Articles On Testing

Wecome to http://www.articlesontesting.com !!!

Articles On Testing

Wecome to http://www.articlesontesting.com !!!

Articles On Testing

Wecome to http://www.articlesontesting.com !!!

Articles On Testing

Wecome to http://www.articlesontesting.com !!!

Articles On Testing

Wecome to http://www.articlesontesting.com !!!

CSTE Certification Questions 15

CSTE Certficiation question dumps on Software testing continued.

72. Which of the following statement is correct?
  1. The control environment is established by the highest levels of management and works upward through the organization
  2. The control environment is established by the middle managentss and work downward through the organization
  3. The control environment is established by the highest levels of management and works downward through the organization
  4. The control environment is established by the tester and works downward through the organization
73. The primary goal of defect management is 
  1. to minimize the impact of defects
  2. to prevent defects
  3. to find defect as quickly as possible
  4. All the listed options
73. Which among the following is the quantitative measure of the current level of performance
  1. Affinity diagram             
  2. Pareto analysis
  3. Benchmarking               
  4. Baseline
74.Regression test level best suites for which type of transaction? 
  1. Multiple transaction single terminal
  2. Single transaction multiple terminal
  3. Single transaction single terminal
  4. Multiple transaction multiple terminal
75. During software acceptance, the testing technique that is relied upon for more accurate results(than any other testing technique listed below is______________
  1. Black box                  
  2. White box
  3. Incremental                          
  4. Thread
76. Testing for the existence or effectiveness of programmed controls required using __________________
  1. Complex data                  
  2. Invalid data
  3. Redundant data                
  4. Valid data
77. Which of the following factor assures that data is processed in accordance with the intents of management for processing of transactions?
  1. Service Levels                
  2. Authorization
  3. Maintainability            
  4. Access control
 78. The objective in Test design is to ______________
  1. Minimize test execution cost
  2. defect as many defects as possible
  3. minimize test maintenance costs
  4. all the listed options
 79. Severity is one which determines the order in which defects should be fixed (T/F).   
            False

 80. Steps involved in defect discovery are _____________,______________and _____________
  1. Acknowledge, Find , Report
  2. Find, Report, Acknowledge
  3. Find, Acknowledge, Report
 81. Tools for documenting defects as they are found and for tracking their status is         
  1. Defect tracking tools   
  2. Status Report
  3. Test log                
82. The best reason for using independent software testing teams is that_______     
  1. quality of software is given as much consideration as the project budget and  timeline
  2. software developers do not need to do any testing
  3. testers do not get involved with the project until testing begins
  4. stranger will test the software mercilessly
83. Which among process of analyzing and correcting syntactic, logic and other errors identified during testing?  
  1. Dynamic Analysis           
  2. Desk Checking
  3. Debugging              
  4. Error guessing
 84. Which of the following statement is correct about monitoring performance?
  1. The risks to be organization and its products from using the process should be  monitored
  2. All the listed options
  3. Management should review the process improvement program regularly
  4. Careful analysis of results of testing should be performed.
  1.  85. Following are the key indicators to develop testers dashboards EXCEPT
  1. Schedule status                       
  2. Severity of recorded defect
  3. Count of defects          
  4. Budget status
86. Testing on, above and below the edges of classes is called _______________
  1. Test contributions                       
  2. Cause effect diagram
  3. Equilance Class partitioning          
  4. Boundary value analysis
 87.Which among the following are the major concerns testers have on entering the test execution? 
  1. Inadequate time or resources
  2. All the listed options
  3. Significant problem will not be uncovered during testing
  4. Software not in testable mode

