual occurrences

    • D. 

      Prioritizing risks

  • 8. 
    The test basis is: Select one:
    • A. 

      The formal, written requirements document

    • B. 

      The set of all test cases, test procedures, input data, and expected results

    • C. 

      All documents and sources from which the requirements of a system can be inferred

    • D. 

      Another name for the test plan

  • 9. 
    Test implementation and execution do NOT include the following task: Select one:
    • A. 

      Exploring the system based on the tester's experience

    • B. 

      Analyzing the test basis

    • C. 

      Logging test results in chronological order

    • D. 

      Creating test data

  • 10. 
    A test plan should include all of the following EXCEPT Select one:
    • A. 

      Criteria for when to stop testing

    • B. 

      Test design techniques to employ

    • C. 

      Results from performing a set of test cases

    • D. 

      Risks and contingencies

  • 11. 
    Among other tasks during test closure, testers: Select one:
    • A. 

      Gather together and save all the key artifacts from the testing project

    • B. 

      Close the incident reports after defects are corrected

    • C. 

      Complete and turn in test design documents

    • D. 

      Destroy evidence of bugs that were fixed before releasing the software

  • 12. 
    Exit criteria for stopping testing should be initially established Select one:
    • A. 

      During test planning activities

    • B. 

      After evaluating the list of remaining defects in the system

    • C. 

      After the system is ready for execution

    • D. 

      Before recommending releasing the system into operational use

  • 13. 
    When reporting defects, testers should: Select one:
    • A. 

      Describe the defect and its effects in neutral, factual terms to avoid criticizing the developer personally

    • B. 

      Not only describe the defect but also suggest a correction to the code to speed the defect’s correction

    • C. 

      Describe the defect and its effects as negatively as possible to get the developers attention

    • D. 

      Describe the defect as briefly as possible to maximize their time finding other defects

  • 14. 
    Select the statement that best describes the common differences between tester and developer mindsets: Select one:
    • A. 

      Developers tend to test what they did, and testers tend to test against requirements

    • B. 

      Developers are more skilled than testers

    • C. 

      Developers write code, and testers check it

    • D. 

      Developers and testers rarely if ever work well together

  • 15. 
    The testing approach with the least independence is: Select one:
    • A. 

      Having another developer on the same team write the tests

    • B. 

      Having a tester on an independent team write the tests

    • C. 

      Having the users write the tests

    • D. 

      Having the developer write tests for his own code

  • 16. 
    • A. 

      Every method you use to find bugs is limited by your knowledge and experience

    • B. 

      Every method you use to find bugs works according to the 80-20 rule: 80 percent of the bugs will be found in 20 percent of the code

    • C. 

      Every method you use to find bugs finds fewer than the methods you used before

    • D. 

      Every method you use to find bugs leaves other bugs against which those tests are ineffective

  • 17. 
    In If a test suite is executed and anomalies (unexpected results) are found, it could mean: 1.No further investigation is needed 2 The test cases were poorly designed 3 Software defects are in the system 4 The tests were executed improperly
    • A. 

      1 and 2 are true; 3 and 4 are false

    • B. 

      2 and 3 are true; 1 and 4 are false

    • C. 

      2, 3, and 4 are true; 1 is false

    • D. 

      1, 2, and 3 are true; 4 is false

  • 18. 
    The "Defects Cluster" principle applied to software testing means:
    • A. 

      80% of all defects will be found by testers and 20% will be found by users

    • B. 

      A small number of defects usually ruins the customer's view of the system

    • C. 

      Most defects are scattered uniformly throughout the system

    • D. 

      A large number of defects often occur in a few modules of a system

  • 19. 
    Which of these is NOT an expected benefit of testers participating early in a development project?
    • A. 

      Testers can find all the defects before a system is released

    • B. 

      By participating in high-level design reviews, testers can better plan and schedule test resource needs

    • C. 

      Testers can recommend how to make the system easier to test

    • D. 

      Because testers have to think about how to test a function of the system, they can help identify ambiguous requirements specifications

  • 20. 
    Mistakes made in design specifications often result in defects and rework in:
    • A. 

      Requirements specifications

    • B. 

