CSTE Certficiation question dumps on Software testing continued.
65. Compatibility
testing for products involves all the following EXCEPT
51. Check for
defects in process for the primary aim of correcting or establishing new
process. This is
Both QA & QC
QC - (Correct Defect)
QA - (Establish process)
None of the listed options
52. Which of the
following are the important elements of the control environment?
Ethical Values
Integrity Only
Integrity
Both Integrity & ethical values( Ans)
53. Testers
implement the step-by-step method followed to ensure that standards are
met. This method is called as _____________
Coaching
Condition coverage
Completeness
None of the listed options
(Note:
Ans is Procedure)
54. Which
strategies are used to quickly find cause of defects?
Writing code to check the validity of system
Instrumenting code to trap state of system when anamalous condition occur
Analyze reported defects
All of the listed options
55. Expand the
term COTS
Commerical Off The Shelf Software
Continuity of the software system
Continuity of the Shell software
Commercial of the system software
56. With thorough
testing it is possible to remove defects from a program prior to delivery to
customer (T/F). True
57. Which one of
the following is the correct definition for procedure ?
The measure used to evaluate products and identify nonconformance. The
basis upon which adherence to policies is measured.
Policies provide direction, standards are the rules of measures
managerial desired and intents concerning either process or products
The step-by-step method that ensure that standards are met.
58.
_________________ testing verifies all the performance criteria have been
achieved when the system is placed into production.
System testing
Compliance testing
User acceptance testing
Security testing
59. To log
incidents which of the following is used?
Test log
Test script
Defect tracking system
User report
60 Effectiveness
is doing things right and efficiency is doing the right things (T/F). False
61. Testing
___________ specified the type of test plan, recommended tools and techniques
and type of documentation during testing phase.
Methodology
Process
Standards
Strategy
62. Following
lead to improper use of technology EXCEPT
Improper skill
Detailed analysis of the technology
Early use of new software technology
Early use of new hardware technology
63. ALE
Estimation stands for _____________
Annual loss expectation
Actual loss expectation
Annual loss estimation
Actual loss estimation
64. Pareto voting
is used in conjunction with
Cause and effect(Fishbone)
Vital few
80-20
Statistical process control
Functional and non-functional compatibility
Certified and supported client environments
High and low level sanity testing
Client and Server side compatability
66.
Guidelines to writing the test plans are EXCEPT
Calculate
the planning effort
Finish early
Start early
Spend the time to do a complete test plan
67. Test team
should investigate the following characteristics in order to evaluate the potential magnitude of
the risk EXCEPT
Identify the components for the system
Asses the severity of potential failures
Evaluate contigency plans for this system and activities
Build the test plan
68. Which of the following is NOT
a test factor?
Portability
Compliance
Continuity of processing
Functionality
None of the listed options
69. The test
design details which of the following
Sequence and increments of code delivery
State of the application at the start of testing
Availability of test equipment
The types of test that must be conducted
70. Following are
the most effective way of communicating moral guidance EXCEPT
Written code of conduct
Lead by examples
CMM & ISO Standards
Verbal communication
71. Which one of
the following is not a valid step to collect Benchmark data?
Analysis Phase
Integration Phase
Construction Phase
Planning Phase
72. Which of the
following statement is correct?
The control environment is established by the highest levels of management and
works upward through the organization
The control environment is established by the middle managentss and work
downward through the organization
The control environment is established by the highest levels of management
and works downward through the organization
The control environment is established by the tester and works downward through
the organization
73. The primary
goal of defect management is
to minimize the impact of defects
to prevent defects
to find defect as quickly as possible
All the listed options
73. Which among
the following is the quantitative measure of the current level of performance
Affinity diagram
Pareto analysis
Benchmarking
Baseline
74.Regression
test level best suites for which type of transaction?
Multiple transaction single terminal
Single transaction multiple terminal
Single transaction single terminal
Multiple transaction multiple terminal
75. During software acceptance, the testing technique that is
relied upon for more accurate results(than any other testing technique listed
below is______________
Black box
White box
Incremental
Thread
76. Testing for the existence or
effectiveness of programmed controls required using __________________
Complex data
Invalid data
Redundant data
Valid data
77. Which of the
following factor assures that data is processed in accordance with the intents
of management for processing of transactions?
Service Levels
Authorization
Maintainability
Access control
78. The objective
in Test design is to _____________
Minimize test execution cost
defect as many defects as possible
minimize test maintenance costs
all the listed options
79.
Severity is one which determines the order in which defects should be fixed
(T/F). False
80. Steps
involved in defect discovery are ________,______________and _____________
Acknowledge, Find , Report
Acknowledge, Find , Report
Find, Report, Acknowledge
Find, Acknowledge, Report
81. Tools
for documenting defects as they are found and for tracking their status is
Defect tracking tools
Status Report
Test log
82. The best
reason for using independent software testing teams is that_______
quality of software is given as much consideration as the project
budget and timeline
software developers do not need to do any testing
testers do not get involved with the project until testing begins
stranger will test the software mercilessly
83. Which
among process of analyzing and correcting syntactic, logic and other errors
identified during testing?
Dynamic Analysis
Desk Checking
Debugging
Error guessing
84. Which
of the following statement is correct about monitoring performance?
