Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ISTQB > Advance Level > CTAL-TTA

CTAL-TTA Certified Tester Advanced Level Technical Test Analyst Question and Answers

Question # 4

Which of the following is a valid reason for including security testing in a test approach?

A.

There is a threat of unauthorized copying of applications or data.

B.

To provide measurements from which an overall level of availability can be obtained.

C.

To evaluate the ability of a system to handle peak loads at or beyond the limits of its anticipated or specified workloads

D.

Software changes will be frequent after it enters production.

Full Access
Question # 5

You are working for a video game manufacturer You have a new title being released Market interest in the product is at an all time high and everyone in the company has been promised huge bonuses if the launch is successful You are responsible for portability testing Which area, m particular should you emphasize in your testing?

A.

Installability

B.

Replaceability

C.

Analyzability

D.

Learnability

Full Access
Question # 6

As a technical test analyst, you are involved in a risk analysis session using the Failure Mode and Effect Analysis technique. You are calculating risk priorities. Which of the following are the major factors in this exercise?

A.

Severity and priority

B.

Functionality, reliability, usability, maintainability, efficiency and portability

C.

Likelihood and impact

D.

Financial damage, frequency of use and external visibility

Full Access
Question # 7

Which statement about test automation is TRUE7

SELECT ONE OPTION

A.

The term ‘test automation' refers to the automation of test execution

B.

Test automation can encompass include the configuration of test environments

C.

Creating and maintaining test automation frameworks is better done within the iteration teams

D.

it is more effective to have a single automation strategy for large projects

Full Access
Question # 8

When conducting a data flow analysis of following section of pseudo code:

Declare Function_Biggest integer (inputl integer. Input2 Integer) }

Declare output Integer

Set output = inputl

If input2 > output then

Set output = input2

Endif

Return output

}

Which of the variables utilized above has a potential anomalie?

A.

Inputl and input2

B.

None of the variables

C.

output

D.

Function_Biggest

Full Access
Question # 9

Which of the following is a generic risk factor that the Technical Test Analyst must consider?

A.

Integration of a new technology into the product

B.

Compliance requirements for local disability laws

C.

Errors in the business rules in the specifications

D.

Lack of an oracle for interest calculations

Full Access
Question # 10

Given the following code:

If x > y and z = 3 statement!

elseif z = 4 statement

endif;

What is the minimum number of tests needed to achieve 100% decision coverage?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 11

You have identified existing test cases that require re-factoring, Which is the NEXT task you should perform?

SELECT ONE OPTION

A.

Adjust the observable behavior of the tests to meet the user stories

B.

Re run the tests to ensure that the test results remain the same

C.

Analyze the Impact of the functionality of the current iteration on the existing regression tests

D.

Make changes to the internal structure of the tests to improve maintainability

Full Access
Question # 12

Which statement about test automation is TRUE?

SELECT ONE OPTION

A.

Increasing test automation levels may decrease the frequency at which continuous deployments to production can be made

B.

Increasing test automation levels will eliminate the need for manual testing during continuous deployment

C.

Increasing test automation levels to increase the frequency of continuous deployment should always be an objective

D.

Minimizing the test suite by selecting, preparing and running only a subset of tests by using risk analysis should always be an objective

Full Access
Question # 13

The following user story has been written:

As a paying hotel guest

I want to see the charges that have been added to my bill

So that I can monitor my expenditure and know In advance how much I will have to pay when I check out

The notes that have been added to It mention that It must be possible for the guest to get a printout of the bill, see It In a variety of currencies and set a flag in the hotel's billing system against any Item that they wish to challenge.

The following acceptance criteria have been defined:

1.The user shall be able to choose from the most commonly-used currencies.

2.The application must be accessible on most mobile platforms as well as on the hotel room's smart TV.

3.The hotel manager must be notified whenever a bill item is flagged by a hotel guest.

4.End-to-end response time for any individual request submitted by a user must not exceed 7 seconds.

