Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CTAL-TAE Questions and Answers

Question # 6

Which of the following statements about the reuse of TAS artefacts is TRUE?

A.

Reusable TAS artefacts can include components (or parts of components) associated with different layers of the TAA

B.

To enable reuse of TAS artefacts, a good design for reuse is built into the TAA and to further action are needed during the TAS lifecycle

C.

Communications maintenance and improvements for reusing TAS artefacts are modify addressed during the design of the TAA

D.

Reusable TAS artifacts associated with the definition layer of the TAA include the adaptors to the SUT components and/or interfaces

Full Access
Question # 7

Consider a TAS aimed at implementing and running automated test scripts at the UI level on web apps. The TAS must support cross-browser compatibility for a variety of supported browsers, by ensuring that the same test script will run on such browsers in the same way without making any changes to it. This is achieved by introducing appropriate abstractions into the TAA for connection and interaction with different browsers. Because of this, the TAS will be able to make direct calls to the supported browsers using each different browser’s native support for automation. Which of the following SOLID principles was adopted?

A.

Dependency inversion principle

B.

Open-closed principle

C.

Liskov substitution principle

D.

Interface segregation principle

Full Access
Question # 8

A new TAS allows the implementation of automated data-driven test scripts. All the tasks planned for the initial deployment of this TAS, aimed at installing and configuring the TAS components and provisioning the infrastructure, will be performed manually by a dedicated, specialized team. This TAS is expected to be deployed in the future in other similar environments. As a TAE, you see a risk that the correct and reproducible deployment of the TAS cannot be guaranteed. Which of the following options is BEST suited for mitigating this risk?

A.

Nothing needs to be done, because the team that will manually perform the specified tasks, as they are specialized, will not make mistakes and will therefore be able to ensure a correct and reproducible deployment

B.

Partition the data tables containing test data used by data-driven test scripts into smaller data tables, using an appropriate logical criterion, to make them more manageable

C.

Review data-driven test scripts to better organize test libraries by adding test functions containing identical sequences of actions commonly implemented in a relevant number of scripts

D.

Try to automate most of the tasks related to the installation and configuration of the TAS components and those related to the provisioning of the infrastructure

Full Access
Question # 9

You are using a gTAA to create a TAS for a project. The TAS is aimed specifically at automating a suit of existing manual test cases for standalone desktop applications. All the interfaces between the TAS and SUT will be from the CUI of the application.

Which of the following layers of the gTAA should you focus on for the TAS?

A.

The test Generation layer

B.

The Test Definition layer

C.

The Test Adaption layer

D.

The Test Execution layer

Full Access
Question # 10

Which of the following BEST describes why it is important to separate test definition from test execution in a TAA?

A.

It allows developing steps of the test process without being closely tied to the SUT interface.

B.

It allow choosing different paradigms (e.g event-driven) for the interaction TAS and SUT

C.

It allows specify test cases without being closely tied to the tool to run them against the SUT

D.

It allows testers to find more defects on the SUT

Full Access
Question # 11

You are reviewing the testability of your SUT.

Which of the following BEST refers to the characteristic of OBSERVABILITY?

A.

The ability of the SUT to perform its intended function for a specified period of time

B.

The ability to exercise the SUT by entering inputs, triggering events and invoking methods

C.

The ability of the SUT to prevent unauthorized access to its components or data.

D.

The ability to identify states, outputs, intermediate result and error messages in the SUT

Full Access
Question # 12

(Which of the following aspects of “design for testability” is MOST directly associated with the need to define precisely which interfaces are available in the SUT for test automation at different test levels?)

A.

Autonomy

B.

Architecture transparency

C.

Controllability

D.

Observability

Full Access
Question # 13

Which of the following information in API documentation is LEAST relevant for implementing automated tests on that API?

A.

Release notes/change logs on past changes to the API

B.

Details about the parameters accepted by each API endpoint

C.

Authentication mechanisms required to access the API

D.

Details about the format of the API responses

Full Access
Question # 14

An automated test script makes a well-formed request to a REST API in the backend of a web app to add a single item for a product (with ID = 710) to the cart and expects a response confirming that the product is successfully added. The status line of the API response is HTTP/1.1 200 OK, while the response body indicates that the product is out of stock. The API response is correct, the test script fails but completes, and the message to log is: The product with ID = 710 is out of stock. Cart not updated. When this occurs, you are already aware that both the failed test and the API are behaving correctly and that the problem is in the test data. The TAS supports the following test logging levels: FATAL, ERROR, WARN, INFO, DEBUG. Which of the following is the MOST appropriate test logging level to use to log the specified message?

A.

FATAL

B.

INFO

C.

DEBUG

D.

WARN

Full Access
Question # 15

Which of the following is the BEST example of how static analysis tools can help improve the test automation code quality in terms of security?

A.

Static analysis tools do not generate false positives when attempting to detect security vulnerabilities within test automation code

B.

Static analysis tools can help detect the presence of repeated instances of code within test automation code

C.

Static analysis tools can help detect hard-coded credentials that expose sensitive information within test automation code

D.

Static analysis tools can ensure there are no security vulnerabilities within test automation code

Full Access
Question # 16

Consider a TAS implemented to perform automated testing on native mobile apps at the UI level, where the TAF implements a client-server architecture. The client runs on-premise and allows creation of automated test scripts using TAF libraries to recognize and interact with the app’s UI objects. The server runs in the cloud as part of a PaaS service, receiving commands from the client, translating them into actions for the mobile device, and sending the results to the client. The cloud platform hosts several mobile devices dedicated for use by this TAS. The device on which to run test scripts/test suites is specified at run time. You are currently verifying whether the test automation environment and all other TAS/TAF components work correctly. Which of the following activities would you perform to achieve your goal?

