Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISTQB-CTFL Exam Dumps - ISTQB Certified Tester Foundation Level (CTFL) v4.0

Go to page:
Question # 17

The following incident report that was generated during test of a web application.

What would you suggest as the most important report improvement?

Defect detected date: 15 8.2010

Defect detected by: Joe Smith

Test level System test

Test case: Area 5/TC 98

Build version: 2011-16.2

Defect description After having filled out all required fields in screen 1, t click ENTER to continue to screen 2 Nothing happens, no system response at all.

A.

Add information about which web browser was used

B.

Add information about which developer should fix the bug

C.

Add the time stamp when the incident happened

D.

Add an impact analysis

Full Access
Question # 18

In which one of the following test techniques are test cases derived from the analysis of the software architecture?

A.

Black-box test techniques.

B.

Experience-based test techniques.

C.

Checklist-based test techniques.

D.

White-box test techniques.

Full Access
Question # 19

Which of the following statements are true?

1. Early and frequent feedback helps to avoid requirements misunderstanding.

2. Early feedback allows teams to do more with less.

3. Early feedback allows the team to focus on the most Important features.

4. Early and frequent feedback clarifies customer feedback by applying static testing techniques

Select the correct answer:

A.

3

B.

2

C.

1

D.

4

Full Access
Question # 20

Which of the following statements is an example of testing contributing to higher quality?

A.

A test leader writes a test summary report

B.

A project manager asks to a test leader to estimate the test effort

C.

A tester installs a test ten in the lest environment

D.

A tester finds a bug which is resolved prior to release

Full Access
Question # 21

For each of the test cases to be executed, the following table specifies the priority order and dependencies on other test cases

Which of the following test execution schedules is compatible with the logical dependencies and allows executing the test cases in priority order?

A.

TC4, TC3, TC2, TC6, TC5. TC1

B.

TC4, TC6, TC3, TC2, TC5, TC1

C.

TC3, TC5, TC6, TC1, TC4, TC3

D.

TC4, TC3, TC2, TC6, TC1, TC5

Full Access
Question # 22

Which of the following BEST explains a drawback of independent testing?

A.

Having the business organization participate as an independent test team can hurt the overall testing effort since business participants are often not trained nor experienced in testing

B.

Due to their differing backgrounds and perspectives, an independent test team may discover defects which the developers did not uncover

C.

An independent test team may be isolated from the rest of the development and project team

D.

An independent test team may possess specializations in specific test types such as usability or security which detract from the overall effectiveness of the test team

Full Access
Question # 23

Given the following state model of sales order software:

SEE ATTACHMENT

Which of the following sequences of tran-sitions provides the highest level of tran-sition coverage for the model (assuming you can start in any state)?

A.

IN PRODUCTION -> CANCELLED -> PLACED -> IN PRODUCTION -> CANCELLED -> PLACED

B.

IN PRODUCTION -> SHIPPED -> INVOICED -> CANCELLED -> PLACED -> IN PRODUCTION

C.

PLACED -> IN PRODUCTION -> SHIPPED -> CANCELLED -> PLACED

D.

PLACED -> CANCELLED -> PLACED -> CANCELLED -> PLACED -> IN PRODUCTION -> CANCELLED

Full Access
Question # 24

As a tester, as part of a V-model project, you are currently executing some tests aimed at verifying if a mobile app asks the user to grant the proper access permissions during the installation process and after the installation process. The requirements specification states that in both cases the app shall ask the user to grant access permissions only to the camera and photos stored on the device. However, you observe that the app also asks the user to grant access permission to all contacts on the device. Consider the following items:

[I]. Test environment

[ii]. Expected result

[iii]. Actual result.

[IV] Test level.

[V]. Root cause.

Based on only the given information, which of the items listed above, are you able to CORRECTLY specify in a defect report?

A.

[l] and [IV]

B.

[ii] and [III].

C.

[ii], [iii] and [v]

D.

[ii], [IV] and [V].

Full Access
Go to page: