Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > ISTQB > Foundation Level > ISTQB-CTFL

ISTQB-CTFL ISTQB Certified Tester Foundation Level (CTFL v4.0) Question and Answers

Question # 4

Which of the following CORRECTLY matches the roles and responsibilities in a formal review?

A.

Facilitator - Fixes defects in the work product under review

B.

Scribe - Collates potential defects found during the individual review activity

C.

Review Leader - Creates the work product under review

D.

Author - Identify potential defects in the work product under review

Full Access
Question # 5

Which of the following statements best describes how configuration management supports testing?

A.

Configuration management helps reduce testing effort by identifying a manageable number of test environment configurations in which to test the software, out of all possible configurations of the environment in which the software will be released

B.

Configuration management is an administrative discipline that includes change control, which is the process of controlling the changes to identified items referred to as Configuration Items'

C.

Configuration management is an approach to interoperability testing where tests are executed in the cloud, as the cloud can provide cost-effective access to multiple configurations of the test environments

D.

Configuration management helps ensure that all relevant project documentation and software items are uniquely identified in all their versions and therefore can be unambiguously referenced in test documentation

Full Access
Question # 6

Which of the following is a test task that usually occurs during test implementation?

A.

Make sure the planned test environment is ready to be delivered

B.

Find, analyze, and remove the causes of the failures highlighted by the tests

C.

Archive the testware for use in future test projects

D.

Gather the metrics that are used to guide the test project

Full Access
Question # 7

For a mandatory input field "ZIP code" the following rules are given:

1 - The valid ZIP code format is 5 numeric digits.

2 - The code has to exist in the post office's official ZIP code list

Using equivalence classes partitioning, how many test cases are required to test this field?

A.

8

B.

3

C.

6

D.

4

Full Access
Question # 8

You are a tester working on a critical project. Based on the risk analysis you execution? Priority 1 is the highest and Priority 3 is the lowest priority.

A.

D-C- B-A

B.

D-B-A-C

C.

C-B-A-D

D.

D-A-B-C

Full Access
Question # 9

Consider the following statements about risk-based testing.

I) Risk-based testing has the objective to reduce the level of protect risks.

II) Tests should be prioritized to find tie critical detects as early as possible.

III) Non-testing activities may also help to reduce risk

IV) Risks have to be reassessed on a regular basis.

V) The project stakeholders can give useful input to determine the risks

A.

I III IV and V are true. II is false.

B.

II, III IV and V are correct. I is false.

C.

C. I, II and IV are true. III and V are false.

D.

II, Ill and V are true. 1 ants Iv are false.

Full Access
Question # 10

Which of the following BEST matches the descriptions with the different categories of test techniques?

1.Test cases are based on the test basis which may include the requirements, use cases and user stories

2.Test cases are based on the test basis which may include the software architecture or code

3.Test cases can show deviations from the requirements

4.These test techniques are applicable to both functional and non-functional testing

5.Tests are based on knowledge of developers, users and other stakeholders

Black - Black-box test techniques

White * White-box test techniques

Experience - Experience-based test techniques

A.

Black -1,3.4 White - 2 Experience - 5

B.

Black - 2, 3 White -1 Experience - 4, 5

C.

Black -1,2 White - 3, 4 Experience - 5

D.

Black - 2, 3 White -1,5 Experience - 4

Full Access
Question # 11

Which test approach will best fit a new project, with little documentation and high probability for bugs?

A.

Exploratory testing

B.

Requirements based testing

C.

Metric based approach

D.

Regression testing

Full Access
Question # 12

The following state transition diagram describes the functionality involved in a system using fingerprint and password authentication to log onto a system.

How many distinct states of the system are visible in the above diagram?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 13

A software company decides to invest in reviews of various types. The thought process they have is that each artifact needs to be reviewed using only one of the review methods depending on the criticality of the artifact.

A.

The thought process is incorrect. The whole company should adopt same standard for review of all artifacts.

B.

The thought process is correct. The whole company should decide or the review method based on their CMM level.

C.

The thought process is incorrect. Same artifact can be reviewed using different review methods

D.

The thought process is correct. It wastes time to review same artifact using efferent review methods

Full Access
Question # 14

Which of the following statements about TDD, BDD and ATDD is TRUE?

A.

Refactonng is a practice that is an integral part of TDD and is applied both to tests and to code wntten to satisfy those tests.

B.

ATDD is a black-box test design technique that is applicable exclusively at acceptance test level.

C.

BDD is a developer practice where business stakeholders are not usually involved as the tests are directly written at unit/component test level.

D.

ATDD is the practice of running the automated acceptance tests as part of a continuous integration process.

Full Access
Question # 15

Which of the following issues cannot be identified by static analysis tools?

A.

Very low MTBF (Mean Time Between failure)

B.

Potentially endless loops

C.

Referencing a variable with an undefined value

D.

Security vulnerabilities

Full Access
Question # 16

In branch testing, what is the significance of a conditional branch in a software program?

A.

It indicates a decision point where the program can follow different paths based on specific conditions.

B.

It marks a point where the program's execution will terminate bringing the program to a halt.

C.

It represents a programming error and therefore a conditional branch should be avoided

D.

It signifies a comment or documentation within the code and it doesn't indicate a defect.

Full Access
Question # 17

The following requirement is given “Set X to be the sum of Y and Z”.

All the following four implementations have bugs.

Which one of the following bugs can be caught by Static Analysis?

A.

int x = 1.

int y = 2.

int y = 3.

X = y=z;

B.

int x = 1.

int y = 2.

int z = 3.

X = z-y

C.

int x = 1.

Int y = 2.

Int z = 3.

Z = x +y

D.

int y = 2

Int z = 3.

Y = z+y

Full Access
Question # 18

Which ONE of the following options BEST describes a key characteristic of non-functional testing?

A.

Performing non-functional testing starting at the system test level.

B.

Conducting non-functional testing exclusively at the acceptance test level.

C.

Limiting non-functional testing to security testing and performance testing only.

D.

Ensuring non-functional testing focuses only on user experience and usability.

Full Access
Question # 19

Which of the following is the BEST reason for selecting a particular type of software development lifecycle model?

A.

The project manager's preference

B.

Tester skill level with the software development lifecycle model

C.

The project team's overall familiarity with the model

D.

The type of product being developed

Full Access
Question # 20

The following decision table is used to assist a doctor in determining the drug therapy to prescribe for a patient (aged 6 to 65 years) diagnosed with acute sinusitis. The table consists of three Boolean conditions and six actions

Based only on the given information, which of the following statements is TRUE?

A.

Column 7 represents an impossible situation and thus can be deleted

B.

Columns 1 and 3 can be merged into a single column

C.

Columns 2, 4, 6 and 8 can be merged into a single column

D.

Columns 5 and 7 can be merged into a single column

Full Access
Question # 21

Manager responsibilities in formal review includes ad except one of the following:

A.

Planning the review

B.

Determines if the review objectives have been met

C.

Decide on the execution of reviews

D.

Allocate time for review

Full Access
Question # 22

Consider the following examples of risks identified in different software development projects

[1]. It may not be possible to generate the expected workloads to run performance tests, due to the poor hardware equipment of the machines (load injectors) that should generate these workloads.

[ii]. A user's session on a web application is not invalidated after a certain period of inactivity (configured by the system administrator) of the user,

[iii]. The test team will not have an adequate requirements specification (since many requirements will still be missing) by the time test design and analysis activities should begin according to the test plan.

[IV]. Following a failure, the system is unable to continue to maintain its pre-failure operation and some data becomes corrupted.

Which of the following statements is TRUE?

A.

[ii] and [IV] are product risks; [i] and [iii] are project risks

B.

[ii]and [iii] are product risks. [I] and [IV] are project risks.

C.

[i], and [iV] are product risks; [ii] and [iii] are project risks

D.

[i], [II] and [iii] are product risks, [IV] is a project risk.

Full Access
Question # 23

For a given set of test-cases, which of the following is a benefit of running these tests with a test automation tool?

A.

Test coverage is increased

B.

The total cost of the test project always decreases

C.

The time spent on repetitive tasks is reduced

D.

The number of found bugs is reduced

Full Access
Question # 24

Which of the following tools is most likely to detect defects in functions or methods in source code?

A.

configuration management tool

B.

unit test framework tool

C.

test design tool

D.

monitoring tool

Full Access
Question # 25

A test manager defined the following test levels in her test plan; Component, System and Acceptance.

Which Software Development lifecycle is the Test Manager most likely following?

A.

V-Model

B.

Agile

C.

Waterfall

D.

Prototyping

Full Access
Question # 26

Which of the following statements best describes the difference between product risk and project risk in software testing?

A.

Product risk refers to the risk associated with the project's schedule, budget, and resources, while project risk refers to the risk associated with the quality and functionality of the software product.

B.

Product risk refers to the risk associated with issues such as delays in work product deliveries, inaccurate estimates, while project risk refers to the risk associated with the project's schedule, budget, and resources.

C.

Product risk and project risk are essentially the same and can be used interchangeably.

D.

Product risk refers to the risk associated with delays in elements such as work product deliveries and inaccurate estimates, while project risk refers to the risk associated with issues such as user dissatisfaction.

Full Access
Question # 27

The following chart represents metrics related to testing of a project that was competed. Indicate what is represented by tie lines A, B and the axes X.Y

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 28

Determining the schedule for each testing activity and test milestones for a test project, using activity estimates, available resources, and other constraints is a typical task performed during

A.

Test execution

B.

Test design.

C.

Test analysis.

D.

Test planning

Full Access
Question # 29

A bank offers a savings account with various interest rates based on the current balance in the account. The balance ranges and respective interest rates are:

Up to $100.00 =2%

$100.01 to $500.00 = 4%

$500.01 to $1,000.00 = 5%

Above $1,000.00 = 7%

Using two-point boundary value analysis, which of the following sets of test inputs provides the relatively highest level of boundary coverage?

A.

$5.00.$100.00,$499.99,$1,000.00,$1,000.01

B.

$100.00. $100.01,$100.02,$500.00,$999.99

C.

$100.00, $500.00,$1,000.00,$1,000.01

D.

$5.00.$100.00,$500.00,$1,000.01

Full Access
Question # 30

Which of the following statements about reviews are TRUE?

I. In walkthroughs the review meeting is typically led by the author.

II Inspection is characterized by an open-ended review meeting

III Preparation before the review meeting is part of informal reviews

IV Management rarely participates in technical review meetings

A.

II, Ill

B.

I, II

C.

I, IV

D.

III, IV

Full Access
Question # 31

Which of the following is a task the Author is responsible for, as part of a typical formal review?

A.

Determining the people who will be involved in the review

B.

Recording the anomalies found during the review meeting

C.

Identifying potential anomalies in the work product under review

D.

Fixing the anomalies found in the work product under review

Full Access
Question # 32

A test status report SHOULD:

A.

Specify the impediments to carrying out the planned test activities in the reporting period and the corresponding solutions put in place to remove them

B.

Be produced as part of test completion activities and report unmitigated product risks to support the decision whether or not to release the product

C.

Always be based on the same template within an organisation, as its structure and contents should not be affected by the audience to which the report is presented.

D.

Specify the lines of communication between testing, other lifecycle activities, and within the organisation that were chosen at the outset of the test project.

Full Access
Question # 33

Which of the following statements refers to a good testing practice that applies to all software development lifecycles?

A.

Each test level should have its own specific test objectives that should be consistent with the software development lifecycle phase or type of activities it addresses.

B.

Test analysis and design for any test levels should begin as soon as coding is complete, and all system components are available for testing

C.

The most efficient and effective method of conveying information to and within a development team is face-to-face conversation.

D.

All the tests should be automated and run as part of the continuous integration process with every software change

Full Access
Question # 34

Which of the following is an example of scenario-oriented acceptance criteria?

A.

The user should be able to provide three inputs to test the product - the Al model to be tested, the data used and an optional text file

B.

Verify that a registered user can create add a new project with name having more than 100 characters

C.

A user is already logged in then on navigating to the Al model testing page the user should be directly shown the report of last test run.

D.

An unregistered user shouldn't be shown any report

Full Access
Question # 35

Which of the following statements about testware are correct?

I When closing the test activities, all the testware resources can be uninstalled and released

II All the testware should be subject to Configuration Management

III. The testware. at the end of the project, should be transferred to the organization responsible for maintenance

IV The developers are responsible for the correct installation of the testware

A.

II, Ill

B.

I, Ill

C.

I, IV

D.

II, IV

Full Access
Question # 36

Which of the following is NOT a deciding factor m determining the extent of testing required?

A.

Level of risk of the product or features

B.

Budget to do testing

C.

A particular tester involved in testing

D.

Time available to do testing

Full Access
Question # 37

Exploratory testing is an experience-based test technique

A.

Where a developer and a tester work together on the same workstation while the developer actively writes code, the tester explores the code to find defects.

B.

That can be organised into sessions guided by test charters outlining test objectives that will guide the testers' exploration

C.

Where a team of testers explores all possible test techniques in order to determine the most suitable combination of these techniques to apply for a test project.

D.

That aims at finding defects by designing tests that exercise all possible combinations of input values and preconditions

Full Access
Question # 38

Why is it important to select a test technique?

A.

There are usually loo many test cases that may be run on a system. Test techniques help reduce the number of tests.

B.

The only way to test a software application is by using well proven test techniques.

C.

Selecting the right test technique in a given situation Increases the effectiveness of the test process Oy creating tests with higher chance of finding bugs.

D.

Test techniques define the number of regression cycles, which in turn impact the project schedule.

Full Access
Question # 39

You are testing a room upgrade system for a hotel. The system accepts three differed types of room (increasing order of luxury): Platinum. Silver and Gold Luxury. ONLY a Preferred Guest Card holder s eligible for an upgrade.

Below you can find the decision table defining the upgrade eligibility:

What is the expected result for each of the following test cases?

Customer A: Preference Guest Card holder, holding a Silver room

Customer B: Non Preferred Guest Card holder, holding a Platinum room

A.

Customer A; doesn't offer any upgrade; Customer B: offers upgrade to Gold luxury room

B.

Customer A: doesn't offer any upgrade; Customer B: doesn't offer any upgrade.

C.

Customer A: offers upgrade to Gold Luxury room; Customer B: doesn't offer any upgrade

D.

Customer A: offers upgrade to Silver room; Customer B: offers upgrade to Silver room.

Full Access
Question # 40

Out of the following. what is not needed to specify in defect report?

A.

Test environment details

B.

How to reproduce the defect

C.

How to fix the defect

D.

Seventy and priority

Full Access
Question # 41

Which of the following best describes the way in which statement coverage is measured?

A.

Measured as the number of decision outcomes executed by the tests, divided by the total number of decision outcomes in the test object.

B.

It is not possible to accurately measure statement coverage.

C.

Measured as the number of statements executed by the tests, divided by the total number of executable statements in the code.

D.

Measured as the number of lines of code executed by the test, divided by the total number of lines of code in the test object.

Full Access
Question # 42

A document descnbes the test procedures that have been derived for the identified test sets Among other things, the order in which the test cases in the corresponding test set are to be executed according to the dependencies described by preconditions and postconditions is specified This document is a typical work product produced as part of:

A.

Test design.

B.

Test analysis

C.

Test Implementation.

D.

Test monitoring and control

Full Access
Question # 43

How can testing contribute to higher quality?

A.

Testing help to measure the quality of software.

B.

Testing ensures that remaining defects are documented.

C.

Testing removes errors in the software.

D.

Testing eliminates the risk with software.

Full Access
Question # 44

Which ONE of the following work products TYPICALLY belongs to test execution?

A.

Test logs that document the results of test execution.

B.

Automated test scripts used for test execution.

C.

A test plan that describes the test strategy and test objectives.

D.

A list of test conditions prioritized during test analysis.

Full Access
Question # 45

Which of the following statements describes regression testing?

I. Retesting of a fixed defect

II. Testing of an already tested program

III. Testing of new functionality in a program

IV. Regression testing applies only to functional testing

V Tests that do not nave to be repeatable, because They are only used once

A.

II, IV, V

B.

I, III, IV

C.

II

D.

I, IV

Full Access
Question # 46

From a testing perspective, configuration management

A.

Allows the expected results to be compared with the actual results.

B.

Allows the tracking of all changes to versions of the testware.

C.

Includes all activities that direct and control an organisation with regard to quality

D.

Focuses on configuring static analysis tools to choose the most suitable breadth and depth of analysis.

Full Access
Question # 47

Which of the following is not an example of a typical content of a test completion report for a test project?

A.

The additional effort spent on test execution compared to what was planned

B.

The unexpected test environment downtime that resulted in slower test execution

C.

The residual risk level if a risk-based test approach was adopted

D.

The test procedures of all test cases that have been executed

Full Access
Question # 48

A test manager decided to skip static testing since he believes bugs can be found easily by doing dynamic testing. Was this decision right or wrong?

A.

The decision was wrong. Ensuring quality mandates that static testing is performed after performing the dynamic testing.

B.

The decision was right. Static testing is usually redundant if a product is planned to go through a full-cycle of dynamic testing.

C.

The decision was right. Most of the bugs are easier to identify during the dynamic testing.

D.

The decision was wrong. Static testing can find defects early in the development process, reducing the overall cost of testing and development

Full Access
Question # 49

Which of the following is a typical potential risk of using test automation tools?

A.

Reduced feedback times regarding software quality compared to manual testing.

B.

Reduced test execution limes compared to manual testing.

C.

Reduced repeatability and consistency of tests compared to manual testing

D.

Underestimation of effort required to maintain test scripts.

Full Access
Question # 50

Which of the following statements refers to good testing practice to be applied regardless of the chosen software development model?

A.

Tests should be written in executable format before the code is written and should act as executable specifications that drive coding

B.

Test levels should be defined such that the exit criteria of one level are part of the entry criteria for the next level

C.

Test objectives should be the same for all test levels, although the number of tests designed at various levels can vary significantly

D.

Involvement of testers in work product reviews should occur as early as possible to take advantage of the early testing principle

Full Access
Question # 51

Which of the following sentences describe a product risk?

A.

The application might not be able to provide the expected responsiveness under a load of up-lo 300 concurrent users

B.

Failure in acquiring an adequate and test automation tool

C.

A wrong configuration of the test environment that causes incidents related to the environment and not to the software under test

D.

The development team lacks knowledge of the technology on which the product is based

Full Access
Question # 52

You are testing an e-commerce system that sporadically fails to properly manage customers' shopping carts. You have stressed the urgency of this situation to the development manager and development team and they recognize the priority of resolving the underlying defect. The development team is waiting for more information, which you will include in your defect report. Given the following items of information they are included in a typical defect report:

1. The expected results

2. The actual results

3. The urgency and priority to fix this

4. The date and author of the defect report

5. A description of the defect in order to reproduce, including screenshots and database dumps

Which of these items will be MOST useful to the developers to help them identify and remove the defect causing this failure?

A.

1, 2, 5

B.

1, 2, 3, 4, 5

C.

1, 2, 4

D.

3, 4

Full Access
Question # 53

The following sentences refer to the 'Standard for Software Test Documentation' specification (IEEE 829).

Which sentence is correct?

A.

Any deviation from this standard should be approved by management, marketing & development

B.

Most test documentation regimes follow this spec to some degree, with changes done to fit a specific situation or organization

C.

The key to high quality test documentation regimes is strict adherence to this standard

D.

This test plan outline is relevant for military projects. For consumer market projects there is a different specification with fewer items.

Full Access
Question # 54

Which ONE of the following statements about acceptance testing is NOT correct?

A.

Testing of disaster recovery and backup/restore is usually NOT part of acceptance testing.

B.

The customers or system users are often responsible for the acceptance testing.

C.

The main goal of acceptance testing is to build confidence in the system, not find defects.

D.

Acceptance testing is the last level of testing performed prior to system release.

Full Access
Question # 55

A program is used to control a manufacturing line (turn machines on and off. start and stop conveyer belts, add raw materials to the flow. etc.). Not all actions are possible at all times. For example, there are certain manufacturing stages that cannot be stopped - unless there is an emergency. A tester attempts to evaluate if all such cases (where a specific action is not allowed) are covered by the tests.

Which coverage metric will provide the needed information for this analysis?

A.

Code coverage

B.

Data flow coverage

C.

Statement coverage

D.

Branch Coverage

Full Access
Question # 56

Which of the following is an advantage of the whole team approach?

A.

It helps avoid the risk of tasks associated with a user story not moving through the Agile task board at an acceptable rate during an iteration.

B.

It helps team members understand the current status of an iteration by visualising the amount of work left to do compared to the time allotted for the iteration

C.

It helps the whole team be more effective in test case design by requiring all team members to master all types of test techniques.

D.

It helps team members develop better relationships with each other and make their collaboration more effective for the benefit of the project.

Full Access
Question # 57

A possible risk of introducing test automation is:

A.

the tool may not be fit-for-purpose.

B.

the tool may create additional development dependencies.

C.

the tool may not be compatible with the development platform.

D.

the tool will be owned and maintained by developers and replace testers.

Full Access
Question # 58

A system computes prices for bus tickets. The price depends on

- the passenger type (baby, child, adult, senior citizen, student, military)

- the travelling type (as single or in a group)

- the distance (zone 1. 2. 3)

- the kind of transport (ordinary, express)

Which of the following test techniques is the most appropriate one for testing the price computation?

A.

Statement coverage

B.

State transition testing

C.

Equivalence partitioning

D.

Use case testing

Full Access
Question # 59

Consider the following code

int premium=2500;

if (age<30)

{

premium = premium +1500:

}

Which options suits for a correct combination of Boundary value and expected result. Assume first number as boundary followed by expected result.

A.

29, 1500

30. 2500

B.

29. 4000

30. 2500

C.

29, 2500

30. 1500

D.

30, 1500

31,2500

Full Access
Question # 60

Which of the following is NOT a typical debugging activity when a failure is triggered by dynamic testing?

A.

Fixing the cause

B.

Reproducing the failure

C.

Diagnosing the root cause

D.

Adding new test cases

Full Access
Question # 61

Which one of the following statements relating to the benefits of static testing is NOT correct?

A.

Static testing enables early detection of defects before dynamic testing is performed.

B.

Static testing reduces testing costs and time.

C.

Static testing increases development costs and time.

D.

Static testing identifies defects which are not easily found by dynamic testing.

Full Access
Question # 62

Which of the following is a factor that contributes to a successful review?

A.

All participants in the review are aware they will be evaluated based on the defects they will find

B.

The author of the work product to be reviewed leads the review meeting.

C.

All participants in the review are trained to deal with the review type and its objectives.

D.

Review metrics must be collected to improve the review process

Full Access
Question # 63

Why it is essential that defects found in a review be reported objectively?

A.

In order to facilitate easy entry of detected defects in a OTS (Defect Tracking System)

B.

In order to allow the author of reviewed work product(S) to take the feedback positively as an effort at improving the product (S) and not as a personal assault

C.

In order to allow the review moderator to easily understand them, and assign them to the right developer for fixing

D.

In order to allow augmentation of existing checklists used for reviewing the work product (S)

Full Access
Question # 64

In the newest version of payroll system number of changes were made. As a tester you got a task to perform regression and confirmation tests. Which of the following project activities are related to confirmation testing?

A.

Testing due to the application of a new version of the interface

B.

Testing that fixes resolved the defects in the search function

C.

Testing if a system still works after update of an operating system

D.

Testing to ensure the adding of a new functionalities haven't broken existing functions

Full Access
Question # 65

Select which of the following statements describe the key principles of software testing?

i. Testing shows the presence of defects, not their absence.

ii. Testing everything Is possible.

iii. Early testing Is more expensive and is a waste of time.

iv. Defects cluster together.

v. Testing is context dependent.

vi. Beware of the pesticide paradox.

vii. Absence of errors is a fallacy.

Select the correct answer:

A.

i, iv, v, vi and vii

B.

I, ii, v. vi and vii

C.

iii. iv, v. vi and vii

D.

ii, iii, iv, v and vi

Full Access
Question # 66

In what way do Configuration Management effects testing?

A.

Without proper configuration management, test planning cannot proceed.

B.

Proper configuration management ensures that testers can uniquely identity the tested item

C.

Configuration management is important for developers, not for testers

D.

There is very little influence of configuration management practices on the test project.

Full Access
Question # 67

For the following pseudo-code determine number of tests required for 100% statement coverage

IF Gender = Boy

If Age > 3 AND Age < 5

Shoe Size = 1

ELSE IF Age >=5 AND Age < 7

Shoe Size = 2

ENDIF

ELSE

IF Age > 3 AND Age < 5

Shoe Size = 0

ELSE IF Age >=5 AND Age < 7

Shoe Size = 1

ENDIF

ENDIF

A.

6

B.

4

C.

2

D.

6

Full Access
Question # 68

Which of the following statements is true?

A.

Functional testing focuses on what the system should do while non-functional testing on the internal structure of the system

B.

Non-functional testing includes testing of both technical and non-technical quality characteristics

C.

Testers who perform functional tests are generally expected to have more technical skills than testers who perform non-functional tests

D.

The test techniques that can be used to design white-box tests are described in the ISO/IEC 25010 standard

Full Access
Question # 69

Consider a review for a high-level architectural document written by a software architect. The architect does most of the review preparation work, including distributing the document to reviewers before the review meeting. However, reviewers are not required to analyze the document in advance, and during the review meeting the software architect explains the document step by step. The only goal of this review is to establish a common understanding of the software architecture that will be used in a software development project.

Which of the following review types does this review refer to?

A.

Inspection

B.

Audit

C.

Walkthrough

D.

Informal review

Full Access
Question # 70

Which ONE of the following activities TYPICALLY belongs to the planning phase of the review process?

A.

A separate defect report is created for each identified defect so that corrective actions can be tracked.

B.

Each reviewer conducts an individual review to identify anomalies, recommendations, and questions.

C.

The purpose and scope of the review are defined, as well as the work product to be reviewed and the exit criteria.

D.

The reviewers analyze and discuss the anomalies found during the review in a joint meeting.

Full Access
Question # 71

A software system checks age in order to determine which welcome screen to display. Age groups are:

Group I: 0-12

Group II; 13-18

Group III: over 18

Which of the below represent boundary values?

A.

(-1.0.12.13.18,19)

B.

(-1.0,11.12.13,14,18.19)

C.

(0.12.13.18.19)

D.

(4.5.15.20)

Full Access
Question # 72

ST is a Software Testing organization which utilizes a testing knowledge base. Access to ST knowledge base can be either full or limited. Access level is determined based on ST certification and testing experience as follows:

1. If ST certified, with less than 5 years testing experience - allow limited access

2. If ST certified, 5-10 years of testing experience - allow full access

3. If not ST certified with 5-10 years of testing experience - allow limited access.

What would be the results for:

A - ST certified. 12 years of testing experience

B - Not ST certified. 7 years of testing experience

C - Not ST certified. 3 years of testing experience

A.

