Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CTFL-Foundation Exam Dumps - ISTQB Certified Tester Foundation Level

Go to page:
Question # 33

Which of the following best describes the Black-box technique?

A.

It uses decision coverage for completeness.

B.

It ensures all possible branches in the code are tested.

C.

It is based on the internal structure of the system.

D.

It can be done without reference to the internal structure of the component or system.

Full Access
Question # 34

Which of the following is a valid objective of testing? [K1]

A.

Correcting defects

B.

Locating defects in the code

C.

Preventing defects

D.

Ensuring no defects are present

Full Access
Question # 35

A system calculates the amount of customs duty to be paid:

_ No duty is paid on goods value up to, and including, $2,000.

_ The next $8,000 is taxed at 10%.

_ The next $20,000 after that is taxed at 12%.

_ Any further amount after that is taxed at 17%.

To the nearest $, which of these groups of numbers fall into three DIFFERENT equivalence classes?

A.

$20,000 $20,001 $30,001

B.

$2,000 $2,001 $10,000

C.

$2,000 $8,000 $20,000

D.

$1,500 $2,000 $10,000

Full Access
Question # 36

Of the following, select the best description of the fundamental test process:

A.

Planning and control, analysis, design, implementation, execution, evaluation of exit criteria and reporting, test closure.

B.

Executing tests, identifying and recording defects and preparing recommendation and closure reports.

C.

Controls, preparation of test cases, execution of test cases, execution of regression packs, communicating with developers, writing recommendations for release.

D.

Static testing, dynamic testing, defect reporting, reporting and closure.

Full Access
Question # 37

Which of the following would NOT be a typical target of testing support tools?

A.

Automate activities that require significant resources when done manually

B.

Automate activities that cannot be executed manually

C.

Automate repetitive tasks

D.

Automating repetitive inspections

Full Access
Question # 38

What content would be in an incident report if that incident report was based on the IEEE 829 Standard for SoftwareTest Documentation?

(i)Identification of configuration items of the software or system.

(ii)Software or system lifecycle process in which the incident was observed.

(iii)Description of the anomaly to enable reproduction of the incident.

(iv)Number of occurrences of the incident.

(v)Classification of the cause of the incident for metrics and for reporting purposes.

Number of correct answers: 1

A.

i, ii, iii

B.

ii, iii

C.

i, iii, iv

D.

i, ii, iii, v

Full Access
Question # 39

Which of the test cases below will exercise both outcomes from decision 2? [K3]

Refer to the exhibit

A.

P = 24, Q = 20, P=24, Q=25

B.

P = 36, Q = 36, P=37, Q=35

C.

P = 42, Q = 43, P=42, Q=42

D.

P = 37, Q = 36, P=35, Q=36

Full Access
Question # 40

Which statement correctly describes debugging? [K2]

A.

Testers identify defects, developers locate and correct defects, testers confirm the correction has cleared the original defect

B.

Developers identify defects, testers locate defects, developers correct and confirm the correction has cleared the original defect

C.

Testers identify and locate defects, developers correct defects and confirm the correction has cleared the original defect

D.

Developers identify, locate and correct defects, testers confirm the correction

has cleared the original defect

Full Access
Go to page: