Week 6 Flashcards

1
Q

What is not an objective of usability testing?

Ensuring that the user is protected from possible actions
Ensuring that the user does not access functions for which they do not have permission.
Ensuring that the user can perform tasks as intended
Ensuring that the user is satisfied by the interface

A

Ensuring that the user does not access functions for which they do not have permission. - this is part of security testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False? Usability testing should be performed immediately after integration testing.

A

False - Usability testing should begin early on during the prototyping phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False? Usability tests should also be reliable and valid.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False? A system needs to detect and recover from all possible failures.

A

False - A system must be able to detect and recover from specified failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following activities is not normally a part of verifying a serviceability requirement?

Problem correction
Problem verification
Problem isolation
Implement error recovery code

A

Implement error recovery code - Implementing error recovery code is part of the development process and not part of verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not a method for obtaining operational profile data?

Existing systems
Tester opinions
Competing systems
Marketing

A

Tester opinions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False? “System failure during the next ten minutes is very likely.” is an example of a reliability requirement.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five nines availability requires a maximum of how many minutes of unavailability per year?

999 minutes
10 minutes
5 minutes
200 minutes

A

5 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not a typical assumption made by reliability models?

Models are represented by mathematical distributions.
No new errors are introduced by fixes.
Operational profiles are always used.
Failure intensity is constant.

A

Failure intensity is constant.

Models typically assume reliability will improve over time as defects are found and removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False? Software Reliability Growth models utilize historic data to predict system reliability.

A

False - Data is obtained from system testing, not historic data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False? Reliability models help to answer the question: “when do we stop testing?”

A

True - Models typically show how reliability changes over time and what our failure intensity is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following does not need to be considered during security testing?
Reliability
Confidentiality
Integrity
Availability
A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? Security testing checks to see if private data is protected from unauthorized users.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False? Stress testing a system with low memory could result in a security risk.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GQ Starts -

True or False? System availability is affected by the ability of the system to detect and recover from failures.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False? System testers typically do not need a list of errors to recover from when performing error detection and recovery testing.

A

False

17
Q

Which of the following is not included in a good usability requirement?

Memorability
Learnability
System security
Efficiency

A

System security

18
Q

Which of the following is not a type of evaluation used during usability tests?

Generative evaluation
Summative evaluation
Formative evaluation

A

Generative evaluation

19
Q

Which of the following is not a part of developing and running a usability test?

Emphasizing that the user is being tested
Piloting the test
Identifying test users
Creating reasonable test tasks

A

Emphasizing that the user is being tested

20
Q

True or False? A system can have high availability even if it has low reliability

A

True

21
Q

Which of the following is not a step in constructing an operational profile of a system?

Identifying high risk features
Calculating the occurrence probability
Identifying major functions performed by system
Identifying the occurrence rate

A

Identifying high risk features

22
Q

True or False? System security focuses only on the system under test.

A

False

23
Q

Which of the following is a method to perform GUI security testing?

Checking access to the GUI itself
Checking all the possible ways to access data
Checking potentially harmful inputs to the GUI
All of the selections

A

All of the selections

24
Q

GQ Ends
Which of the following is a correct security testing strategy?

Attempting to fake the source of data and seeing if the system accepts it
Only testing correct forms of input
Not forcing the system to use default values
Testing only some ways to perform a given task

A

Attempting to fake the source of data and seeing if the system accepts it