A - unknown

B - limned access

C- unknown

B.

A - full access

B - limited access

C - unknown

C.

A - full access

B - limited access

C - limited access

D.

A - unknown

B - full access

C - unknown

Full Access
Question # 73

Which of the following activities does NOT belong to a typical technical review?

A.

Pre-meeting preparation by reviewers

B.

Using checklists during the meeting

C.

Inviting end-users to the meeting

D.

Preparation of a review report

Full Access
Question # 74

Which of the following applications will be the MOST suitable for testing by Use Cases

A.

Accuracy and usability of a new Navigation system compared with previous system

B.

A billing system used to calculate monthly charge based or large number of subscribers parameters

C.

The ability of an Anti virus package to detect and quarantine a new threat

D.

Suitability and performance of a Multi media (audio video based) system to a new operating system

Full Access
Question # 75

Which of the following statements contradicts the general principles of testing?

A.

Most defects are found in a small subset of a system's modules.

B.

If new defects are to be found we should run the same test set more often.

C.

Testing is better if it starts at the beginning of a project.

D.

How testing is done, is based on the situation in a particular project.

Full Access
Question # 76

A company runs a pilot project for evaluation of a test automation tool. Which of the following is NOT a valid object of this pilot project?

A.

Get familiar with the functionality and options of the tool

B.

Check haw the tool fits to the existing test processes

C.

Train all testers on using the tool

D.

Decide upon standards for tool implementation

Full Access
Question # 77

Consider a program that computes the factorial of a number (n). From the specifications you know that:

• I n < 0. a message "Value out of range" must be issued.

• If 0 < n < 100, the program calculates the factorial and returns the number

• If 100 < n < 200 message "Value out of range" must be issued

A.

There are 3 partitions - one for negative numbers, one for numbers up to 100 and the last one for numbers up to 200

B.

The equivalence partitions cannot be determined for this question because factorial of numbers close to 200 will be very large

C.

The equivalence partitions cannot be determined for this question because the error message for two partitions is exactly same

D.

The requirements are not correct because the partitions are overlapping

Full Access
Question # 78

Which of the statements correctly describes when a whole team approach may NOT be suitable?

A.

When a high level of test independence may be required.

B.

When acceptance tests need to be created.

C.

When a test automation approach needs to be determined.

D.

When the team dynamics need to be improved.

Full Access
Question # 79

Which of the following work products cannot be examined by static analysis?

A.

Test plans

B.

Source code

C.

Compiled code

D.

Formal models

Full Access
Question # 80

Which of the following BEST describes exploratory testing?

A.

Exploratory testing is a suitable test technique which may replace both black-box and white-box test techniques

B.

Exploratory testing is a valid and useful black-box test technique since it focuses on test cases related to the architecture and design of a system

C.

Exploratory testing requires both solid specifications and much project time available for test execution

D.

Exploratory testing may be used within defined time periods, during which the tester may follow a test charter as a guide

Full Access
Question # 81

Which of the following is a possible reason for introducing a defect in software code?

A.

Rushing to meet a tight deadline to turn code over for testing

B.

Improper unit testing

C.

Improper system testing

D.

Focus on static testing over dynamic testing

Full Access
Question # 82

Atypical generic skill required for the role of tester is the ability to

A.

Take on the role of developer to meet challenging project deadlines

B.

Assume leadership aimed at imposing decisions on the rest of the team.

C.

Use tools to make the execution of repetitive testing tasks more efficient.

D.

Determine the corrective actions to get a test project on track in case of deviations from the test plan

Full Access
Question # 83

Which of the following should be included in a test status report?

I. Estimation details

II. Total number of open and closed defects

III Actual effort spent

IV. Defect reports

V. Number of executed, failed, blocked tests

A.

III.V

B.

II, III

C.

I. II. IV

D.

II, III.V

Full Access
Question # 84

Which of the following statements about checklist-based testing is TRUE?

A.

Checklist-based testing is a technique for managing the review meeting that can be applied in those reviews where the use of checklists is mandatory, as is often the case in formal reviews.

B.

Checklist-based testing is a review technique that can be used in a formal review process where reviewers, during individual review, try to detect issues within the work product based on a checklist

C.

In checklist-based testing, using checklists at a high level of detail is more likely to produce test cases that are easier to reproduce than those using checklists at a low level of detail

D.

Checklists used in checklist-based testing should be reviewed periodically for updates as, over time, test cases designed using the same checklist may become less effective at finding defects.

Full Access
Question # 85

Consider the following examples of risks identified in different software development projects:

[I]. The contrast color ratio for both normal text and large text of a website does not comply with the applicable accessibility guidelines, making it difficult for many users to read the content on the pages

[II]. A development vendor fails to deliver their software system on time, causing significant delays to system integration testing activities that have been planned as part of a development project for a system of systems

[III]. People in the test team do not have sufficient skills to automate tests at the test levels required by the test automation strategy which does not allow production of an effective regression test suite

[IV]. In a web application, data from untrusted sources is not subject to proper input validation, making the application vulnerable to several security attacks

Which of the following statements is true?

A.

[I] and [III] are product risks; [II] and [IV] are project risks

B.

[I] and [IV] are product risks. [II] and [III] are project risks

C.

[II], [III] and [IV] are product risks; [I] is a project risk

D.

