Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ISTQB-CTFL Questions and Answers

Question # 6

What type of testing measures its effectiveness by tracking which lines of code were executed by the tests?

A.

Acceptance testing

B.

Structural testing

C.

Integration testing

D.

Exploratory testing

Full Access
Question # 7

Which of the following s the most correct statement about state testing techniques?

A.

Static techniques can be used before all code is ready for execution

B.

Static techniques find more detects then dynamic techniques.

C.

Static techniques can be used by inexperienced users.

D.

Static techniques are always cheaper than dynamic techniques.

Full Access
Question # 8

Given the following review process main activities and specific review activities:

a.Planning

b.Initiate review

c.Issue communication and analysis

d.Fixing and reporting

1.Creating defect reports

2.Estimating effort and timeframe

3.Recording updated status of defects

4.Selecting the people to participate

5.Distributing the work product and other material

6.Evaluating the review findings

Which of the following BEST matches the review process main activities with the appropriate specific review activities?

A.

2-a, 4-a, 5-b, 6-c, 1-d, 3-d

B.

2-a, 5-a, 1-b, 4-b, 3-c, 6-d

C.

1-a, 4-b, 5-b, 6-c, 2-d, 3-d

D.

2-a, 4-b, 5-c, 1-d. 3-d, 6-d

Full Access
Question # 9

Which of the following statements BEST describes how test cases are derived from a use case?

A.

Test cases are derived based on non-functional requirements such as usability

B.

Test cases are created using white-box test techniques to execute scenarios of use cases

C.

Test cases are derived based on pair testing between a user and a tester to find defects

D.

Test cases are designed to cover various user behaviors, including basic, exceptional or alternative and error behaviors associated with human users or systems

Full Access
Question # 10

A software module to be used in a mission critical application incorporates an algorithm for secure transmission of data.

Which review type is most appropriate to ensure high quality and technical correctness of the algorithm?

A.

Walkthrough

B.

Informal Review

C.

Technical Review

D.

Management Review

Full Access
Question # 11

For a mandatory input field "ZIP code" the following rules are given:

1 - The valid ZIP code format is 5 numeric digits.

2 - The code has to exist in the post office's official ZIP code list

Using equivalence classes partitioning, how many test cases are required to test this field?

A.

8

B.

3

C.

6

D.

4

Full Access
Question # 12

Which of the following statements about testware are correct?

I When closing the test activities, all the testware resources can be uninstalled and released

II All the testware should be subject to Configuration Management

III. The testware. at the end of the project, should be transferred to the organization responsible for maintenance

IV The developers are responsible for the correct installation of the testware

A.

II, Ill

B.

I, Ill

C.

I, IV

D.

II, IV

Full Access
Question # 13

Which or the following would be a key difference between a peer review of code and static analysis of code using a tool?

A.

A peer reviews finds defects while static analysis finds failures.

B.

Static analysis targets the code technically whereas Peer review is applicable to further aspects.

C.

Peer reviews cannot find missing requirements whereas static analysis can

D.

A peer reviews find failures while static analysis finds defects.

Full Access
Question # 14

You are responsible for applying the correct technique for a review of the requirements document for a project to develop a new software application. You identify the reviewers and the required roles, including the meeting leader, who is the requirements document author, and a separate role for a scribe. Additionally, you decide to take a relatively informal approach to the requirements review. The goal of the review is to find defects in the requirements document, such as omissions, Inconsistencies, and duplications. Another goal of the review is to improve the software application's usability and accessibility by considering the various stakeholders' viewpoints.

Which of the following statements BEST describes this scenario?

A.

This scenario is using a pair review type and a perspective-based review technique

B.

This scenario is using a walkthrough review type and a checklist-based review technique

C.

This scenario is using a walkthrough review type and a perspective-based review technique

D.

This scenario is using a pair review type and a checklist-based review technique

Full Access
Question # 15

Which of the following statements is LEAST likely to be describing component testing?

A.

It identifies defects in modules and classes.

B.

Simulators and stubs may be required.

C.

It mainly tests interfaces and interaction between components.

D.

It may be applied using a test-first approach.

Full Access
Question # 16

Which of the following statements regarding inspection is NOT true?

A.

An inspection may be led by a trained moderator who shall not be the author.

B.

The main purpose of an inspection is to find solutions to the problems.

C.