      Designs and code

    • C. 

      Hardware and operating systems

    • D. 

      Testware

  • 21. 
    In software testing we use the word “defect” in a very precise way. A defect is:
    • A. 

      A flaw in a component or system that can cause the component or system to fail to perform its required function

    • B. 

      The deviation of the component or system from its expected delivery, service, or result

    • C. 

      A human action that produces an incorrect result

    • D. 

      All of the above

  • 22. 
    Software defects arise because of:
    • A. 

      Mistakes in the software requirements or specification

    • B. 

      Poor coding practices

    • C. 

      Extremely tight schedules

    • D. 

      All of the above

  • 23. 
    Which of the following is NOT a good reason to test software?
    • A. 

      Show that the software works as expected

    • B. 

      Prove that the software is perfect

    • C. 

      Find faults in a system

    • D. 

      Prevent errors

  • 24. 
    During system testing phase of a word processor, a tester finds that on opening a file from a particular set of files ,which are part of a critical workflow, the word processor crashes .which of the following is the next step the tester should prior to recording the deviation?
    • A. 

      Send an email to the developers and not report the bug

    • B. 

      Report the bug as is without any further action

    • C. 

      Try to identify the code fragment causing the problem

    • D. 

      Try to recreate the incident before reporting

  • 25. 
    Test planning has which of the following major tasks? i. Determining the scope and risks, and identifying the objectives of testing. ii. Determining the test approach (techniques, test items, coverage, identifying and interfacing the teams involved in testing , testware) iii. Reviewing the Test Basis (such as requirements, architecture, design, interface) iv. Determining the exit criteria()
    • A. 

      I,ii,iv are true and iii is false

    • B. 

      I,,iv are true and ii is false

    • C. 

      I,ii are true and iii,iv are false

    • D. 

      Ii,iii,iv are true and i is false

  • 26. 
    Which of the following processes is related to ensuring the integrity of the testware?
    • A. 

      Project management

    • B. 

      Build release

    • C. 

      Configuration management.

    • D. 

      Test automation.

  • 27. 
    Which of the following lists factors that contribute to PROJECT risks?
    • A. 

      Poor software quality characteristics, software does not perform its intended functions

    • B. 

      Skill and staff shortages; software does not perform its intended functions, Problems in defining the right requirements

    • C. 

      Skill and staff shortages, Problems in defining the right requirements; contractual issues

    • D. 

      Problems in defining the right requirements; contractual issues; Poor software quality characteristics.

  • 28. 
    The following open incident report provided? Date:01.01.01 Description : When pressing the stop button the application status remain in “ Attention” instead of “Ready”. Severity: High Life cycle integration Which of the following details are missing in the incident report? i. Identification or configuration of the application. ii.The name of the developer. iii. Recommendations of the developer. iv. The actions and conditions that came before the pressing of the button.
    • A. 

      I,ii

    • B. 

      Ii,iii

    • C. 

      I,iv

    • D. 

      Iv

  • 29. 
    • A. 

      The total number of combinations of valid equivalence classes of age and gender is 8

    • B. 

      There are two invalid equivalence classes for the age input parameter

    • C. 

      All valid equivalence classes could be covered with 6 test cases

    • D. 

      All combinations of valid equivalence classes could be covered with 4 test cases

  • 30. 
    ST is a software Testing organization which utilizes a testing knowledge basis. Access to ST knowledge base can be either full or limited. Access level is determined based on ST certification and testing experience as follows: 1. If ST certified, with less than 5 years testing experience - allow limited access 2. If ST certified, 5 - 10 years of testing experience - allow full access 3. If not ST certified with 5 - 10 years of testing experience - allow limited access What would be the results for : A - ST certified, 12 years of testing experience B - Not ST certified, 7 years of testing experience C - Not ST certified, 3 years of testing experience Select one:
    • A. 

      A-unknown B-limited access C-unknown

    • B. 

      A-Full access B-Limited access C-unknown

    • C. 

      A-unknown B-Full access C-unknown

    • D. 

      A-Full access B-limited access C-limited access

  • 31. 
    • A. 

