Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CTFL_Syll2018 Exam Dumps - ISTQB Certified Tester Foundation Level (Syllabus 2018)

Question # 4

Under which of the following circumstances is maintenance testing required? [K1]

A.

Migration of software onto a new platform

B.

Testing during initial development of a replacement for an existing system

C.

Purchase of a new software tool

D.

Updating of a regression suite

Full Access
Question # 5

Which of the following characteristics is most likely to promote effective software testing? [K1]

A.

Independence from the production process

B.

A belief that programmers always make mistakes

C.

Knowledge of the number of defects typically found in a program

D.

Confidence that the next stage will find defects missed at this stage

Full Access
Question # 6

Before an invoice can be created, an account is required. Before an account can be set up, an account user is required (in order to set up the account). The software is delivered with a master user only, who can only create other types of users. The following test cases have been written to test the high-level structure of the software

a. Create an invoice

b. Amend an invoice

c. Process an invoice (send to customer)

d. Delete an invoice

e. Create an account

f. Create an account user

g. Amend an account user

h. Delete an account user

i. Amend an account

j. Delete an account

Which of the following test procedures would enable all tests to be run? [K3]

A.

f, g, a, c, b, d, e, i, j, h

B.

e, i, a, c, b, d, f, g, h, j

C.

e, i, f, g, a, c, b, d, h, j

D.

f, g, e, i, a, b, c, d, j, h

Full Access
Question # 7

What can testing demonstrate?

A.

Testing can demonstrate that there are no defects

B.

Testing can demonstrate that there are defects

C.

Testing can demonstrate that the software is correct

D.

Testing can demonstrate that there are no hidden defects in the software

Full Access
Question # 8

Which of the following factors will MOST affect the testing effort required to test a software product? [K1]

A.

The number of staff available to execute tests

B.

The level of detail in the test plan

C.

The requirements for reliability and security in the product

D.

The test estimation method used

Full Access
Question # 9

Testers are often seen as the bearer of unwanted news regarding defects. What are effective ways to improve the communication and relationship between testers and others?

a)Communicate factual information in a constructive way.

b)Try to understand how the other person feels and why they react the way they do.

c)Always outsource testing activities.

d)Never record information that could be used to apportion blame to an individual or team.

A.

a and b

B.

a, b and c

C.

a, b and d

D.

a and c

Full Access
Question # 10

Component testing may include:

A.

Sociability testing.

B.

User acceptance testing.

C.

Beta testing.

D.

The use of stubs and drivers.

Full Access
Question # 11

Which of the following test organizations has the highest level of independence?

A.

Independent testers within the development teams

B.

Independent testers from the user community

C.

Independent test specialists for specific test types, such as usability, performance or certification test specialists

D.

Code tested by another developer from the development team

Full Access
Question # 12

Which of the following is a role of a formal review? [K1]

A.

Adjudicator

B.

Moderator

C.

Governor

D.

Corrector

Full Access
Question # 13

Which of the main activities of the fundamental test process does the task ‘verify the test environment set up is correct’ relate to? [K1]

A.

Planning and control

B.

Analysis and design

C.

Implementation and execution

D.

Evaluating exit criteria and reporting

Full Access
Question # 14

The four test levels defined for a common V-model testing approach are:

A.

Unit, integration, system and maintenance.

B.

Functional, glass box, incremental and maintenance.

C.

Component, integration, system and acceptance.

D.

Unit, component, functional and alpha/beta.

Full Access
Question # 15

Equivalence Partitioning is best defined as:

A.

An analysis technique that divides inputs into groups that are expected to exhibit similar behaviors.

B.

Applying to time-related data classes only.

C.

A form of white-box testing.

D.

A method to reduce test coverage.

Full Access
Question # 16

Which of the following BEST defines static techniques? [K1]

A.

Executing the software work product

B.

Manually examining the code or project documentation

C.

Automated analysis of the code or project documentation

D.

Manual examination and automated analysis of code or project documentation

Full Access
Question # 17

Consider the following pseudo code:

1. Begin

2. Input X, Y

3. If X > Y

4. __Print (X, ‘is greater than’, Y)

5. Else

6. __Print (Y, is greater than or equal to’, X)

7. EndIf

8. End

What is the minimum number of test cases required to guarantee both 100% statement coverage and 100% decision coverage?

A.

Statement coverage = 3, Decision coverage = 3

B.

Statement coverage = 2, Decision coverage = 2

C.

Statement coverage = 1, Decision coverage = 2

D.

Statement coverage = 2, Decision coverage = 1

Full Access
Question # 18

Which of the following, select the best description of the fundamental test process:

A.