[IV] is a product risk; [I]. [II] and [III] are project risks

Full Access
Question # 86

Given the following review process main activities and specific review activities:

a.Planning

b.Initiate review

c.Issue communication and analysis

d.Fixing and reporting

1.Creating defect reports

2.Estimating effort and timeframe

3.Recording updated status of defects

4.Selecting the people to participate

5.Distributing the work product and other material

6.Evaluating the review findings

Which of the following BEST matches the review process main activities with the appropriate specific review activities?

A.

2-a, 4-a, 5-b, 6-c, 1-d, 3-d

B.

2-a, 5-a, 1-b, 4-b, 3-c, 6-d

C.

1-a, 4-b, 5-b, 6-c, 2-d, 3-d

D.

2-a, 4-b, 5-c, 1-d. 3-d, 6-d

Full Access
Question # 87

A financial institution is to implement a system that calculates the interest rates paid on investment accounts based on the sum invested.

You are responsible for testing the system and decide to use equivalence partitioning and boundary value analysis to design test cases. The requirements describe the following expectations:

Investment range| Interest rate

R500 to RIO 00010%

RIO 001 to R50 00011%

R50 001 to RlOOOOO12%

RIOOOOl to R500 000| 13%

What is the minimum number of test cases required to cover all valid equivalence partitions for calculating the interest?

A.

5

B.

4

C.

8

D.

16

Full Access
Question # 88

Use Scenario 1 “Happy Tomatoes” (from the previous question).

Using the Boundary Value Analysis (BVA) technique (in its two-point variant), identify the set of input values that provides the HIGHEST coverage.

A.

{7,8,21,22,29,30}

B.

{7,8,22,23,29,30}

C.

{6,7,8,21,22,29,31}

D.

{6,7,21,22,29,30}

Full Access
Question # 89

Which of the following BEST describes checklist-based testing?

A.

Checklist-based testing includes formal tests from detailed lists of test conditions, allowing much repeatability

B.

Checklist-based testing may involve a list of tests based on what is important to the user as well as an understanding of why and how software fails

C.

Checklist-based testing, while popular, provides little consistency and few guidelines concerning test case development

D.

Checklist-based testing is restricted to non-functional testing, including usability, performance, and security test

Full Access
Question # 90

Which of the following statements about the testing quadrants is TRUE?

A.

The higher the number of the testing quadrant, the more important the tests associated with this quadrant are

B.

Automated acceptance tests produced during BDD and ATDD are classified in quadrant 02.

C.

Exploratory tests are classified in quadrant Q3, and they are usually included in a continuous integration process.

D.

Automated unit tests produced during TDD are classified in quadrant Q4 as they are technology facing.

Full Access
Question # 91

The following open incident report provided:

Date: 01.01.01

Description: When pressing the stop button the application status remain in "Attention" instead of "Ready'.

Severity: High

Life Cycle: Integration

Which of the following details are missing in the giving incident report?

I. Identification or configuration of the application

II. The name of the developer

III. Recommendation of the developer

IV The actions and/or conditions that came before the pressing of the button

A.

IV

B.

I. IV

C.

I. II

D.

II, III

Full Access
Question # 92

As a result of the joint evaluation of a product version with the customer, it has been concluded that it would be appropriate to retrieve an earlier version of the product and carry out a benchmark. Depending on the result, further development will be carried out based on the current version or the retrieved version.

Which mechanism, process, and/or technique will allow the specific version (including the testing work products) of a given software product to be restored?

A.

Defect management

B.

Configuration management

C.

Change management

D.

Risk management

Full Access
Question # 93

Which of the following BEST explains a drawback of independent testing?

A.

Having the business organization participate as an independent test team can hurt the overall testing effort since business participants are often not trained nor experienced in testing

B.

Due to their differing backgrounds and perspectives, an independent test team may discover defects which the developers did not uncover

C.

An independent test team may be isolated from the rest of the development and project team

D.

An independent test team may possess specializations in specific test types such as usability or security which detract from the overall effectiveness of the test team

Full Access
Question # 94

The four test levels used in ISTQB syllabus are:

1. Component (unit) testing

2. Integration testing

3. System testing

4. Acceptance testing

An organization wants to do away with integration testing but otherwise follow V-model. Which of the following statements is correct?

A.

It is allowed as organizations can decide on men test levels to do depending on the context of the system under test

B.

It is allowed because integration testing is not an important test level arc! can be dispensed with.

C.

It is not allowed because integration testing is a very important test level and ignoring i: means definite poor product quality

D.

It is not allowed as organizations can't change the test levels as these are chosen on the basis of the SDLC (software development life cycle) model

Full Access
Question # 95

Which ONE of the following is a GOOD testing practice that is INDEPENDENT of the chosen SDLC (Software Development Life Cycle) model?

A.

Testers are involved in reviewing work products as soon as the final version of this documentation is available so that this earlier testing and defect detection can support the “shift-left" strategy.

B.

Test analysis and design for a specific test level begin during the corresponding development phase of the SDLC, allowing testing to follow the principle of late testing.

C.

For every software development activity, there is a corresponding testing activity, ensuring that all development activities are subject to quality assurance.

D.

Different test levels have specific and overlapping test objectives, allowing tests to be appropriate to specific test object types while managing redundancy.

Full Access
Question # 96

While repotting a defect, which attribute indicates the degree of impact that the defect has on the system?

A.

Priority

B.

Severity

C.

Status

D.

Description

Full Access
Question # 97

Which ONE of the following options explains a benefit of independent testing the BEST?

A.

The testers can be isolated from the development team and thus avoid acquiring the same bias as the developers.