Applying the INVEST technique to this user story, including its acceptance criteria, which of the following statements is correct?

SELECT ONE OPTION

A.

The Testable and Negotiable criteria of INVEST have not been satisfied

B.

The Testable and Small criteria of INVEST have not been satisfied

C.

The INVEST criteria have all been satisfied by this epic

D.

The Negotiable and Small criteria of INVEST have not been satisfied

Full Access
Question # 14

What is the earliest stage in the application's SDLC at which performance efficiency testing can be performed?

A.

During requirements analysis

B.

During unit testing

C.

During system testing

D.

During beta testing

Full Access
Question # 15

You are working on a project that is integrating code from multiple development groups. There have been numerous integration problems, particularly regarding reliability, error recovery and transactional integrity. You are now responsible for planning the performance efficiency testing for this product. There Is a strong feeling among the development managers that some parts of the code are weaker than others and will tend to exhibit problems during the performance efficiency testing. To identify these problematic areas as soon as possible, which type of testing should you do?

A.

Load testing

B.

Interoperability testing

C.

Stress testing

D.

Scalability testing

Full Access
Question # 16

Below is the pseudo-code for the Win program:

The bingo program contains a data flow anomaly. Which data flow anomaly can be found in this program?

A.

Variable 'A" is not assigned a value before using it.

B.

Variable 'D" is defined but subsequently not used.

C.

The program does not contain any comments.

D.

It is recommended to use a variable instead of the hard-coded print results "Win" and *Loose".

Full Access
Question # 17

How many independent paths are shown in the control flow diagram below?

A.

6

B.

3

C.

4

D.

2

Full Access
Question # 18

Which of the following elicitation techniques is BEST usedwhen questioning a large number of stakeholders specifically to obtain information for non-functional acceptance criteria?

SELECT ONE OPTION

A.

Quality Analysis

B.

Quantitative Questionnaires

C.

Qualitative Questionnaires

D.

Qualitative Review

Full Access
Question # 19

Which of the following does NOT contribute to a more effective review preparation by the Technical Test Analyst?

A.

Ensure that participants spend enough time during preparation, e.g.. by managing checking rate (number of pages checked per hour during review preparation).

B.

Managing logging rate (number of defects logged per minute during the meeting).

C.

The usage of review checklists.

D.

Review training for the Technical Test Analyst.

Full Access
Question # 20

Why could test cases need to be refactored in an Agile project?

SELECT ONE OPTION

A.

To maintain bi-directional traceability with the user stories

B.

To increase the breadth of black box coverage

C.

To make them easier to understand and cheaper to modify

D.

To ensure that the tests and code remained aligned

Full Access
Question # 21

You are defining the test approach for an Agile project release focused on significantly overhauling the user interface of a golf club's booking system. Additional features will allow more flexible bookings across three courses. These changes are driven by numerous customer complaints about the current system's confusing design and limited options. The release will consist of six two-week sprints.

Stakeholders have performed a risk assessment and consider the impact of system failure as high due to potential customer loss. A regression-averse strategy is recommended due to the extensive changes expected in screen design and functionality.

Which option below represents the BEST test approach for this release? Please use the following symbols consistently:

  • ♦+ (highly recommended)
  • ♦ (recommended)
  • o (neutral/optional)
  • • (not recommended)
  • - (not to be used)

SELECT ONE OPTION

A.

3

B.

1

C.

4

D.

2

Full Access
Question # 22

Consider the pseudo code for the Answer program:

Which of the following statements about the Answer program BEST describes the control flow anomalies to be found in the program?

A.

The Answer program contains no control flow anomalies.

B.

The Answer program contains unreachable code.

C.

The Answer program contains unreachable code and an infinite loop.

D.

The Answer program contains an infinite loop.

Full Access
Question # 23

Which statement correctly describes service virtualization’’

SELECT ONE OPTION

A.