Planning and control, analysis, design, implementation, execution, evaluation of exit criteria and reporting, test closure.

B.

Executing tests, identifying and recording defects and preparing recommendation and closure reports.

C.

Controls, preparation of test cases, execution of test cases, execution of regression packs, communicating with developers, writing recommendations for release.

D.

Static testing, dynamic testing, defect reporting, reporting and closure.

Full Access
Question # 19

Which of the test cases below will exercise both outcomes from decision 2? [K3]

Refer to the exhibit

A.

P = 24, Q = 20, P=24, Q=25

B.

P = 36, Q = 36, P=37, Q=35

C.

P = 42, Q = 43, P=42, Q=42

D.

P = 37, Q = 36, P=35, Q=36

Full Access
Question # 20

In a system designed to work out the employee tax to be paid:

_ An employee has $4,000 of salary tax free.

_ The next $1,500 is taxed at 10%.

_ The next $28,000 after that is taxed at 22%.

_ Any further amount is taxed at 40%.

Which of these is a valid Boundary Value Analysis test case?

A.

$28,000

B.

$1,500

C.

$33,501

D.

$5,000

Full Access
Question # 21

A system calculates the amount of customs duty to be paid:

_ No duty is paid on goods value up to, and including, $2,000.

_ The next $8,000 is taxed at 10%.

_ The next $20,000 after that is taxed at 12%.

_ Any further amount after that is taxed at 17%.

To the nearest $, which of these groups of numbers fall into three DIFFERENT equivalence classes?

A.

$20,000 $20,001 $30,001

B.

$2,000 $2,001 $10,000

C.

$2,000 $8,000 $20,000

D.

$1,500 $2,000 $10,000

Full Access
Question # 22

What factors should be considered to determine whether enough testing has been performed?

(i)The exit criteria.

(ii)The budget.

(iii)How big the test team is.

(iv)The product's risk profile.

(v)How good the testing tools are.

(vi)Sufficient details of the system status to allow decisions

A.

i and ii and iv and vi

B.

i and ii and iii and vi

C.

ii and iii and iv and v

D.

i and ii and v and vi

Full Access
Question # 23

How does software testing contribute to the quality of delivered software? [K2]

A.

By detecting and removing all the defects in the delivered code and ensuring that all tests adhere to the quality standards set for the project

B.

By measuring reliability of the software and ensuring that it is always above 99.99%

C.

By identifying root causes of defects from past projects and using the lessons learned to improve processes and thus help to reduce the defect count

D.

By detecting all deviations from coding good practice and ensuring that these are corrected

Full Access
Question # 24

When should testers be involved in reviewing a UAT specification? [K1]

A.

At the beginning of the project

B.

As soon as requirements have been approved

C.

As soon as the UAT specification has been drafted

D.

At any time before UAT begins

Full Access
Question # 25

From the following list, which of the following apply to experience-based techniques? [K2]

a. Test cases are derived from a model of the problem to be solved or the software

b. Test cases are derived from the knowledge of the testers

c. The knowledge of testers, developers and users is used to drive testing

d. The internal structure of the code is used to derive test cases

A.

a and b.

B.

c and d.

C.

a and d.

D.

b and c.

Full Access
Question # 26

Test script TransVal 3.1 tests transaction validation via screen TRN 003B. According to the specification (PID ver 1.3 10b iv) the validation screen should not accept future dated transactions. Test script TransVal 3.1 passes. Test script eod 1.4 tests end of day processing and is run after the execution of TransVal 3.1 using data entered during that test

Which of the following is the BEST detail on an incident report? [K3]

A.

Title. End of Day failure.. Reproducible. Yes. Description. Script eod 1.4 fails when the first transaction of the day is a future dated transaction. Screen shot of the failure attached.

B.

Title. Transaction input screen validation..Reproducible. Yes. Description. Script eod 1..4 fails . Screen shot of the failure attached. Validation of transaction entryon screen TRN-003B should not allow future dated transactions – see PID ver 1.3 para 10b iv.

C.

Title. Screen TRN-003B validation of transaction date.. Reproducible. No. Description. When a future dated transaction is processed by the end of day process, a failure can occur. This does not always happen. Screen shot of the failure attached.

D.

Title. Screen TRN-003B validation of transaction date. Reproducible. Yes. Description. Script eod 1.4 fails when the first transaction of the day is a future dated transaction. Screen shot of the failure attached. Validation of transaction entry on screen TRN-003B should not allow future dated transactions – see PID ver 1.3 para 10b iv.

Full Access
Question # 27

Which of the following test design techniques is not a black box technique?

