Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Software Certifications > Software Certification > CSQA

CSQA CSQA Certified Software Quality Analyst Question and Answers

Question # 4

Cause-and-effect graphing is a tool used to:

A.

Trace requirements

B.

Help determine root causes of problems in processes

C.

Determine what requirements have been covered

D.

Graph defects uncovered by cause

E.

Identifies the routines in which errors occur

Full Access
Question # 5

Which of the following management philosophies would be associated with a quality management philosophy as opposed to the traditional management philosophy?

A.

Competition

B.

Focus on Detection

C.

Teamwork

D.

Controlling

E.

Fire Fighting

Full Access
Question # 6

The following types of controls, which are designed to alert individuals to a process problem such as control totals assuring data transmissions are complete, are called:

A.

Preventive Controls

B.

Detective Controls

C.

Corrective Controls

D.

Quality Controls

E.

All of the above

Full Access
Question # 7

In the new quality management philosophy, the emphasis must be on:

A.

Defect Identification

B.

Quality Control

C.

Reducing Rework

D.

Catching Defects

Full Access
Question # 8

The risk associated with replacing a team member would be characterized as:

A.

Time-Based

B.

Situational

C.

Interdependent

D.

Time-Based

E.

Value-Based

Full Access
Question # 9

If you were to read in a publication that an IT organization could build software at a rate of 4 lines of code per programmer hour, but in your organization you can only write 2 lines of code per programmer hour, what conclusion could you draw?

A.

My organization is less efficient than the other

B.

My organization’s programmers are not as well trained

C.

There is no accepted standard for lines of code

D.

My organization is a candidate for outsourcing

E.

My organization needs more experienced programmers

Full Access
Question # 10

Which layer of management is the weakest link in a successful quality management program?

A.

Top

B.

Quality Champion

C.

Middle

Full Access
Question # 11

Which of the following is / are level(s) for maturing the Deliverables Processes?

A.

Constraint Requirements

B.

Business Requirements

C.

Relational Requirements

D.

All of the above

Full Access
Question # 12

In a Waterfall Development Model, most risk management activity occurs close to milestones.

A.

True

B.

False

Full Access
Question # 13

If you were to download a software package, which had been developed and placed on the internet for general usage, the one thing you could not control is:

A.

Ability to test the software

B.

Defining the requirements

C.

Determining how the software will be used

D.

Training IT staff in how to use the software

E.

Deciding not to use the software

Full Access
Question # 14

Which party(s) is responsible to ensure protection of intellectual property rights included within a contract for software development?

A.

The contracting organization

B.

The organization that will develop software

C.

Both the contracting organization and the organization that will develop the software

Full Access
Question # 15

A good security mechanism should be:

A.

Complicated

B.

Complex

C.

Layered

D.

None of the above

Full Access
Question # 16

In which company was the concept known as "Just in Time" first implemented?

A.

Toyota

B.

Motorola

C.

Honda

D.

Microsoft

Full Access
Question # 17

Two terms that are associated with quality management are mission and vision. Describe these two terms. Then, as a means of differentiating the two, briefly describe a mission for the quality assurance function and a vision for the quality assurance function.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 18

The relationship with the software development contractor and the customer is an ongoing relationship that must be kept viable and healthy. The contractor wants to sell more software development services to the customer and the customer wants software that works and can be enhanced and maintained.

List and describe four major concerns that arise in maintaining a relationship of harmony and good will between the customer and contractor.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 19

As a Test Manager for the project team, you are required to develop the test schedule. List down the phases and high level activities that would become part of the schedule.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 20

What is meant by the term "best practice" and what process might be used to identify a best practice?