An inspection can be performed by peers.

D.

An inspection shall follow a formal process based on rules and checklists with entry and exit criteria

Full Access
Question # 17

"Statement Testing" is part of;

A.

Specification Based testing

B.

Decision Testing

C.

Experience based testing

D.

Structured based testing

Full Access
Question # 18

Which of the following is an example of the absence-of-errors fallacy?

A.

Repeating the same test cases will continue to find new defects, even after dozens of executions

B.

A small number of modules contains the most defects

C.

Since testing found very few defects, the system certainly will be successful

D.

Other than trivial cases, it is not feasible to test all combinations of inputs and preconditions

Full Access
Question # 19

A system has valid input numbers ranging between 1000 and 99999 (both inclusive). Which of the following inputs are a result of designing tests for all valid equivalence classes and their boundaries?

A.

999.1000.23232.99999.100000

B.

999.1000.50000.100000.100001

C.

999.100000

D.

1000,50000,99999

Full Access
Question # 20

Which of the following is NOT a common objective of testing?

A.

Finding defects in the software

B.

Preventing defects

C.

Debugging the software to find the reason for defects

D.

Providing information on the status of the system

Full Access
Question # 21

Which of the following would be LEAST appropriate as part of an incident report covering the observation of a failure during testing?

A.

SOL injection into the username entry field allowed a variety of SQL commands to be executed by the application without the appropriate authority.

B.

The user interface was complicated and confusing and I found It quite difficult to follow

the test script.

C.

The updates made as part of the add new member' function did not reflect the expected change as the name was written into the address field.

D.

The expected result for the ‘list friends' response time was less than 10 seconds, whereas the average response time obtained was 13 seconds.

Full Access
Question # 22

Which of the following is correct with regards to debugging?

A.

Debugging identifies the cause of a failure

B.

Debugging is often performed by test engineers

C.

Debugging is considered part of the testing activities

D.

Debugging is intended to find as many defects as possible in the code

Full Access
Question # 23

An Incident Management tool implements the following defect states; Open, Assigned, Solved,

Closed Consider the following defect report:

Id T000561

Test Object "Warehouse Management' application

Tester name; John Bishop

Date: 10th. April 2010

Test Case MRT558I

Status OPEN

Severity Serious

Priority

Problem- After inputting the Total Quantity item = 450 in the SV034 screen, the system shows an unexpected Error message=47

Correction:

Developer name:

Closing date:

Which of the following is a valid criticism of this report?

A.

The Priority, the Correction description and the Developer name are missing

B.

The version of the application is missing

C.

There is no link to the applicable requirement (traceability)

D.

The description is not highlighting the source of the problem

Full Access
Question # 24

Which of the following coverage criteria results in the highest coverage for state transition based test cases?

A.

Can't be determined

B.

Covering all transitions at least once

C.

Covering only start and end states

D.

Covering all states at least once

Full Access
Question # 25

When should component integration tests be carried out?

A.

Integration tests should always be done after system tests

B.

Integration tests should be done at the customer's site, after acceptance tests

C.

Integration tests can be done before or after system tests

D.

Integration tests should always be done before system tests

Full Access
Question # 26

Which of the following is NOT an objective of testing?

A.

Finding defects

B.

Providing information for decision-making

C.

Gaining confidence about the level of quality of the software

D.

Analyzing and removing the cause of failures

Full Access
Question # 27

Why it is essential that defects found in a review be reported objectively?

A.

In order to facilitate easy entry of detected defects in a OTS (Defect Tracking System)

B.

In order to allow the author of reviewed work product(S) to take the feedback positively as an effort at improving the product (S) and not as a personal assault

C.

In order to allow the review moderator to easily understand them, and assign them to the right developer for fixing

D.

In order to allow augmentation of existing checklists used for reviewing the work product (S)

Full Access
Question # 28

A software system checks age in order to determine which welcome screen to display. Age groups are:

Group I: 0-12

Group II; 13-18

Group III: over 18

Which of the below represent boundary values?

A.

(-1.0.12.13.18,19)

B.

(-1.0,11.12.13,14,18.19)

C.

(0.12.13.18.19)

D.

(4.5.15.20)

Full Access
Question # 29

Which of the following statements about test estimation approaches is CORRECT?

A.

The Wideband Delphi estimation technique is an example of the risk-based approach

B.