The risks to be organization and its
products from using the process should be monitored
All the listed options
Management should review the process improvement program regularly
Careful analysis of results of testing should be performed.
85.
Following are the key indicators to develop testers dashboards EXCEPT
Schedule status
Severity of recorded defect
Count of defects
Budget status
86. Testing on,
above and below the edges of classes is called _______________
Test contributions
Cause effect
diagram
Equilance Class partitioning
Boundary value analysis
87.Which
among the following are the major concerns testers have on entering the test
execution?
Inadequate time or resources
All the listed options
Significant problem will not be uncovered during testing
Software not in testable mode
88. Which among
the following are the techniques to prevent defects?
Training and eduction and methodology and standards
QA,Training and eduction, defensive design and code and finally
methodology and standards
QA &QC
QA, Training and education, QC and methodology & standards
QA,QC, defensive design and code and finally methodology and standards
89. Which among
the following is the best strategy to reduce impact if there is a problem?
Reduce scope of the system and also do not use latest unproven technology
Contingency plans
All the listed options
Disaster recovery plan, contingency plans
90. Test
activities are recorded on a _____________
Test log
Test plan
Defect tracking sheet
All the listed option
91. Which
one of the following statements is correct?
Policies help in defining products
Policies are set by senior management
Policies are set by Test managers
Policies are guidelines
92. A
testing method in which the test data are derived solely from the program
structure is ____________
Structural testing
Glass box testing
White box testing
All the listed options
93. Defects
are measure in relation to ____________________
projects efforts
total number of defects
development team size
lines of code
94. The tool used to verify the
operational system results are in compliance with organizations policies and
procedures is called _________
Checklists and inspections
confirmation or examination
Fact fining
Tracing
95. To define
test objectives testers need to do the following EXCEPT
Data bridges and filters
Validation process for incoming external data
Define each objective so that you can
reference it by a number
Development of a model showing the internal and external dependency links among
core business areas, processes and information systems
96. The tool used to examine the
usability of test data for maintenance is called _____________
Completion based analysis and mapping
Test data
Peer review
Inspections
97. Decision to stop test execution
should be based upon ________________
All the listed options
a % of coverage for each coverage category
rate of error detection falls below a specified threshold
successful use of specific test case design methodologies.
98. Which of the following is not a perspective of quality
Translucent
User Based
Transcedent
Product
Based
99.
Temptations causes employees to engage in the following improper acts EXCEPT
Weak internal
audit function
High
decentralization
Non existent or ineffective control
High Centralization
100. Following
are guidelines adhered to tool usage to be more effective and efficient EXCEPT
The use of
test tools should be incorporated into test processes so that the use of tools
is mandatory, not optional
Tester should work together to build open source testing tools
Testers should have access to an individual in their organization , or the organization that developed the tool.
Testers should not be permitted to use tools for which they have not received formal training
Tester should work together to build open source testing tools
Testers should have access to an individual in their organization , or the organization that developed the tool.
Testers should not be permitted to use tools for which they have not received formal training
101. The table of
contents of a test plan might contain the following EXCEPT
Test
objective
Test
Scope
Assumptions
Test
matrix
102. Which among the following is not a defect?
An extra
function provided in the system
None of the listed options
A Requirement not implemented in the system
A Requirement implemented incorrectly
103. The concept
of defensive code involves
adding a
syntax checker in middle of code
None of the listed options
adding code to a program so that two parts of program must fail before a major problem occurs
adding throw() and catch()
adding code to a program so that two parts of program must fail before a major problem occurs
adding throw() and catch()
104. Integration
testing should begin once unit testing for the components to be integrated is
complete (T/F) True
105. Which of the
following is an informal analysis of the program source code yielding
computer software ready for testing?
Code
walkthrough
Code
verification
Code inspection
Functional
Review
106. Which of the following strategic issues needs to be
addressed in successful software testing process?
Specify requirements in a quantifiable manner
All the listed options
Conduct formal technical review prior to testing
Consider using independent test terms
All the listed options
Conduct formal technical review prior to testing
Consider using independent test terms
107. Which
among the following is NOT a characteristic of good test case?
1) Clear to execute
2) It should
be repeatable
3) It is not
traceable to the requirements
4) A
good test case should be repeatable but not traceable to the requirements.
108. Correct
definition of vulnerability?
1. vulnerability is the potential loss to
an organization as for example, the risk resulting from the
misuse of its computer. this may involve unauthorized
disclosure, unauthorized modification and/or loss of information resources, as
well as the authorized but incorrect use of a computer. risk can be measured by
performing risk analysis.
2.Vulnerability
is something capable of exploiting vulnerability in the security of a computer
system or application vulnerability include both hazards and events that can
trigger flaws.
3. vulnerability is a design, implementation, or operations flaw
that may be exploited by a threat, the flaws causes the computer system
or application to operate in a fashion different from its published
specifications and to result in destruction or misuse of equipment or data.
109. yellow
circle report signifies
1. serious problems
does not mean anything looks nice
no major problem
potential serious deviations
does not mean anything looks nice
no major problem
potential serious deviations
110. walter she
wahart is know for his work on
1. control chart
1. control chart
2. histogram
3. scatter plot diagrams
4.
run chart
Post a Comment