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 21

The contributors to poor quality can be categorized as either lack of involvement by management or lack of knowledge about quality. Describe five specific areas where there can be lack of information or knowledge about quality.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 22

There are many potential risks associated with new technology. New technologies must be integrated without compromising software quality. The QA analyst has three roles in integrating new technology. Describe each of these roles of the QA analyst.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 23

Briefly describe the three categories of Quality Tools and give two examples of tools in each of these categories.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 24

Two of the best accepted industry models are the SEI Capability Maturity Model Integration for Software and ISO 9000 standards. Describe the two models, and explain the differences between the two models.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 25

One of the means to describe a work task or activity is a workbench; a workbench is a graphical representation of a work task. As a Quality Assurance Manager, one of your work tasks is to provide quality training for the IT staff. Describe the components on the workbench that you would use to train a single individual in the quality principles and indicate the entrance and exit criteria as well as the activity that you would perform for each component of the workbench.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 26

Define the terms:

1. Preventive Controls

2. Detective Controls

3. Corrective Control.

List and describe two controls in each of these three categories of control.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 27

It is very important 'to evaluate how employees feel about their manager or leader' to assess the climate of a specific organization or group. An assessment of an organization's 'climate' discovers if the employees' satisfaction level is positive or negative.

Full Access
Question # 28

Good quality management principles state that any organization committed to quality should define its vision, values, and goals. For each of these: a) define the term; b) list who establishes the item (use job title); and c) give a brief example of the item.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 29

Your company has been considering sending some of its IT development offshore. Upper management has heard that as much as 50% of software developed by offshore organizations fails to meet the expectations of the contracting organization. Upper management has asked you to list several potential problems/issues associated with offshore development projects and to suggest a strategy to prevent or mitigate the problems.

Describe the potential problems/issues and your strategy to prevent or mitigate the problems.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 30

Deming's quality principles include the elimination of fear. Explain three specific ways that the software quality assurance function might help to eliminate fear.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 31

What are the seven steps for implementing an IT Quality Function?

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 32

The People Management Process is a maturity framework that describes the key elements of managing and developing the talent of an organization. The process for maturing people can be described using a five-level model. Briefly describe each level of a five-level model for People Management Processes.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 33

At what process maturity level in the SEI process maturity model would you expect that the most effort would be devoted to quality control?

A.

Level Two

B.

Level Three

C.

Level Four

D.

Level Five

Full Access
Question # 34

Which task or tasks are helpful in building support for quality?

A.

Estimate the cost of quality

B.

Meet daily on quality

C.

Reward quality work

D.

All of the above

E.

A and C above

Full Access
Question # 35

A common term that is used today for contracting for software development is "performance based contracting." Performance based contracting means:

A.

The previous performance of a contractor is a critical success factor

B.

The performance criteria for a contractor will be defined in the contract

C.

The performance of the software will be defined in the contract

D.

The contractor will receive a bonus if performance exceeds the contract provisions

Full Access
Question # 36

Which of the following in the COSO enterprise risk management model is the component that requires "management to select an approach or set of actions to align assessed risks with the organization's risk appetite, in the context of the strategy and object

A.

Risk Assessment

B.

Risk Response

C.

Control Activities

D.

Information and Communication

E.

Monitoring

Full Access
Question # 37

The stakeholders of security system should be trained on security data collection methods and:

A.

Organization mission

B.

Security baseline program and charter

C.

Requirements

Full Access
Question # 38

Which of the following is NOT a major concerns during the operation and maintenance of a purchased application or software?

A.

Adequacy of Control

B.

Life of Contract

C.

Speed of Service

D.

Multi-Contractor Problem Resolution

Full Access
Question # 39

It is recommended that a quality assurance group should develop a charter for the group. Which of the following is not normally included in the quality charter?

A.

Objectives

B.

Responsibilities

C.

Authority

D.

Quality Benchmarks

E.

On-going Quality Programs

Full Access
Question # 40

Characteristics such as 'product based', 'defect detection', relates to:

A.

Quality Assurance

B.

Quality Control

C.

Quality Improvement

Full Access
Question # 41

Within an ISO process assessment, a capability level is said to be established 'only' and 'only if' all the process attributes are 'fully achieved'.