The Wideband Delphi estimation technique is an example of the expert-based approach

C.

Bumdown charts used in Agile development is an example of the risk-based approach

D.

Burndown charts used in Agile development is an example of the expert-based approach

Full Access
Question # 30

Which of the following is a possible reason for introducing a defect in software code?

A.

Rushing to meet a tight deadline to turn code over for testing

B.

Improper unit testing

C.

Improper system testing

D.

Focus on static testing over dynamic testing

Full Access
Question # 31

Which of the following is MOST likely to be an example of a PROJECT risk?

A.

A computation is not always performed correctly in some situations

B.

A system architecture may not support some non-functional requirements

C.

Team members' skills may not be sufficient for the assigned work

D.

Specific modules do not adequately meet their intended functions according to the user

Full Access
Question # 32

The following incident report that was generated during test of a web application.

What would you suggest as the most important report improvement?

Defect detected date: 15 8.2010

Defect detected by: Joe Smith

Test level System test

Test case: Area 5/TC 98

Build version: 2011-16.2

Defect description After having filled out all required fields in screen 1, t click ENTER to continue to screen 2 Nothing happens, no system response at all.

A.

Add information about which web browser was used

B.

Add information about which developer should fix the bug

C.

Add the time stamp when the incident happened

D.

Add an impact analysis

Full Access
Question # 33

Which of the following statements is an example of testing contributing to higher quality?

A.

A test leader writes a test summary report

B.

A project manager asks to a test leader to estimate the test effort

C.

A tester installs a test ten in the lest environment

D.

A tester finds a bug which is resolved prior to release

Full Access
Question # 34

As the last stage of a test cycle of an embedded device, you are performing exploratory testing. You observed that some character. (A, X and Z) sent via a serial port to the device do not get registered on the device whereas they should be. You suspect that this could be due to a wrong configuration of the "bit parity" parameter.

Which of the following items of an incident report would you be UNABLE to write down based on this information?

A.

Expected result

B.

Test case identifier

C.

Test setup details

D.

Actual result

Full Access
Question # 35

Which sequence of stated in the answer choices is correct in accordance with the following figure depicting the life-cycle of a defect?

A.

S0->S1->S2->S3->S5->S1

B.

S0->S1->S2->S3->S5->S1->S2->S3

C.

S0->S1->S2~>S3->S4

D.

S0->S1 ->S2->S3->S5->S3->S4

Full Access
Question # 36

Which of the following is the BEST reason for selecting a particular type of software development lifecycle model?

A.

The project manager's preference

B.

Tester skill level with the software development lifecycle model

C.

The project team's overall familiarity with the model

D.

The type of product being developed

Full Access
Question # 37

A software application incorrectly provided customers discounts of 50% off their total purchases if the purchases exceeded S100. It was discovered through an audit that the discount should have been only 5% off these purchases. A root cause analysis uncovered that the requirements Incorrectly stated 50% instead of 5% in this scenario.

Which of the following MOST accurately reflects this scenario?

A.

The audit finding Is the root cause, the incorrect calculation of 50% Is the defect, and the Incorrect requirement Is the effect

B.

The incorrect customer discount is the effect and the reason for the requirement error is the root cause

C.

The incorrect discount is the root cause, requiring a root cause analysis which led to investigating the software code, design, and requirements

D.

A defect in the code is determined to be the root cause of the incorrect calculation

Full Access
Question # 38

Consider the following statements about risk-based testing.

I) Risk-based testing has the objective to reduce the level of protect risks.

II) Tests should be prioritized to find tie critical detects as early as possible.

III) Non-testing activities may also help to reduce risk

IV) Risks have to be reassessed on a regular basis.

V) The project stakeholders can give useful input to determine the risks

A.

I III IV and V are true. II is false.

B.

II, III IV and V are correct. I is false.

C.

C. I, II and IV are true. III and V are false.

D.

II, Ill and V are true. 1 ants Iv are false.

Full Access
Question # 39

Which of the following applications will be the MOST suitable for testing by Use Cases

A.

Accuracy and usability of a new Navigation system compared with previous system

B.

A billing system used to calculate monthly charge based or large number of subscribers parameters

C.

The ability of an Anti virus package to detect and quarantine a new threat

D.

