Question 1
Question
Select the correct black box testing type. Shows the connection between a given outcome and all issues that manipulate the outcome.
Answer
-
Cause-effect graphing
-
Equivalence partitioning
-
Boundary value analysis
Question 2
Question
Select the descriptions that match the Inspection error detection agenda (Choose Two)
Answer
-
Investigates program with respect to checklist of historically common programming errors
-
Focuses on error discovery, not error correction
-
Recommends that the inspection results must be kept confidential
-
Focuses on quality improvement rather than attacking the programmer
Question 3
Question
Indicate if the following statements about module testing is true or false. Only the module specifications are required while designing the module test cases.
Question 4
Question
Indicate if the given statement about usability testing is true or false:
It is a black-box testing technique.
Question 5
Question
Select the descriptions that as associated with Acceptance testing. (Choose Two)
Answer
-
It checks test cases to ensure that compatible set of options have been selected.
-
Its test cases are developed by the organization that produced the system.
-
It compares the initial requirements of the program to its end user current needs.
-
It is performed by the program's customer or end user.
Question 6
Question
What type of test is a module test?
Answer
-
Black-box
-
Functionality
-
White-box
-
Regression
Question 7
Question
Indicate if the given statements about agile testing is true or false:
It involves everyone in the process through design, implementation, and execution of the test plans.
Question 8
Question
Which type of review is considered a walkthrough?
Answer
-
Milestone review
-
Progress review
-
Peer review
-
Management review
Question 9
Question
Module testing is a process of testing the individual subprograms, subroutines, classes, or procedures in a program.
Question 10
Question
If you want your application to run without any abnormal terminations, which bug type would be ranked most important to fix?
Question 11
Question
Is the given statements about system testing is true or false. It is a process of testing the functions of the complete system or program.
Question 12
Question
What is being verified when testing the business tier?
Answer
-
That graphics are the correct size and resolution
-
That recovery can be done using current backups
-
The backend data entry and management routines
-
That transactions are completed properly
Question 13
Question
Which technique is used to evaluate anonymous programs in terms of their overall quality, maintainability, extensibility, usability, and clarity?
Answer
-
Desk checking
-
Code walkthroughs
-
Peer ratings
-
Code inspections
Question 14
Question
The presentation layer provides the user interface (or graphical user interface whichever is applicable
Question 15
Question
Selecting random users—persons who are not familiar with the program's specification, or perhaps even the industry or market for which it is intended—can uncover errors or user interface problems that might not be found by experts.
Question 16
Question
It checks whether the parameter supplied causes the method to return an incorrect Boolean value.
Answer
-
assertFalse()
-
checkArgs()
-
main()
-
primeCheck()
Question 17
Question
Which type of tester focuses exclusively on validating the interactions and behaviors that result in functionality?
Answer
-
Gray-box tester
-
White-box tester
-
Usability tester
-
Black-box tester
Question 18
Question
What information on the bug record establishes why the result was flagged as a problem?
Answer
-
The problem description
-
Steps to take to repeat the problem
-
What was expected vs. what actually happened
-
The browser/operating system being used
Question 19
Question
When testing a mobile application on a real device, manual testing is unavoidable.
Question 20
Question
Select the components of a test case. (Choose Two)
Answer
-
A description of the correct output of the program for that set of input data
-
A description of the type of testing technique used
-
A description of the input data to the program
-
A description of data processing information
Question 21
Question
Is the following statement true or false:
Network infrastructure: Verifies that the application responds appropriately to weak signals
Question 22
Question
Select the drawbacks of the brute-force scattering method. (Choose Four)
Answer
-
It is feasible on operating systems and process control programs.
-
It encourages the user to think about the problem.
-
It produces a massive amount of data to be analyzed.
-
It is based on a hit-or-miss technique.
-
It increases the cost when used in large programs.
-
It requires the user to change the program which can introduce new errors.
Question 23
Question
Based on the work of Jakob Nielsen, how many testers will collectively find 83 percent of errors during a usability test?