A.

Equivalence partitioning

B.

State transition testing

C.

Boundary value analysis

D.

Statement coverage

Full Access
Question # 28

What other details should be included in the following incident report when it is first submitted?

Date of Issue: 23/11/05

Severity: P1

Build: Version15.6

Details: Expected field to be limited to 15 chars, able to enter 27

A.

Suggested solution, priority and number of defects assigned to this developer.

B.

Status of the incident, degree of impact, Test Case Number.

C.

History, related defects and expected fix time.

D.

Line of code, number of defects found, time of day.

Full Access
Question # 29

Which of the following metrics could be used to monitor progress along with test preparation and execution? [K1]

A.

The total number of tests planned

B.

The total number of requirements to be tested

C.

The failure rate in testing already completed

D.

The number of testers used for test execution so far

Full Access
Question # 30

Which of the following test cases will ensure that the statement ‘Print ‘Hold’’ is exercised? [K3]

Refer to the exhibit

A.

X=2, Y=2, Z=2

B.

X=2, Y=3, Z=4

C.

X=2, Y=4, Z=3

D.

X=4, Y=3, Z=2

Full Access
Question # 31

What type of test design technique is the most effective in testing screen-dialog flows?

A.

Use case testing

B.

Boundary value testing

C.

Statement testing and coverage

D.

State transition testing

Full Access
Question # 32

Which statement correctly describes debugging? [K2]

A.

Testers identify defects, developers locate and correct defects, testers confirm the correction has cleared the original defect

B.

Developers identify defects, testers locate defects, developers correct and confirm the correction has cleared the original defect

C.

Testers identify and locate defects, developers correct defects and confirm the correction has cleared the original defect

D.

Developers identify, locate and correct defects, testers confirm the correction

has cleared the original defect

Full Access
Question # 33

What is decision table testing?

A.

It’s a testing design technique based in the internal software structure.

B.

It’s a static test design technique.

C.

It’s a testing design technique to verify decisions.

D.

It’s a testing design technique based in the system requirements.

Full Access
Question # 34

Which of the following is a valid objective of testing? [K1]

A.

Correcting defects

B.

Locating defects in the code

C.

Preventing defects

D.

Ensuring no defects are present

Full Access
Question # 35

Which of the following test case design techniques is white box (structure-based)? [K1]

A.

Use case testing

B.

State transition testing

C.

Decision testing

D.

Equivalence partitioning

Full Access
Question # 36

The ISTQB fundamental test process consists of 5 main activities To which of these belongs the task "Identifying necessary test data"?

A.

Evaluating test criteria and reporting

B.

Test implementation and execution

C.

Test planning and control

D.

Test analysis and design

Full Access
Question # 37

Which of the following Is NOT a benefit of traceability between the test basis and test work products?

A.

It helps evaluate the extent of test coverage

B.

It obscures the impact of changes

C.

It allows testing to be auditable

D.

It meets the criteria for IT governance

Full Access
Question # 38

Debugging and Testing are key activities in the software development lifecycle.

Which of the following are 'Debugging' activities?

a) Identifying, a failure

b) Locating the cause of failure

c) Fixing the defect

d) Checking the fix has resolved the failure

A.

a & d

B.

a & b

C.

b & c

D.

c & d

Full Access
Question # 39

Considering the following pseudo-code, calculate the MINIMUM number of test cases required to achieve 100% statement coverage and 100% decision coverage.

A.

Statement coverage: 4, Decision coverage: 5

B.

Statement coverage. 3. Decision coverage 4

C.

Statement coverage 4. Decision coverage 4

D.

Statement coverage: 4. Decision coverage: 3

Full Access
Question # 40

The following checklist has been produced to help reviewers detect defects with user stones:

User Story Checklist:

1. The user story must have a unique identifier

2 The user story must contain the user/customer

3 The user story must contain the need

4. The user story must contain the reason.

5. The user story must contain testable acceptance Criteria-Using the checklist above what is wrong with the following user story?

User Story US2018

As a bank account customer, I would like to transfer money from one account to another using the mobile banking application by using the drag

and drop feature.

This is acceptable when

• I can drag and drop from one account to another and select any of the pre-defined amounts

• I can drag and drop from one account to another and type in any positive amount

• Once I confirm the details the amount is debited from the first account and credited to the second account

A.

The acceptance criteria is not testable

B.

The user story does not contain the customer.

C.

The user story does not contain the reason

D.

The user story does not contain the unique identifier.