A.

True

B.

False

Full Access
Question # 42

A standard must be measurable, attainable, and necessary. What is meant by 'attainable' in this context?

A.

Given current resources and time frame; the standard can reasonably be complied with every time.

B.

Given current resources; the standard can reasonably be complied within this time frame.

C.

Given current time frame; the standard can reasonably be complied with given resources.

D.

Given current resources and time frame; the standard can reasonably be complied with in this cycle.

Full Access
Question # 43

Baselines should always be based on objectively measured data. For this reason, baselines should never be based on subjective measures.

A.

True

B.

False

Full Access
Question # 44

Which of the following artifacts should be subjected to Quality Control?

A.

Test Cases

B.

Design Documents

C.

Project Management Plans

D.

Code

E.

All of the above

Full Access
Question # 45

If you had seven programs and the size in function points were 80, 20, 20, 60, 40, 50, and 150. What is the median size of those seven programs in function points?

A.

20

B.

30

C.

40

D.

50

E.

60

Full Access
Question # 46

QFD can be used to provide forward and backward traceability of value in the software development life cycle.

A.

True

B.

False

Full Access
Question # 47

One of the primary objectives of process control is to:

A.

Reduce Variability

B.

Increase Competition

C.

Improve Metrics

D.

Find Root Causes

Full Access
Question # 48

In a cost-of-quality analysis, the costs required to avoid errors to do the job right the first time are called:

A.

Appraisal Costs

B.

Rework Costs

C.

Prevention Costs

D.

Direct Costs

Full Access
Question # 49

The development of the approach for process deployment is much harder than the actual deployment of the process.

A.

True

B.

False

Full Access
Question # 50

When management selects an approach or set of actions to align assessed risks with the organization's risk appetite in the context of strategy and objectives, this is called:

A.

Risk Assessment

B.

Risk Response

C.

Risk Analysis

D.

Information and Communication

E.

Monitoring

Full Access
Question # 51

Outsourced software can be developed by an organization within the country of use or developed in another country. Which of the following is a difference associated with software developed by an organization in another country?

A.

Missing requirements

B.

Customer standards may not be met

C.

Non-testable requirements

D.

Training and deployment may be difficult

E.

Cultural differences

Full Access
Question # 52

One of the critical success factors in acquiring COTS software is that the vendor will continue to provide additional features in the future. This critical success factor is commonly referred to as:

A.

Ease of Use

B.

Expandability

C.

Maintainability

D.

Transferability

E.

Reliability

Full Access
Question # 53

Stress-testing subjects a system to which of the following types of tests?

A.

Test Scripts

B.

System Requirements

C.

Large Volumes of Transactions

D.

Change to Transactions

E.

Error Conditions

Full Access
Question # 54

Which has frequently been referred to as the most difficult task in getting people to use the process?

A.

Determining the need for a process

B.

Writing the process

C.

Testing the process

D.

Deploying the process

E.

Improving the process

Full Access
Question # 55

Example of a test activity to be performed during Maintenance Phase is:

A.

Determine Test Strategy

B.

Modify and Retest

C.

Determine Adequacy of Design

D.

Design Phase Activities

Full Access
Question # 56

Which of the following is not a major component for quality management for the workgroup?

A.

Improvement processes

B.

Disciplined approach on continuous improvement

C.

Changing the culture

D.

Accomplishing an organization's mission

E.

Integrating new management techniques into day-to-day activities

Full Access
Question # 57

These five components (environment, risk assessment, control activities, information communication, and monitoring) are associated with which of the following control models:

A.

COSO Internal Control Framework Model

B.

ISO Model

C.

Malcolm Baldrige National Quality Award Model

D.

Enterprise Risk and Management Model

E.

CobiT Model

Full Access
Question # 58

The objective of a Pareto Chart is to:

A.

Show the present value of money

B.

Identify the cause of problems

C.

Rank the cause of problems by frequency

D.