Suitability and performance of a Multi media (audio video based) system to a new operating system

Full Access
Question # 40

A test manager decided to skip static testing since he believes bugs can be found easily by doing dynamic testing. Was this decision right or wrong?

A.

The decision was wrong. Ensuring quality mandates that static testing is performed after performing the dynamic testing.

B.

The decision was right. Static testing is usually redundant if a product is planned to go through a full-cycle of dynamic testing.

C.

The decision was right. Most of the bugs are easier to identify during the dynamic testing.

D.

The decision was wrong. Static testing can find defects early in the development process, reducing the overall cost of testing and development

Full Access
Question # 41

Which of the following statements about independent testing is WRONG?

A.

Independent testing is necessary because developers don't know any testing.

B.

Independent testing is best suited for the system test level.

C.

A certain degree of independence makes the tester more effective at finding defects.

D.

Independent test teams may find other types of detects than developers who are familiar with the system's structure.

Full Access
Question # 42

ST is a Software Testing organization which utilizes a testing knowledge base. Access to ST knowledge base can be either full or limited. Access level is determined based on ST certification and testing experience as follows:

1. If ST certified, with less than 5 years testing experience - allow limited access

2. If ST certified, 5-10 years of testing experience - allow full access

3. If not ST certified with 5-10 years of testing experience - allow limited access.

What would be the results for:

A - ST certified. 12 years of testing experience

B - Not ST certified. 7 years of testing experience

C - Not ST certified. 3 years of testing experience

A.

A - unknown

B - limned access

C- unknown

B.

A - full access

B - limited access

C - unknown

C.

A - full access

B - limited access

C - limited access

D.

A - unknown

B - full access

C - unknown

Full Access
Question # 43

Which are the MAIN goals of risk management in a software project?

A.

To increase the success probability for the project regardless of costs.

B.

To increase focus on preventative processes and to increase satisfaction for the testers.

C.

To control contractual problems and minimize the impacts of company policies.

D.

To reduce the probability of undesired situations and to reduce the effect of potential impact.

Full Access
Question # 44

Which of the following is true about Oracles?

A.

Sometimes old version of a product can be used as an Oracle

B.

Oracles help in reproducing the irreproducible bugs

C.

Oracles are derived from the design

D.

Oracles can be generated automatically using data generators

Full Access
Question # 45

In maintenance testing, what is the relationship between impact analysis and regression testing?

A.

Impact analysis requires a regression testing for only the tests that have detected faults in previous SW release

B.

There is no relationship between impact analysis and regression testing.

C.

Impact analysis requires a regression testing for all program elements which were newly integrated (new functionalities).

D.

The impact analysis is used to evaluate the amount of regression testing to be performed.

Full Access
Question # 46

Why should you choose a test technique?

A.

Because you need to match the way you test to the content of the product under test

B.

Because of the time constraints that usually accompany a test project

C.

Because this way you cover the full scope of the product's functionality

D.

Because choosing a test technique is a common practice in software testing

Full Access
Question # 47

Which or the following is a valid collection of equivalence classes for the following problem: An integer field shall contain values from and including 1 to and including 15.

A.

Less than 0.1 through 14. 15 and more

B.

Less than 1.1 through 14. more than 15

C.

negative numbers. 1 through 15. above 15

D.

Less than 1.1 through 15. more than 15

Full Access
Question # 48

Which of the following tasks is MOST LIKELY to be performed by the tester?

A.

Develop a test strategy and test policy for the organization

B.

Promote and advocate the test team within the organization

C.

Create the detailed test execution schedule

D.

Introduce suitable metrics for measuring test progress

Full Access
Question # 49

Which of the following activities does NOT belong to a typical technical review?

A.

Pre-meeting preparation by reviewers

B.

Using checklists during the meeting

C.

Inviting end-users to the meeting

D.

Preparation of a review report

Full Access
Question # 50

Which of the following sentences describe a product risk?

A.

The application might not be able to provide the expected responsiveness under a load of up-lo 300 concurrent users

B.

Failure in acquiring an adequate and test automation tool

C.

A wrong configuration of the test environment that causes incidents related to the environment and not to the software under test

D.

The development team lacks knowledge of the technology on which the product is based

Full Access
Question # 51

Which of the following is NOT a deciding factor m determining the extent of testing required?

A.

Level of risk of the product or features

B.

Budget to do testing

C.

A particular tester involved in testing

D.

Time available to do testing

Full Access