Practice questions Flashcards Preview

Certified Associate in Software Testing > Practice questions > Flashcards

Flashcards in Practice questions Deck (27):
1

The best time to influence the quality of a system design is in the __________.

Planning Phase
Analysis Phase
Design Phase
Testing Phase

Planning Phase

2

IEEE stands for:

Information Engineering Endeavoring to Excel
Institute of Electrical and Electronics Engineers
Institute of Education for E-commerce Entrepreneurs
Individual Excellence in Engineering Enterprises

Institute of Electrical and Electronics Engineers

3

Which type of document might be reviewed at a Review/Inspection session?

Employee performance review
Test Plan
Project Status Report
Defect Tracking Form

Test Pan

4

Quality control and quality assurance are different names for the same activity.

True
False

False. Quality Control monitors and audits an assessment process for the product. Quality Assurance activities are a planned system of review procedures that are conducted by personnel not directly involved in the development process.

5

Cause and effect diagrams can be used to view attempts to solving quality issues that have not worked in the past.

True
False

True

6

Which of the following is not a job responsibility of a software tester?

Identifying test cases
Preparing test data
Executing tests
Writing the functional specifications

Writing the functional specifications

7

The test strategy that is informal and non structured is:

Equivalence partitioning
Validation strategy
White box testing
Ad hoc testing

Ad hoc testing

8

The test strategy that involves understanding the program logic is:

Equivalence partitioning
White box testing
Black box testing
Boundary strategy

White box testing

9

Data defects can occur when accessing the programs data log files.

True
False

False

10

Once the requirement document is approved, the Tester can begin creating a Requirements Matrix to track the requirements throughout the SDLC.

True
False

True

11

Ad Hoc testing is a formal and structured testing method.

True
False

False

12

The programs send bad data to devices, ignore error codes coming back, and try to use devices that are busy or aren't there. This is a:

Calculation error
Functional error
Hardware error
System error
User Interface error

Hardware error

13

Errors that are cosmetic in nature are usually assigned a ______ severity level.

Fatal (Severity)
Low (Severity)
Serious (Severity)

Low (Severity)

14

If a system is not functioning as documented and the data are not corrupted, what priority and measure are assigned?

Priority 1: Critical
Priority 2: High
Priority 3: Medium
Priority 4: Low

Priority 3: Medium

15

A testing process that is conducted to test new features after regression testing of previous features.

Operational testing
Progressive testing
Recovery testing
Regression testing

Progressive testing

16

Which of the following are major test documents? (choose the best answer)

a) Test plan
b) Test case
c) Test design
d) Test procedure
e) Defect report

a and b
a, c, and d
a, c, d, and e
all of the above

all of the above

17

The requirements document identifies all system components and requirements to be tested, as well as detailed approaches to be followed, so that the testing of components and requirements is effective.

True
False

False.
The document that does this is the strategy plan.

18

The test case log is used to keep track of the status of each test case.

True
False

True

19

What test document contains all the information about a specific test case, including requirements and the modules to be tested?

Test plan
Test case specification
Test design specification
Test procedure
Defect report

Test case specification

20

A test case specification document is used to keep track of each test run.

True
False

False

21

A test plan is prepared for management by the project leader, which explains all project control variances relative to the testing effort. It also summarizes test case logs and coverage statistics for key programs.

True
False

False.
That would be a testing status report.

22

Memory leak checker tools are used to create runtime performance profiles at the module, library and function level.

True
False

False.
Runtime performance analyzers are used for that. Memory leak checker tools are used during application runtime to find memory leaks, array overruns and illegal pointer operations.

23

Configuration management tools support activities related to managing the environment, including configuration management, change control, library control, documentation control.

True
False

True

24

The key process area at CMM Level 4 - Managed focus on establishing a quantitative understanding of both the software process and the software work products being built.

True
False

True

25

Non-functional system testing is a testing process that tests system requirements that do not relate to functionality.

True
False

True

26

A set of behavioral and performance requirements which, in aggregate, determine the functional properties of a software system.

Functional requirement
Functional specifications
Functional test cases

Functional specifications

27

Business process-based testing is used in system testing and acceptance testing.

True
False

True