Determine the return on investment

E.

Show the root cause of problems

Full Access
Question # 59

It is generally recognized that software testing should begin at which software development phase?

A.

Requirements Phase

B.

Internal Design Phase

C.

External Design Phase

D.

Build Phase

E.

After Software has Been Built

Full Access
Question # 60

Many contracts contain provisions to determine how the contract will be changed in the event that some undetermined circumstance occurs. This provision in a contract is called:

A.

Compensation for Error

B.

Exercising Options

C.

Renegotiation

D.

Termination Provisions

E.

Cost Limitations

Full Access
Question # 61

Which of the following tools category has a mathematical focus and is related to data collection or interpretation?

A.

Management Tools

B.

Presentation Tools

C.

Statistical Tools

D.

None of the above

Full Access
Question # 62

Risk management is not an independent auditing process.

A.

True

B.

False

Full Access
Question # 63

One way to minimize risk is to:

A.

Install Controls

B.

Decrease Acceptance Testing

C.

Increase the Probability Factor

D.

None of the above

E.

All of the above

Full Access
Question # 64

Within COTS software, attributes designed to "get you out of trouble" when you get into trouble is which aspect of a COTS software?

A.

Knowledge to Execute

B.

Understandability

C.

Quality of Communication

D.

Effectiveness of Help Routines

Full Access
Question # 65

The rules used to evaluate products and identify non-conformance are:

A.

Audits

B.

Policies

C.

Standards

D.

Templates

Full Access
Question # 66

In critical listening, the listener is:

A.

Sympathetic to the speaker's point of view

B.

Performing an analysis of what the speaker said

C.

Selecting pieces of information

D.

Getting a complete message with minimal distortion

E.

None of the above

Full Access
Question # 67

Unit testing, system testing and user acceptance testing are examples of:

A.

Verification

B.

Validation

Full Access
Question # 68

Good ideas are of little value unless they are accepted and implemented.

A.

True

B.

False

Full Access
Question # 69

If a programmer follows a series of steps to write a computer program, the programmer is following:

A.

A Workbench

B.

A Procedure

C.

A Standard

D.

Entry Criteria

E.

Exit Criteria

Full Access
Question # 70

Customer surveys are:

A.

Objective Baselines

B.

Subjective Baselines

C.

Predictive Baselines

Full Access
Question # 71

A process is a vehicle of communication, specifying the methods used to produce:

A.

A Service

B.

A Product

C.

Both Product and Service

D.

None of the above

Full Access
Question # 72

The two common types of Matrixes are:

A.

L-Type and Y-Type

B.

T-Type and X-Type

C.

L-Type and T-Type

D.

Y-Type and X-Type

Full Access
Question # 73

Testing to determine whether current changes have adversely affected previous functionality is called:

A.

Regression Testing

B.

System Testing

C.

Unit Testing

D.

Acceptance Testing

E.

Integration Testing

Full Access
Question # 74

Which of the following defines special cause of variation?

A.

Variation between the upper and lower control limits

B.

Variation not present in the process

C.

Conditions that regularly contribute to variability

D.

Contributes a small portion to control variation of process outputs

E.

Regular contributors to variability

Full Access
Question # 75

Which of the following is considered a product measure?

A.

Overall development time

B.

Average level of experience of development staff

C.

Rate time

D.

Quality

E.

Time spent fixing errors

Full Access
Question # 76

Internal control systems have two components. The first is_____________ ,and the second is the __________ within an individual business application

A.

Environmental Controls, Transaction Processing Controls

B.

Transaction Processing Controls, Environmental Controls

C.

General Control, Environmental Control

D.

Environmental Control, General Control

Full Access
Question # 77

Which of the following is the measurement of your current level of performance:

A.

Baseline

B.

Benchmark

C.

Assessment

D.

Audit

Full Access
Question # 78

Tracking the status of each requirement throughout the development and test phases is called:

A.