Full Access
Question # 41

Load testing tool checks for:

A.

presence of bugs in user interface

B.

the number of testers needed in order to achieve "dead line"

C.

correct functional behavior of the system under test

D.

time response and resource utilization

Full Access
Question # 42

In which development life cycle model is regression testing an increasingly important activity as the project progresses?

A.

V-model.

B.

Waterfall.

C.

Scrum.

D.

Progressive.

Full Access
Question # 43

Your task is to compile a test execution schedule for the current release of software.

The system specification states the following logical dependencies:

• An admin user must create/amend/delete a standard user.

• A standard user is necessary to perform all other actions.

The test plan requires that re-tests must be performed first, followed by the highest priority tests. To save time, the test plan states that tests should be scheduled to create test data for the subsequent tests in the schedule.

The following test cases have been designed, with an indication of priority (1 being the highest priority) and whether the test has previously failed.

Which test execution schedule meets the test plan requirements and logical dependencies?

A.

a, d, c, b, e

B.

a, c, b, d, e

C.

e, a, b, c, d

D.

e, a, d, c, b

Full Access
Question # 44

Can "cost" be regarded as Exit criteria'?

A.

No The financial value of product quality cannot be estimated so it is incorrect to use cost as an exit criteria

B.

Yes. Spending too much money on testing will result in an unprofitable product, and having cost as an exit criteria helps avoid this

C.

Yes Going by cost as an exit criteria constrains the testing project which will help achieve the desired quality level defined for the project

D.

No The cost of testing cannot be measured effectively, so it is incorrect to use cost as an exit criteria

Full Access
Question # 45

Which of the following statements is true?

A.

100% branch coverage means 100% statement coverage.

B.

100% statement coverage means 100% branch coverage.

C.

100% branch coverage means 100% statement coverage and vice-versa.

D.

It is impossible to achieve 100% statement coverage

Full Access
Question # 46

Which of the following statements is the BEST example of non-functional testing?

A.

Tests based on the internal structure of a component or system

B.

Tests related to -what' the system should do

C.

Tests which calculate overtime pay for those employees entitled to such

D.

Tests which capture the time it takes to save a file

Full Access
Question # 47

What of the following statements regarding walkthrough are NOT true?

A.

A walkthrough is lead by a moderator and requires pre-meeting preparation and post meeting follow up

B.

A walkthrough may take the form of scenarios, dry runs and peer group review

C.

The purpose of a walkthrough is to establish common understanding of a document and to find possible defects in it

D.

Pre-meeting preparation, documentation and distribution of results are optional for a walkthrough

Full Access
Question # 48

Why is measurement of code coverage Important?

A.

Because 100% code coverage implies 100% coverage of requirements

B.

Because 100% code coverage guarantees that there are no coding errors

C.

Because code coverage can be used to ensure that all code is exercised by tests

D.

Because code coverage can ensure that all decisions are correctly implemented in the code

Full Access
Question # 49

Which of the following statements about Use Case Testing is FALSE?

A.

Use case generally has a mainstream scenario and may have many alternate or exceptional scenarios.

B.

A use case can be defined at the abstract level, detached from the implementation, or at the system level, describing a set of executed functions

C.

Use case testing does not find defects caused by interaction of different components

D.

Each use case has preconditions which need to be met for the use case to work successfully

Full Access
Question # 50

Agile development can be classified as which life cycle model?

A.

Agile development is not related to any life cycle model

B.

RAD

C.

V model

D.

Iterative Incremental .

Full Access
Question # 51

What is Test Design?

A.

The overall process of testing a system to verify that it meets specified requirements.

B.

The process of selecting test techniques to exercise the functions implemented by the tested system

C.

The process of transforming general testing objectives into tangible test conditions and test cases

D.

An approach to testing to reduce the level of product risks by focusing on high-risk areas in the product

Full Access
Question # 52

Which of the following processes is related to ensuring the integrity of the testware?

A.

Configuration management

B.

Test automation

C.

Build release

D.

Project management

Full Access
Question # 53

What is a peer review?

A.

An informal review without moderator

B.

A review done by developers and testers together

C.

A review done by developers only

D.

A review done by colleagues at the same organizational level

Full Access
Question # 54

Which one of the following is an example of how product risk analysis can influence the testing approach?

A.

The complex business rules could result in costly failures, so decision table testing will be used for test case design.

B.

Performance failures were much lower than expected, so more test analysis will be conducted in this area.

C.

There is a lack of automation skills in the test team, so training for the automation tool will be rolled out.

D.

There are no product risks recorded around security, so security testing will be given priority as a contingency measure.

Full Access
Question # 55

Which of the following is a key difference between black box and white box test design techniques?

A.