      100% statement coverage has been achieved but 100% decision coverage has not been achieved

    • B. 

      100% decision coverage has been achieved but 100% statement coverage has not been achieved

    • C. 

      100% statement coverage and 100% branch coverage have been achieved

    • D. 

      100% statement and 100% decision coverage have been achieved

  • 32. 
    Which of the following are correct tasks during ‘Test analysis and design’? I. Designing and prioritizing test cases II.Identifying any required infrastructure and tools III.Reviewing the test basis. IV. Creating test data and preparing test harmness V. Writing automated test scripts.
    • A. 

      I,II,III

    • B. 

      I,II,III,IV

    • C. 

      I,II

    • D. 

      II,III,IV,V

  • 33. 
    • A. 

      Statement coverage 4,Decision coverage 5

    • B. 

      Statement Coverage 3, Decision Coverage 4

    • C. 

      Statement Coverage 4, Decision Coverage 4

    • D. 

      Statement Coverage 4, Decision Coverage 3

  • 34. 
    Consider the code fragment given below. Input a; If(a>100) { a=a-100; if(a>50) { a=a-50; } } else if (a<100) { Print “ Invalid Input”; } Which answer choice would be correct if this program is executed for a=200, a=110, a=0, and a=50?
    • A. 

      100% statement coverage has been achieved but 100% decision coverage has not been achieved.

    • B. 

      100% decision coverage has been achieved but 100% statement coverage has not been achieved.

    • C. 

      100% statement coverage and 100% branch coverage have been achieved.

    • D. 

      100% statement and 100% decision coverage have been achieved

  • 35. 
    • A. 

      7 and 13 are boundary values for the equivalence partition including age 10.

    • B. 

      $3.01 is a valid output boundary value.

    • C. 

      Thursday is a valid input boundary value.

    • D. 

      A minimum of 6 valid test cases are derived from boundary value analysis based on input age.

  • 36. 
    Which of the following application will be Most suitable for testing by Use Cases?
    • A. 

      Suitability and performance of a Multi media (audio video based) system to a new operating system

    • B. 

      The ability of an Anti virus package to detect and quarantine a new threat

    • C. 

      A billing system used to calculate monthly charge based on large number of subscribers parameters.

    • D. 

      Accuracy usability of a new Navigation system compared with previous system.

  • 37. 
    A Software Company decided to buy a commercial application for its accounting operations.As part of the Evaluation process,the company decided to assemble a team to test a ..................... Which team would be the most suitable for this project?
    • A. 

      A team of users from the accounting department, and have them test the application

    • B. 

      Outsource the testing to external company that specializes in accounting software testing.

    • C. 

      A team with a mix of software testers and experts from the accounting department.

  • 38. 
    Consider the following excerpt from a defect report: “To recreate the failure we used test file TST_01_16 .dat, which is available in the common shared folder” Which incident report objective does this except satisfy?
    • A. 

      Provides developers with information to isolate the failure

    • B. 

      Provides test leaders with information to report test progress

    • C. 

      Provides ideas for test process improvement

    • D. 

      Does not belong in an incident report.

  • 39. 
    Exit Criteria may consist of i. Thoroughness measures , such as coverage of code, functionality or risk ii. Estimates of Defect density or reliability measures. iii. Residual risk such as defects not fixed or lack of test coverage in certain areas iv. Verifying the Test Environment.
    • A. 

      Iv is correct and i,ii,iii are incorrect.

    • B. 

      I,ii,iii is correct and iv is incorrect

    • C. 

      ii is correct and i,ii,iii are incorrect

    • D. 

      Iii and iv are correct and i,ii are incorrect

  • 40. 
    Which of the following are valid justifications for developers testing their own code during unit testing: i. Their lack of independence is mitigated by independent testing during system and acceptance testing. ii. A person with a good understanding of the code can find more defects more quickly using white-box techniques. iii. Developers have a better understanding of the requirements than testers. iv. Testers write unnecessary incident reports because they find minor differences between the way in which the system behaves and the way in which it is specified to work. Select one:
    • A. 

      I and ii

    • B. 

      Iii and iv

    • C. 

      I and iv

    • D. 

      ii and iii