A.

Manage the infrastructure that hosts the server, including hardware, software updates, and security patches

B.

Check whether the references to the device on which the given test scripts/test suites will be executed are correctly hard-coded within these test scripts/test suites

C.

Check whether the TAF libraries that the test scripts will use to recognize and interact with the app’s UI objects (widgets) function as expected

D.

Check whether all test scripts that will be executed by the TAS as part of a given test suite have expected results

Full Access
Question # 17

The GUI of a Customer Relationship Management (CRM) application has been delivered through internet Explorer with proprietary Active X and Java controls. This implementation enables rich client capabilities, but specific commercial automation tools are necessary to automate test cases at GUI of functional test cases. This is to demonstrate whether a small set of the commercial are able to properly recognize actions taken by a tester when interacting with GUI of the CRM application.

Which of the following scripting techniques would be MOST suitable in this scenario?

A.

Data-driven scripting

B.

Keyword-driven scripting

C.

Linear scripting

D.

Structure scripting

Full Access
Question # 18

You are currently conducting a Proof of Concept (PoC) aimed at selecting a tool that will be used for the development of a TAS. This TAS will exclusively be used by one team within your organization to implement automated UI-level test scripts for two web apps. The two tools selected for the PoC use JavaScript/TypeScript to implement the automated test scripts and offer capture and playback capabilities. Three test cases for each of the two web apps were selected to be automated during the PoC. The PoC will compare these two tools in terms of their effectiveness in recognizing and interacting with UI widgets exercised by the test cases, to quickly determine whether test automation is possible and which tool is better. Which of the following TAFs is BEST suited for conducting the PoC?

A.

A one-layer TAF (test scripts)

B.

A two-layer TAF (test scripts, test libraries)

C.

A three-layer TAF (test scripts, business logic, core libraries)

D.

A layered TAF with more than three layers

Full Access
Question # 19

An automated test case that should always pass sometimes passes and sometimes fails intermittently (non-deterministic behavior) when executed in the same test environment, even if no code (i.e., SUT code or the test automation code) has been changed. Which of the following statements about the root cause of this non-deterministic behavior is TRUE?

A.

The specified root cause is a race condition that can be identified by also analyzing the log files of the test case, the SUT, and the TAF

B.

Determining the specified root cause may require, in addition to the TAE, the support of others such as developers and system engineers

C.

The specified root cause must be in the instability of the test environment, since no code has been changed

D.

Determining the specified root cause is certainly easier than if the automated test always fails (deterministic behavior)

Full Access
Question # 20

Consider a TAS that is going to be deployed for the first time. The TAS requires share resources and run it its own test environment. The infrastructure for the TAS has been created along with maintenance procedures. It is very unlikely the TAS will be required to work in other target

Environments. There is a high-risk that when the TAS is deployed in its own test environment, a number of existing application will no longer work because of conflicts with the existing shared resources.

Which of the following activities would you expect to be MOST effective at mitigating the risk associated with the first deployment of the TAS?

A.

Testing the TAS for application compatibility issues in the target environment

B.

Testing the TAS for its ability to be implemented in other target test environments.

C.

Testing the TAS for regressions due to optimization that fix non-functional issues.

D.

Testing the TAS for ITS ability to run a shared test environment

Full Access
Question # 21

Which one of the following answers does NOT refer to an example of configuration item(s) that should be specified in development pipelines to identify a test environment (and its specific test data) associated with a web app under test on which to execute automated tests?

A.

The number and type of automated tests to execute in the test environment where the web app is deployed

B.

The base URL of the test environment where the web app is deployed (i.e., the root address for accessing the web app)

C.

The connection string(s) to connect to the test database(s) within the test environment where the web app is deployed

D.

The URLs of web APIs/web services related to the web app’s backend within the test environment where the app is deployed

Full Access
Question # 22

You have been tasked with adding the execution of build verification tests to the current CI/CD pipeline used in an Agile project. The goal of these tests is to verify the stability of daily builds and ensure that the most recent changes have not altered core functionality. Currently, the first activity performed as part of this pipeline is the static source code analysis. Which of the following stages in the pipeline would you add the execution of these smoke tests to?

A.

As a first activity, before performing static source code analysis and before generating the new build

B.

After performing static analysis on the source code and before generating the new build

C.

After deploying the new build to the test environment and before performing more extensive testing

D.

As a final activity, immediately before releasing the new build into production

Full Access
Question # 23

Which of the following is NOT a technical design consideration for a TAA?

A.

The number of users for the SUT

B.

Availability of interfaces for the SUT to be testable

C.

Standards and Legal requirements, e.g data privacy

D.

Data used by the SUT, e.g configuration, users

Full Access
Question # 24

You are evaluating the best approach to implement automated tests at the UI level for a web app. Specifically, your goal is to allow test analysts to write automated tests in tabular format, within files that encapsulate logical test steps related to how a user interacts with the web UI, along with the corresponding test data. These steps must be expressed using natural language words that represent the actions performed by the user on the web UI. These files will then be interpreted and executed by a test execution tool. Which of the following approaches to test automation is BEST suited to achieve your goal?

A.

Test-driven development

B.

Keyword-driven testing

C.

Data-driven testing

D.

Linear scripting

Full Access