Black box techniques use software code to derive test cases, white box techniques do not.

B.

White box techniques use functional design specifications to derive test cases, black box techniques do not.

C.

White box techniques can measure the extent of code coverage, black box techniques can not.

D.

White box techniques derive test cases from models of the software, black box techniques do not.

Full Access
Question # 56

Which of the following BEST describes how configuration management supports the test process?

A.

It enables the tester to reproduce the tested item through unique identification and version control.

B.

It enables the tester to systematically design test conditions, cases and data.

C.

It enables incidents to be tracked from discovery and classification to correction and confirmation of the solution.

D.

It helps the test manager to decide how best to integrate and coordinate the testing activities into the software life cycle.

Full Access
Question # 57

Which of the following is NOT a typical task for a test leader?

A.

Select the test approach

B.

Coordinate the test strategy

C.

Prepare and acquire test data

D.

Estimate the cost of testing

Full Access
Question # 58

Which of the following type of defect would NOT be typically found by using a static analysis tool?

A.

A variable is defined but is then not used

B.

A variable is used in a calculation before it is defined

C.

A variable has the wrong numeric value passed into it

D.

A variable is used but not declared

Full Access
Question # 59

Which of the following options describe the chain of events in the correct sequence?

A.

Error, fault, failure

B.

Fault, bug. mistake

C.

Mistake, failure, fault

D.

Failure, bug, error

Full Access
Question # 60

Which ONE of the following is the BEST way to take advantage of the different mindsets of testers and developers?

A.

Insist on independent testing at all stages in the lifecycle.

B.

Have all developers undergo ISTQB training.

C.

Keep developers and testers in separate teams.

D.

Bring the two mindsets together.

Full Access
Question # 61

Which of the following BEST describes checklist-based testing?

A.

An approach to testing whereby the testers dynamically design and execute tests based on their knowledge, exploration of the test item and the results of previous tests.

B.

An experience-based test technique whereby the experienced tester uses a high-level list of items to be noted, checked or remembered, or a set of rules or criteria against which a product has to be verified.

C.

A procedure to derive and/or select test cases based on an analysis of the specification, either functional or non-functional, of a component or system without reference to its internal structure.

D.

A test design technique which ensures that test cases are checked for consistency and completeness against an organisation’s list of formatting rules and best practices.

Full Access
Question # 62

Testing and Debugging are key activities in the software development lifecycle.

Which of the following are DEBUGGING activities?

a) Designing tests to find failures.

b) Locating the cause of failures.

c) Analysing and fixing the defects.

d) Executing tests to show failures.

A.

a and d.

B.

a and b.

C.

b and c.

D.

c and d.

Full Access
Question # 63

Which of the following statements correctly describe Black-Box Testing''

A.

Test on an individual software component in isolation from other components, to avoid external influence

B.

Tests that investigate the input vs. trfe output behavior of a software system.

C.

Test derived from the ability of the testers and their intuition and experience with similar applications and technologies (sometimes used to strengthen systematic techniques)

D.

Test of the interfaces between components and of the interactions with different parts of a system

Full Access
Question # 64

Which of the following would achieve the HIGHEST level of testing independence for a project's test level?

A.

Training developers to design good tests for the test team to execute

B.

Outsourcing test design and execution to a different company

C.

Having the company's independent test team design and execute the tests

D.

Minimising contact between testers and developers during test design to avoid bias

Full Access
Question # 65

Which of the following approaches is/are used in Integration tests?

A.

Both functional and structural

B.

Usability

C.

Functional only

D.

Structural only

Full Access
Question # 66

Which of the following is a white-box test technique?

A.

Decision table testing

B.

Exploratory testing

C.

Statement testing

D.

Error guessing

Full Access
Question # 67

The decision table above reflects a golf club's pricing structure for green fees and buggy/cart hire.

What is the expected result (actions) for each of the following two test cases (TC1 and TC2)?

* TC 1 - Paul is not a full member, is a Loyalty Card holder and requests to play 18 holes with a buggy/cart

* TC 2 - Cheryl is not at full member, doesn't have a Loyalty Card and requests to play 9 holes with a buggy/cart

A.

TC1 - £23 total charges including buggy hire; TC2 - £21 total charge including buggy hire

B.

TC1 - £18 total charges including buggy hire; TC2 - £16 total charge but no buggy allowed

C.

TC1 - £23 total charges including buggy hire; TC2 - £16 total charge but no buggy allowed

D.

TC1 - £17 total charges but no buggy allowed; TC2 - £21 total charge including buggy hire

Full Access
Question # 68

Which of the following is NOT a test control activity?

A.

