CSTE Certficiation question dumps on Software testing continued.
72. Which of the
following statement is correct?
For more articles on Manual testing log on to : Manual Testing
- The control environment is established by the
highest levels of management and works upward through the organization
- The control environment is established by the
middle managentss and work downward through the organization
- The control environment is established by the
highest levels of management and works downward through the organization
- The control environment is established by the
tester and works downward through the organization
73. The primary
goal of defect management is
- to minimize the impact of defects
- to prevent defects
- to find defect as quickly as possible
- All the listed options
73. Which among
the following is the quantitative measure of the current level of performance
- Affinity diagram
- Pareto analysis
- Benchmarking
- Baseline
74.Regression
test level best suites for which type of transaction?
- Multiple transaction single terminal
- Single transaction multiple terminal
- Single transaction single terminal
- Multiple transaction multiple terminal
75. During software acceptance, the testing technique that is
relied upon for more accurate results(than any other testing technique listed
below is______________
- Black box
- White box
- Incremental
- Thread
76. Testing for
the existence or effectiveness of programmed controls required using
__________________
- Complex data
- Invalid data
- Redundant data
- Valid
data
77. Which of the
following factor assures that data is processed in accordance with the intents
of management for processing of transactions?
- Service Levels
- Authorization
- Maintainability
- Access control
78. The
objective in Test design is to ______________
- Minimize test execution cost
- defect as many defects as possible
- minimize test maintenance costs
- all the listed options
79.
Severity is one which determines the order in which defects should be fixed
(T/F).
False
80. Steps
involved in defect discovery are _____________,______________and _____________
- Acknowledge, Find , Report
- Find, Report, Acknowledge
- Find, Acknowledge, Report
81. Tools
for documenting defects as they are found and for tracking their status is
- Defect tracking tools
- Status Report
- Test log
82. The best
reason for using independent software testing teams is that_______
- quality of software is given as much
consideration as the project budget and timeline
- software developers do not need to do any testing
- testers do not get involved with the project
until testing begins
- stranger will test the software mercilessly
83. Which among
process of analyzing and correcting syntactic, logic and other errors
identified during testing?
- Dynamic Analysis
- Desk Checking
- Debugging
- Error guessing
84. Which
of the following statement is correct about monitoring performance?
- The risks to be organization and its products
from using the process should be monitored
- All
the listed options
- Management should review the process improvement
program regularly
- Careful analysis of results of testing should be performed.
- 85. Following are the key indicators to develop testers dashboards EXCEPT
- Schedule status
- Severity of recorded defect
- Count of defects
- Budget status
86. Testing on,
above and below the edges of classes is called _______________
- Test contributions
- Cause effect diagram
- Equilance Class partitioning
- Boundary value analysis
87.Which
among the following are the major concerns testers have on entering the test
execution?
- Inadequate time or resources
- All the listed options
- Significant problem will not be uncovered during
testing
- Software not in testable mode
88. Which among
the following are the techniques to prevent defects?
- Training and eduction and methodology and
standards QA,Training and eduction, defensive design and code and
finally methodology and standards
- QA &QC
- QA, Training and education, QC and methodology
& standards
- QA,QC, defensive design and code and finally
methodology and standards
89. Which among
the following is the best strategy to reduce impact if there is a problem?
- Reduce scope of the system and also do not use
latest unproven technology
- Contingency plans
- All the listed options
- Disaster recovery plan, contingency plans
90. Test
activities are recorded on a _____________
- Test log
- Test plan
- Defect tracking sheet
- All the listed option
91. Which
one of the following statements is correct?
- Policies help in defining products
- Policies are set by senior management
- Policies are set by Test managers
- Policies are guidelines
92. A
testing method in which the test data are derived solely from the program
structure is ____________
- Structural testing
- Glass box testing
- White box testing
- All the listed options
93. Defects
are measure in relation to ____________________
- projects efforts
- total number of defects
- development team size
- lines of code
94. The
tool used to verify the operational system results are in compliance with
organizations policies and procedures is called _________
- Checklists and inspections
- confirmation or examination
- Fact fining
- Tracing
95. To define
test objectives testers need to do the following EXCEPT
- Data bridges and
filters
- Validation process for incoming external data
- Define
each objective so that you can reference it by a number
- Development of a model showing the internal and
external dependency links among core business areas, processes and
information systems
96. The tool used
to examine the usability of test data for maintenance is called _____________
- Completion based analysis and mapping
- Test data
- Peer review
- Inspections
97. Decision
to stop test execution should be based upon ________________
- All the listed options
- a % of coverage for each coverage category
- rate of error detection falls below a specified
threshold
- successful use of specific test case design
methodologies.
98. Which of the following is not a perspective of quality
- Translucent
- User Based
- Transcedent
- Product Based
99.
Temptations causes employees to engage in the following improper acts EXCEPT
- Weak internal audit function
- High decentralization
- Non existent or ineffective control
- High Centralization
100. Following
are guidelines adhered to tool usage to be more effective and efficient EXCEPT
1. The use of test tools should be
incorporated into test processes so that the use of tools is mandatory, not
optional
2. Tester should work together to
build open source testing tools
3. Testers should have access to an
individual in their organization , or the organization that developed the tool.
4. Testers should not be permitted to
use tools for which they have not received formal training.
101. The table of
contents of a test plan might contain the following EXCEPT
- Test objective
- Test Scope
- Assumptions
- Test
matrix
102. Which among the
following is not a defect?
- An extra function provided in the system
- None of the listed options
- A Requirement not implemented in the system
- A Requirement implemented incorrectly
103. The concept
of defensive code involves
1. adding a syntax checker in middle of code
2. None of the listed options
3. adding code to a program so that two
parts of program must fail before a major problem occurs
4. adding throw() and catch()
104. Integration
testing should begin once unit testing for the components to be integrated is
complete (T/F)
True
105. Which of the
following is an informal analysis of the program source code yielding
computer software ready for testing?
- Code walkthrough
- Code verification
- Code inspection
- Functional Review
106. Which of the
following strategic issues needs to be addressed in successful software testing
process?
1. Specify requirements in a quantifiable
manner
2. All the listed options
3. Conduct formal technical review
prior to testing
4. Consider using independent test
terms
107. Which
among the following is NOT a characteristic of good test case?
- Clear to execute
- It should be repeatable
- It is not traceable to the requirements
- A good test case should be repeatable but not traceable to the requirements.
109 .Correct
definition of vulnerability?
1. vulnerability is the potential loss to
an organization as for example, the risk resulting from the
misuse of its computer. this may involve unauthorized
disclosure, unauthorized modification and/or loss of information resources, as
well as the authorized but incorrect use of a computer. risk can be measured by
performing risk analysis.
2.Vulnerability
is something capable of exploiting vulnerability in the security of a computer
system or application vulnerability include both hazards and events that can
trigger flaws.
3. vulnerability is a design, implementation, or operations flaw
that may be exploited by a threat, the flaws causes the computer system
or application to operate in a fashion different from its published
specifications and to result in destruction or misuse of equipment or data.
109. yellow
circle report signifies
1. serious problems
2. does not mean anything looks nice
3. no major problem
4. potential serious deviations
110. walter she
wahart is know for his work on
- control chart
- histogram
- Scatter plot diagrams
- run chart
Post a Comment