B.

Independent testers may lack information regarding the test object.

C.

Independent testers are likely to recognize different types of failures compared to developers.

D.

Developers may lose a sense of responsibility for the quality of the product they develop.

Full Access
Question # 98

A test engineer finds a defect while testing. After the developer has fixed the defect, the test engineer decides to re-run a complete section of the tests. Which of the following is correct?

A.

The lest engineer should not re-run the tests, as they have already been run, and results recorded.

B.

The test engineer should not re-run the tests, they should be part of the developer tests.

C.

The test engineer should re-run the tests, in order to ensure that new defects have not been introduced by the fix.

D.

The test engineer should re-run the tests, because the defect shows that the test cases need to be updated.

Full Access
Question # 99

A state transition diagram describes a control system’s behavior in different operational modes. The initial state is “NORMAL MODE”.

Which ONE of the following test cases covers an INVALID sequence?

A.

NORMAL MODE → DIAGNOSTIC MODE → DEGRADED MODE → EMERGENCY MODE → DIAGNOSTIC MODE → NORMAL MODE → DIAGNOSTIC MODE

B.

NORMAL MODE → DEGRADED MODE → NORMAL MODE → DIAGNOSTIC MODE → DEGRADED MODE → EMERGENCY MODE → DIAGNOSTIC MODE

C.

NORMAL MODE → DIAGNOSTIC MODE → DEGRADED MODE → EMERGENCY MODE → DIAGNOSTIC MODE → NORMAL MODE → DEGRADED MODE

D.

NORMAL MODE → DIAGNOSTIC MODE → NORMAL MODE → DIAGNOSTIC MODE → EMERGENCY MODE → DIAGNOSTIC MODE → NORMAL MODE

Full Access
Question # 100

Which sequence of state transition stated in the answer choices is correct in accordance with the following figure depicting me life-cycle of a defect?

A.

S0->S1->S2->S3->S4

B.

S0->S1->S2->S3->S5^>S1

C.

S0->S1->S2->S3->S5->S1->S2->S3

D.

S0->S1->S2->S3->S5->S3->S4

Full Access
Question # 101

You are responsible for applying the correct technique for a review of the requirements document for a project to develop a new software application. You identify the reviewers and the required roles, including the meeting leader, who is the requirements document author, and a separate role for a scribe. Additionally, you decide to take a relatively informal approach to the requirements review. The goal of the review is to find defects in the requirements document, such as omissions, Inconsistencies, and duplications. Another goal of the review is to improve the software application's usability and accessibility by considering the various stakeholders' viewpoints.

Which of the following statements BEST describes this scenario?

A.

This scenario is using a pair review type and a perspective-based review technique

B.

This scenario is using a walkthrough review type and a checklist-based review technique

C.

This scenario is using a walkthrough review type and a perspective-based review technique

D.

This scenario is using a pair review type and a checklist-based review technique

Full Access
Question # 102

Which of the following activities is NOT a pan of the fundamental testing process?

A.

Archiving automation code

B.

Test status reporting

C.

Test process improvement

D.

Build release and maintenance

Full Access
Question # 103

What is test oracle?

A.

The source of lest objectives

B.

The source for the actual results

C.

The source of expected results

D.

The source of input conditions

Full Access
Question # 104

Which of the following correctly represents a test first approach?

A.

Code is refactored first then tests are written and run

B.

Application behaviour is written in Given/When/then format and tests are then written and run

C.

Tests are derived from acceptance criteria and run to check that the code passes these tests

D.

First the tests fail then the code is written to pass the tests and this is iterated

Full Access
Question # 105

Consider the following user story about the authentication functionality of an e-commerce website:

"As a logged-in user, I want to change my current password with a new one, so that I can make my account safer".

The following are some of the acceptance criteria defined for the user story:

[a] After the logged-in user has successfully changed his password, an email confirming the change must be sent to him

[b] To successfully change the password, the logged-in user must enter the current password, enter a new valid password, and finally confirm by pressing the 'Change Password' button

[c] To be valid, the new password entered by the logged-in user is not only required to meet the criteria related to the length and type of characters, but must also be different form the last 5 passwords of that user

[d] A dedicated error message must be presented to the logged-in user when he enters a wrong current password

[e] A dedicated error message must be presented to the logged-in user when he enters the correct current password, but enters an invalid password

Based only on the given information, which of the following ATDD tests is most likely to be written first?

A.

The logged-in user enters a wrong current password and views the dedicated error message

B.

The logged-in user enters the correct current password, enters a valid new password (different from the last 5 passwords), presses the Change Password' button, and finally receives the e-mail confirming that the password has been successfully changed

C.

The logged-in user enters the correct current password, enters an invalid password, and finally views the dedicated error

D.

The logged-in user submits a purchase order containing ten items, selects to pay with a Visa credit card, enters credit card information of a valid card, presses the 'Confirm' button, and finally views the dedicated message confirming that the purchase has been successful

Full Access
Question # 106

A virtual service emulating a real third-party service and the automated test scripts (aimed at testing the system under test) that interact with that service, are test work products that are typically created during:

A.

Test monitoring and control

B.

Test implementation

C.

Test design

D.

Test analysis

Full Access
Question # 107

Scenario 2 “Big Drop”:

A company “The Big Drop” provides bulk discounts and frequent customer discounts as follows:

How many possible decision rules can be extracted from this table?

A.

5 decision rules

B.

6 decision rules

C.

32 decision rules

D.

8 decision rules

Full Access