Re-prioritize tests because of time pressure

B.

Change the test schedule due to viability of a test environment

C.

Writing test suspension and resumption criteria in the test plan

D.

Set an entry criterion requiring fixes to be retested by a developer before accepting them into a build

Full Access
Question # 69

You are testing a mobile app that displays a person's status in respect of Covid-19. There are five possibilities: Fully Vaccinated, Partly Vaccinated, Infected & Recovered. Last Tested Positive or Last Tested Negative. You have found that, after receiving data about successful administration of a second injection, the person's status has not changed from Partly Vaccinated to Fully Vaccinated, although it should have done. The project uses a popular proprietary defect management tool where you have drafted an incident report with the following information:

• Test id., test environment used and date/time of run

• Expected and actual results with steps to reproduce.

• Severity level 4 (Critical - an entire functional area is unusable)

• Version data for the application under test and the testware that was used

Which one of the following important items of information is missing?

A.

Recommendations

B.

Name of Tester

C.

Priority

D.

Change History

Full Access
Question # 70

A booking system for a city bus service prices its fares according to the time of travel:

• Peak-time tariff starts at 0600 and finishes at 1000 am

• Off-peak tariff applies during all other times of service

• The bus service does not operate between 2300 and the start of the next day’s peak service

Note that all times mentioned are inclusive.

When applying the equivalence partitioning test design technique, which of the following options, shows test case inputs that each fall into a different equivalence partition?

A.

0600, 1000, 1200

B.

1001, 1300, 2259

C.

0100, 0800, 2200

D.

2400, 1000, 2301

Full Access
Question # 71

Which of the following BEST describes error guessing?

A.

Error guessing involves designing tests based on experience, defect data, or common knowledge about why software fails

B.

Error guessing involves building test cases based on the various experiences of developers, architects, users, and other stakeholders on project teams

C.

Error guessing is a suitable test technique and can be used effectively in place of more formal techniques

D.

Error guessing is a valid and useful white-box lest technique due to Its high degree ol statement coverage

Full Access
Question # 72

Which of the following is NOT a deciding factor in determining the extent of testing required?

A.

Budget to do testing

B.

A particular tester involved in testing

C.

Level of risk of the product or features

D.

Time available to do testing

Full Access
Question # 73

Which of the following is an example of black-box dynamic testing?

A.

Code inspection

B.

Checking memory leaks for a program by executing it

C.

Functional Testing

D.

Coverage analysis

Full Access
Question # 74

Which of the following BEST describes exploratory testing?

A.

Exploratory testing is a suitable test technique which may replace both black-box and white-box test techniques

B.

Exploratory testing requires both solid specifications and much project time available for test execution

C.

Exploratory testing Is a valid and useful black-box test technique since it focuses on test cases related to the architecture and design of a system

D.

Exploratory testing may be used within defined time periods, during which the tester may follow a lest charter as a guide

Full Access
Question # 75

Which of the following statements is true?

A.

Incident management tools are used by testers only

B.

A configuration management tool has nothing to do with testing

C.

Test management tools are used by managers only

D.

A requirements management tool may be considered as test support tool

Full Access
Question # 76

What is the difference between system integration testing and acceptance testing?

A.

System integration testing is testing non-functional requirements Acceptance testing concentrates on the functionality of the system

B.

System integration testing is executed by the developers. Acceptance testing is done by the customer

C.

System integration testing verifies that a system interfaces correctly with other systems. Acceptance testing verifies compliance to requirements

D.

System integration testing verifies compliance to requirements Acceptance testing verifies correct interaction with other systems existing in the user's environment

Full Access
Question # 77

Which of the following is NOT an example of a common test metric?

A.

Percentage of work done in test environment creation

B.

Average number of expected defects per requirement

C.

Number of test cases run

D.

Deviation from test milestone dates

Full Access
Question # 78

Which of the following test types is a part of the V-Model?

A.

Black-box testing

B.

White-box testing

C.

Experience-based testing

D.

Component testing

Full Access
Question # 79

An organization is working on updating test cases for a particular module of their software.

Sam updated a set of test cases yesterday and saved the new version on his PC.

Unfortunately, the hard disk of his PC crashed, and his work was lost.

The IT department of the organization restored the contents of his hard disk with the last available back-up - from the previous morning However the changes made by him yesterday were lost forever

Which of the following tools, had it been used, would have prevented the loss of Sam's updates?

A.

Incident Management Tool

B.

Configuration Management Tool

C.

Test Execution tool

D.

Backup tool

Full Access
Question # 80

Which of the following defect types are LEAST likely to be discovered when using static analysis tools?