It is a shareable testing service that simulates the behavior, data and performance of a system or service to which the product or component under test would normally be connected

B.

It is a service which automatically deploys new versions of the software into the production environment at regular and short intervals

C.

it is an integrated set of tools that will automatically compile, test and deliver into a virtual environment a new build of the product under test

D.

it is a collection of mock objects such as stubs and drivers that will allow a product or component to run without some other product or component that it would normally need

Full Access
Question # 24

Which option describes a good practice when applying test automation for a Regression-averse test approach?

SELECT ONE OPTION

A.

Developing and maintaining automated test checklists to efficiently execute a stable set of tests

B.

Applying BDD to produce automated tests before the implementation of a user story

C.

Focusing on the continuous improvement and refactoring of the automated tests

D.

Increasing automated test coverage to allow more time for exploratory testing

Full Access
Question # 25

Which of the following statements is true regarding fault seeding and fault injection tools?

A.

They are used to deliberately Insert defects into the test object to evaluate the quality of the test suite

B.

They are used to determine If the code complies with the performance requirements

C.

They are used to determine the quality of operational acceptance tests

D.

They are used by the developer as debugging tools

Full Access
Question # 26

The following User story is being developed using the 8DD approach:

As a Purchasing Manager

i want to see a list of all Purchase Orders placed so far this month with their total value

So that I can control the amount of money being spent

Which scenario is BOTH written in correct Gherkin format AND is appropriate for this User Story9

SEI ECT ONE OPTION

A.

Given that three Purchase Orders with a total value of £21.75 have been placed so far this month AND the Purchasing Manager has navigated to the Purchase Order Reporting page

When the Purchasing Manager clicks the button 'List of Purchase Orders placed this month’

Then the 3 orders and their total value of £21.75 are displayed

B.

Given that three Purchase Orders with a total value of £21.75 have been placed so far this month

When the Purchasing Manager requests the list of Purchase Orders placed this month

Then the appropriate details are displayed

C.

Given that I am a Purchasing Manager AND three Purchase Orders with a total value of £21.75 have been placed so far this month

When I request the list of Purchase Orders placed this month

Then all orders and their total value of £21.75 are displayed

D.

Given that three Purchase Orders with a total value of £21.75 have been placed so far this month

When the Purchasing Manager requests the list of Purchase Orders placed this month

Then the 3 orders and their total value of £21.75 are displayed

Full Access
Question # 27

Your team is now accountable for the support and enhancement of a payroll system that has been in production for many years and modified by many different developers. It has been noticed by management that small functional enhancements take much longer than equivalent changes on more recently developed systems. You have been tasked with implementing improved testing approaches that will help to identify the root cause of this problem.

Which of the following is the best technique to apply in this scenario?

A.

Orthogonal arrays

B.

Exploratory analysis

C.

Static analysis

D.

Data flow analysis

Full Access
Question # 28

You are testing software that requires you to enter defined order numbers and either add, delete or update the information associated with that order number, which of the following is the minimum set of columns you should see in your keyword-driven input table?

A.

Action, Expected Result, Error Message

B.

Action, Order ID

C.

Action, Order ID, Expected Result

D.

Order ID. Expected Result

Full Access
Question # 29

In order to create a shareable testing service from server or network traffic log data, which of the following types of tool would you use?

SELECT ONE OPTION

A.

A service virtualization tool

B.

A hardware emulator

C.

a parallel development tool

D.

An integrated development environment

Full Access
Question # 30

When conducting a data flow analysis of following section of pseudo code:

Declare C, F, Z Decimal

Set Z = 32

Read F

SetC = (F-Z) * 5/9

Free C, F. Z

Print F

Which of the variables utilized above has a potential anomalie?

A.

C and Z

B.

None of the variables

C.

AI1 °fthe variables

D.

F

Full Access
Question # 31

Consider the pseudo code provided below:

Given the following tests, what additional test(s) (if any) would be needed in order to achieve 100% statement coverage, with the minimum number of tests?