Requirements Checking

B.

Requirements Verification

C.

In-Process Review

D.

Requirements Tracing

E.

Phase-End Review

Full Access
Question # 79

The core activity of Process Definition is not only defining the process but also:

A.

Performing walkthroughs of the process before publication

B.

Piloting the process

C.

Marketing the process

D.

All of the above

E.

None of the above

Full Access
Question # 80

_____________ is a process that transfers decision making from management to employees.

A.

Coaching

B.

Mentoring

C.

Empowerment

D.

Modeling

Full Access
Question # 81

A process that is effected by an organization's board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of operations, reliability and financial reporting and compliance with applicable law and regulations is called:

A.

Corporate Governance

B.

System of Internal Control

C.

Code of Ethics

D.

Software Security

E.

Risk Analysis

Full Access
Question # 82

Which of the following attributes of a process are associated with measurement?

A.

Policy

B.

Procedure

C.

Standard

D.

Guideline

E.

Charter

Full Access
Question # 83

Critical Success Factors (CSF) are those criteria or factors that:

A.

Are critical to be defined

B.

Must be present in acquired software

C.

Are very desirable in the acquired software

D.

Will be defined during acceptance testing

E.

Are limited to functional requirements

Full Access
Question # 84

Which of the following factors should NOT be considered when defining a Control Method?

A.

Risk Severity

B.

Cost, Effort, and Cycle Time Impact

C.

Strength of the Control Method

D.

Unavailability of Appropriate Resources and People

Full Access
Question # 85

One of the primary goals of defect management is to:

A.

Uncover Defects

B.

Prevent Defects

C.

Assure that Defects are Properly Resolved

D.

Reporting Defects

E.

All of the above

Full Access
Question # 86

Function points are used to measure what aspects of software?

A.

Complexity

B.

Quality Function Deployment

C.

Defect Rates

D.

Number of Requirements

E.

Size

Full Access
Question # 87

From a control perspective, there are two systems that are needed to process business transactions. One is a system that processes transactions and the other is:

A.

System that documents transaction processing

B.

System that trains the users in the software system

C.

System that controls the transaction processing

D.

System that tracks defects in the business system

E.

System that measures performance

Full Access
Question # 88

As processes mature, there is a decrease in cycle time to produce a product.

A.

True

B.

False

Full Access
Question # 89

____________ provides teams an opportunity to reach high-quality decisions with total team commitment.

A.

Consensus

B.

Compatibility

C.

Agreement

Full Access
Question # 90

Desires and intents concerning intended objectives or products, should be set by:

A.

Management

B.

Quality Function

C.

Project Manager

D.

Quality Team

Full Access
Question # 91

Many organizations use code inspections as a means for removing defects prior to commencing unit testing. When code inspections are performed, according to the generally accepted code inspection process, the code inspectors are:

A.

Other Coders

B.

Quality Assurance Personnel

C.

Independent Testers

D.

Internal Auditors

E.

Computer Operations Personnel

Full Access
Question # 92

Three fundamental types of mistakes that IT leaders make are:

A.

Isolation, lack of modeling, lack of business perspective

B.

Isolation, inability to reward, lack of dedication

C.

Isolation, inability to reward, lack of business perspective

D.

None of the above

Full Access
Question # 93

Which of the following three questions would NOT be answered by establishing a security baseline?

A.

What are we doing about computer security?

B.

How effective is our computer security program?

C.

Who is responsible for software system security?

Full Access
Question # 94

When comparing the ratio of testers to developers in your organization with the ratio of testers to developers in another organization, this would be:

A.

Baselining

B.

Benchmarking

C.

ROI Analysis

D.

Measurement

E.

None of the above

Full Access
Question # 95

The four interconnected variables of IT development are:

A.

Scope, schedule, resources, and quality

B.

Scope, function points, metrics, and budget

C.

Budget, programming language, quality, and size

D.

Requirements, design, code, and testing

Full Access