A.

Variables that are never used

B.

Coding standard violations

C.

Memory leaks

D.

Uncalled functions and procedures

Full Access
Question # 81

In foundation level syllabus you will find the main basic principles of testing, Which of the following sentences describes one of these basic principles?

A.

Complete testing of software is attainable if you have enough resources and test tools

B.

For a software system, it is not possible under normal conditions, to test all input and output combinations.

C.

A goal of testing is to show that the software is defect free

D.

With automated testing you can make statements with more confidence about the quality of a product than with manual testing.

Full Access
Question # 82

Once a bug is fixed, it should be retested. What is the term used to define this type of testing?

A.

Reliability Testing

B.

Confirmation Testing

C.

Maintainability Testing

D.

Regression Testing

Full Access
Question # 83

A money order system is designed to calculate the charge for a transfer

- Amounts from 1 to 1999 are charged EUR 10.

- Amounts from 2000 to 5000 are charged EUR 15

- Amounts below EUR 1 or above EUR 5000 are not accepted. Assume that only integer values can occur. Which of these sets of amounts covers all equivalence classes?

A.

0-1999-2000-5000

B.

1-2000-5001-10000

C.

0-100-2000-6000

D.

99-1- 2000- 4999,99

Full Access
Question # 84

Which of the following statements is correct?

A.

Pair programming is done with developer and tester pairing together

B.

Pair programming is an alternative term for code inspection.

C.

Pair programming is used usually in waterfall model

D.

Pair programming is, among other things, an informal review method.

Full Access
Question # 85

Out of the following, what is not needed to specify in defect report?

A.

How to fix the defect

B.

Severity and priority

C.

Test environment details

D.

How to reproduce the defect

Full Access
Question # 86

Which of the following is NOT an objective of testing?

A.

Finding defects

B.

Providing information for decision-making

C.

Analyzing and removing the cause of failures

D.

Gaining confidence about the level of quality of the software

Full Access
Question # 87

The following program part is given:

IF (condition A)

then DO B

END IF

How many test cases are necessary in order to achieve 100% statement coverage?

A.

1

B.

2

C.

4

D.

a very high number

Full Access
Question # 88

When testing a mission critical system a high coverage should be achieved. Which of the following techniques should be implemented as a structural based coverage technique in order to achieve highest coverage?

A.

multiple condition coverage

B.

decision table

C.

use case testing

D.

statement coverage

Full Access
Question # 89

Which ONE of the following statements does NOT describe how testing contributes to higher quality?

A.

Performing a review of the requirement specifications before implementing the system can enhance quality

B.

The testing of software demonstrates the absence of defects

C.

Properly designed tests that pass reduce the level of risk in a system

D.

Software testing identifies defects, which can be used to improve development activities.

Full Access
Question # 90

Which of the following is NOT a factor on which test estimation is dependent upon?

A.

Defect debugging and resolution

B.

The outcome of testing of previous test cycle

C.

Characteristics of the development process

D.

Characteristics of the product

Full Access
Question # 91

The following diagram lists various types of operating systems, databases and application servers supported by the application under test. For complete coverage of all combinations, how many combinations of the above are to be tested?

A.

11

B.

5

C.

45

D.

3

Full Access
Question # 92

A Software was re-deployed because the backend database was changed from one vendor to another The Test Manager decided to perform some functional tests on the redeployed system. This is an example of test of which test type?

A.

Regression tests

B.

Non-functional tests

C.

Structural tests

D.

Unit tests

Full Access
Question # 93

Which statement about use case testing is true?

A.

The test cases are designed to find defects in the data flow.

B.

The test cases are designed to find defects in the process flow

C.

The test cases are designed to be used by real users, not by professional testers

D.

The test cases are always designed by customers or end users

Full Access
Question # 94

Which of the following errors CANNOT be found with structure-based testing techniques?

A.

Memory is leaking

B.

Features are only partially implemented

C.

Data structures that are used before initialization

D.

Division by zero

Full Access
Question # 95

Which of the following is NOT an example of a typical risk-based testing activity?

A.

The evaluation of a risk-management tools to decide which tool to use for future projects

B.

The focus of testing is shifted to an area in the system where tests find with more defects than expected

C.

Brainstorming sessions are held with a wide variety of stakeholders to identify possible failures in the system

D.

Tests are prioritized to ensure that those associated with critical parts of the system are executed earlier

Full Access
Question # 96

Which of the following statements about decision tables are TRUE?

I. Generally, decision tables are generated for low risk test items

II. Test cases derived from decision tables can be used for component tests.

III. Several test cases can be selected for each column of the decision table.

IV. The conditions in the decision table represent negative tests generally.

A.