Question 24
Question
True or False: In white-box testing, the tester is not concerned about the internal behavior and structure of a program.
Question 25
Question
Indicate if the given statement about usability testing is true or false.
It is the same as module testing.
Question 26
Question
Which statement matches the transaction section of the business layer testing area.
Answer
-
Tests to uncover errors in transaction processing, such as credit card processing, e-mailing verification's, and so on
-
Tests to detect errors in knowledge collected from customers
-
Tests whether the application meets documented operational specifications
Question 27
Question
Indicate if given statement about presentation layer testing is true or false
It tests the website architecture to find navigational and structural errors.
Question 28
Question
Which of the following is a key principle of testing?
Answer
-
Testing does not need to be planned
-
Formal exit criteria, must be defined
-
Complete testing is not possible
-
Testing requires dependence on develoeprs
Question 29
Question
The data layer encapsulates data used by the application or that is collected from the end user.
Question 30
Question
Which test category verifies that the application responds appropriately to a weak signal?
Answer
-
Install/uninstall
-
Device interaction
-
Network infrastructure
-
Key mappings
Question 31
Question
Which human error detection process is considered relatively unproductive?
Answer
-
Code inspections
-
Peer ratings
-
Code walkthroughs
-
Desk checking
Question 32
Question
Identify the testing processes that make up the Integration test part of the development phase
Answer
-
Requirement: It specifies the cause of the program.
-
Code: It produces the code for the required program.
-
External specification: It defines the exact representation of the program to users.
-
System design: It lays down the design principles of the system.
Question 33
Question
True or False: A bug matrix is used to identify the issues that do not require a developer's attention.
Question 34
Question
Which step in the software development process translates requirements into specific objectives?
Answer
-
External specifications
-
Requirements
-
System design
-
Objectives
Question 35
Question
Which debugging method looks at a reverse execution of the program?
Question 36
Question
Which form of testing involves everyone in the process through the design, implementation, and execution of the test plan?
Question 37
Question
Indicate if the given statements about error-locating principles is true or false.
Involve a mental analysis of the information associated with the error's symptoms.
Question 38
Question
Select the description that matches the Volume test case.
Answer
-
Determines how well an end user can interact with the program
-
Checks if the program meets response and throughput requirements
-
Subjects the program to heavy loads of data
-
Ensures functionality to be implemented in the objectives
Question 39
Question
What is an advantage of bottom-up testing?
Answer
-
Driver modules are produced
-
Observation of test results is easier
-
Major flaws occur toward the top of the program
-
Skeletal programs allow demonstrations
Question 40
Question
Occurs when the number of received parameters are not equal to the number of sent arguments
Answer
-
Input/Output
-
Computation
-
Interface
-
Data declaration
-
Data reference
Question 41
Question
What plays a major role in whether users accept or reject an application?
Answer
-
Fonts, colors, and graphics
-
Database operations that meet performance goals
-
Consistent and user-friendly operations
-
Transactions that roll back correctly
Question 42
Question
In addition to finding errors, what else would a black-box tester look for when testing a program?
Answer
-
Data issues
-
Usability issues
-
Infrastructure issues
-
Stability issues
Question 43
Question
Select the statements that match the Testing debugging method.
Answer
-
It is effective in case of small applications.
-
It starts from the suspected site, and then traces in opposite direction in entire source code.
-
It provides information useful in locating a suspected error.
Question 44
Question
Identify the testing processes that make up the Installation test part of the development phase
Answer
-
System design: It lays down the design principles of the system.
-
Code: It produces the code for the required program.
-
Requirement: It specifies the cause of the program.
-
External specification: It defines the exact representation of the program to users.
Question 45
Question
What does agile testing rely on in order to facilitate the timely feedback needed for rapid development?
Question 46
Question
Sets breakpoints that causes suspension in the program so that the programmer can examine the current state of the program
Answer
-
Automated tools
-
Scatter print statements
-
Storage dump
Question 47
Question
True or False: System validation is an end-to-end process that ensures that the completed and integrated system will operate as needed in the environment for which it was intended.