Test 1: A = 7, B = 7, Expected output: 7

Test 2: A = 7, B = 5, Expected output: 5

A.

A=6, B=12, Expected output: Bingo! and A=7, B=9, Expected output: 7

B.

A=6, B=12, Expected output: Bingo!

C.

A=7, B=9, Expected output: 7

D.

No additional test cases are needed to achieve 100% statement coverage.

Full Access
Question # 32

Consider the following section of code:

If ((A > B) or (C > D)) and (E = F) then

print A:

Endif

Which of the following sets of test data can be used to achieve Modified Condition/Decision Coverage with the least number of tests?

A.

Set 3

B.

Set 4

C.

Set 2

D.

Set 1

Full Access
Question # 33

A unit test should be deterministic. Which option correctly describes the meaning of 'deterministic' as a characteristic of a unit test9

SELECT ONE OPTION

A.

It should be small so that many tests can be run in a short period of time

B.

Whenever it is run under the same conditions, it should produce the same results.

C.

it should not depend on any other test.

D.

It should only test the functionality related to it.

Full Access
Question # 34

Within the world of consumer electronics, the amount of embedded software is growing rapidly. The amount of software in high-end television sets has increased by a factor of about eight over the last six years. In addition, the market of consumer electronics has been faced with a 5 -10% price erosion per year. The price of a product is, among a number of other things, determined by the microcontroller used. Therefore, the use of ROM and RAM remains under high pressure in consumer electronic products, leading to severe restrictions on code size.

You are a Technical Test Analyst involved in the review of the architecture of this project.

Which of the following issues would be MOST important to focus on during the review and when verifying the correct implementation?

A.

Connection pooling

B.

Caching

C.

Transaction concurrency

D.

Lazy instantiation

Full Access
Question # 35

Consider the following section of code:

If ((A > B) or (C > D)) and (E = F) then

print A;

Endlf

Which of the following sets of test data can be used to achieve multiple condition coverage with the least number of tests?

A.

Set 4

B.

Set 3

C.

Set 2

D.

Set 1

Full Access
Question # 36

Subject to testing is a software system (COTS) for Project Administration and Control (PACS). PACS is a multi-project system for controlling the project time, e.g., in terms of scheduling and tracking, and managing the productivity of projects, e.g., in terms of effort and deliverables.

During various interviews with stakeholders the following information was gathered:

• Using PACS is not business critical. There is no impact such as high financial losses or problems to the operational continuity of an organization. Its application is not critical since the software package does not support directly the operational, or the primary, business processes of an organization. It supports (project) management in the project planning and tracking process. Of course, it will be highly annoying for users if the system “goes down” from time to time. Although this does not have a high impact for the business process as a whole, the Mean Time Between Failures (MTBF) still needs to be at a good level to be successful in the market.

• Users of PACS typically have an academic educational level, but have no prior experience with this particular type of project management software. The system will be used by a large number of users within an organization.

• The system will be used on a regular basis, e.g., several times per day by project managers and several times per week by project employees. This means that the system will not be used very intensively, often only for some data input or an information request. Its usage is not considered to be very time-critical.

• The data is recorded on-line and real-time. The system is expected to run in multiple hardware environments in various network environments. It is also expected that changes in the operational environments will happen in the upcoming period that also need to be supported.

Based on the information provided by the stakeholder, which combination of non-functional quality characteristics should you propose to test as part of your test approach?

A.

Reliability and Portability

B.

Security and Reliability

C.

Performance efficiency and Portability

D.

Reliability and Performance efficiency

Full Access
Question # 37

Installability testing is usually conducted during which stage in the application's SDLC and usually includes which other types of testing?

A.

System testing, with functionality and usability testing

B.

Integration testing, with functionality and performance testing

C.

Unit testing, with security and performance testing

D.

Acceptance testing, with usability and accuracy testing

Full Access