I, Ill

B.

II, Ill

C.

II, IV

D.

I, IV

Full Access
Question # 97

Which of the following is a correct set of boundary values to test the "Group Size" parameter, as defined by the following statement;

"In a reservation system for groups visiting a small museum, the graphical user interface presents a field asking the number of group members. Group size can be anywhere from 2 to 20 visitors"

A.

0,1,8,21,22

B.

0,1,2,3,10,19,20,21,22

C.

2,3,19,20

D.

1,2,20,21

Full Access
Question # 98

Which of the following tool types is the most useful one for a test manager?

A.

Modeling tool

B.

Static analysis tool

C.

Coverage measurement tool

D.

Defect tracking tool

Full Access
Question # 99

The following sentences refer to the Standard for Software Test Documentation' specification (IEEE 829). Which sentence is correct?

A.

The key to high quality test documentation regimes is strict adherence to this standard

B.

Any deviation from this standard should be approved by management, marketing & development

C.

This test plan outline is relevant for military projects For consumer market projects there is a different specification with fewer items

D.

Most test documentation regimes follow this spec to some degree, with changes done to fit a specific situation or organization

Full Access
Question # 100

Given the following requirement:

Which of the following statements is NOT correct?

A.

7 and 13 are boundary values for the equivalence partition including age 10.

B.

Thursday is a valid input boundary value

C.

A minimum of 6 valid test cases are derived from boundary value analysis based on input age

D.

$3.01 is a valid output boundary value

Full Access
Question # 101

A software company adopts the V-model as their development life cycle. Which of the following contains roles of a tester in this company?

A.

Decide what should be automated, to what degree, and how.

B.

Review test plans and set up test environments.

C.

Coordinate the test strategy with the project managers

D.

Introduce suitable metrics to measure the testing progress

Full Access
Question # 102

Which of the following is correct?

A.

Intrusive test tools are tools that do not exhibit the probe-effect

B.

Testing tools can be used by both developers and testers

C.

Use of testing tools is effective only when done as part of a test automation system

D.

Testing tools allow developers do testing Use of such tools changes the role of the test team

Full Access
Question # 103

The following test cases for a Library Management System are available to test changes made to the functions and data structures associated with borrowers

1. Add a new borrower to the system

2. Update a borrower's data

3. Remove a borrower from the system

4. Loan a book to a borrower

5. Return a book from a borrower

6. Reserve a book for a borrower

7. Send "reservation ready" message to a borrower

Which of the following test sequences represents a possible use case? (a test sequence always start with test #1)

A.

1-4-2-7-5-6-3

B.

1-6-2-5-7-4-3

C.

1-6-4-7-5-3-2

D.

1-2-6-7-4-5-3

Full Access
Question # 104

Testing should provide sufficient information to stakeholders to make informed decisions about the release of the software or system being tested. At which of the following fundamental test process activity the sufficiency of the testing and the resulting information are assessed?

A.

Implementation and execution

B.

Requirements specification

C.

Evaluating exit criteria and reporting.

D.

Analysis and design

Full Access
Question # 105

Which of the following test techniques is structure-based?

A.

Control flow testing

B.

Use case testing

C.

State transition testing

D.

Decision table testing

Full Access
Question # 106

"Statement Testing" is part of;

A.

Experience based testing

B.

Decision Testing

C.

Specification Based testing

D.

Structured based testing

Full Access
Question # 107

Which of the following is an appropriate reason for maintenance testing?

A.

Bugs found in the field after upgrading the operation system

B.

Bugs found during system testing

C.

Bugs found during unit testing

D.

Bugs found during integration testing

Full Access
Question # 108

The following incident report that was generated during test of a web application

What would you suggest as the most important report improvement?

Defect detected date: 15.8.2010

Defect detected by. Joe Smith

Test level System test

Test case Area 5/TC 98

Build version: 2011-16.2

Defect description After having filled out all required fields in screen 1,1 click ENTER to continue to screen 2. Nothing happens, no system response at all.

A.

Add an impact analysis

B.

Add information about which developer should fix the bug

C.

Add the time stamp when the incident happened

D.

Add information about which web browser was used

Full Access
Question # 109

What does the term Pesticide paradox' refer to?

A.

The phenomena where a piece of code that has a lot of bugs is likely to have more hidden, yet unfound

B.

The decreasing efficiency of debugging when done in code that has many bugs

C.

Reduced effectiveness of test cases that are repeated and focused on the same scenarios

D.

The redundancy of testing the same objects in both black and white box techniques

Full Access