88. Which among the following are the techniques to prevent defects?
  1. Training and eduction and methodology and standards QA,Training and eduction, defensive design and code and finally methodology and standards
  2. QA &QC
  3. QA, Training and education, QC and methodology & standards
  4. QA,QC, defensive design and code and finally methodology and standards
89. Which among the following is the best strategy to reduce impact if there is a problem? 
  1. Reduce scope of the system and also do not use latest unproven technology
  2. Contingency plans
  3. All the listed options
  4. Disaster recovery plan, contingency plans
90. Test activities are recorded on a _____________
  1. Test log                              
  2. Test plan
  3. Defect tracking sheet
  4. All the listed option
 91. Which one of the following statements is correct?
  1. Policies help in defining products
  2. Policies are set by senior management
  3. Policies are set by Test managers
  4. Policies are guidelines
 92. A testing method in which the test data are derived solely from the program structure is ____________
  1. Structural testing           
  2. Glass box testing
  3. White box testing            
  4. All the listed options
 93. Defects are measure in relation to ____________________
  1. projects efforts          
  2. total number of defects
  3. development team size    
  4. lines of code
 94. The tool used to verify the operational system results are in compliance with organizations policies and procedures is called _________
  1. Checklists and inspections         
  2. confirmation or examination
  3. Fact fining                      
  4. Tracing
95. To define test objectives testers need to do the following EXCEPT
  1. Data bridges and filters
  2. Validation process for incoming external data
  3. Define each objective so that you can reference it by a number
  4. Development of a model showing the internal and external dependency links among core business areas, processes and information systems
96. The tool used to examine the usability of test data for maintenance is called _____________
  1. Completion based analysis and mapping           
  2. Test data
  3. Peer review                       
  4. Inspections
 97. Decision to stop test execution should be based upon ________________
  1. All the listed options
  2. a % of coverage for each coverage category
  3. rate of error detection falls below a specified threshold
  4. successful use of specific test case design methodologies.
 98. Which of the following is not a perspective of quality
  1. Translucent                               
  2. User Based
  3. Transcedent                  
  4. Product Based
 99. Temptations causes employees to engage in the following improper acts EXCEPT
  1. Weak internal audit function                     
  2. High decentralization
  3.  Non existent or ineffective control
  4. High Centralization
 100. Following are guidelines adhered to tool usage to be more effective and efficient EXCEPT
1.       The use of test tools should be incorporated into test processes so that the use of tools is mandatory, not optional
2.        Tester should work together to build open source testing tools
3.        Testers should have access to an individual in their organization , or the organization that developed the tool.
4.        Testers should not be permitted to use tools for which they have not received formal training.

101. The table of contents of a test plan might contain the following EXCEPT
  1. Test objective   
  2.   Test Scope
  3.  Assumptions   
  4.  Test matrix
102. Which among the following is not a defect?
  1. An extra function provided in the system
  2.  None of the listed options
  3.  A Requirement not implemented in the system
  4.  A Requirement implemented incorrectly
103. The concept of defensive code involves
1.       adding a syntax checker in middle of code
2.        None of the listed options
3.        adding code to a program so that two parts of program must fail before a major problem occurs
4.        adding throw() and catch()

104. Integration testing should begin once unit testing for the components to be integrated is complete (T/F) 
True

105. Which of the following is an  informal analysis of the program source code yielding computer software ready for testing?
  1. Code walkthrough        
  2.  Code verification
  3.  Code inspection                                  
  4. Functional Review  
106. Which of the following strategic issues needs to be addressed in successful software testing process?
1.       Specify requirements in a quantifiable manner
2.        All the listed options
3.        Conduct formal technical review prior to testing
4.        Consider using independent test terms

 107. Which among the following is NOT a characteristic of good test case?
  1. Clear to execute
  2. It should be repeatable
  3. It is not traceable to the requirements
  4. A good test case should be repeatable but not traceable to the requirements. 
109 .Correct definition of vulnerability? 
1. vulnerability is the potential loss to an organization as for example, the risk resulting from the    misuse of its computer. this may involve unauthorized disclosure, unauthorized modification and/or loss of information resources, as well as the authorized but incorrect use of a computer. risk can be measured by performing risk analysis.
2.Vulnerability is something capable of exploiting vulnerability in the security of a computer system or application vulnerability include both hazards and events that can trigger flaws.
3. vulnerability is a design, implementation, or operations flaw that may be exploited by a threat, the flaws causes the computer system  or application to operate in a fashion different from its published specifications and to result in destruction or misuse of equipment or data.

109. yellow circle report signifies
1.       serious problems
2.       does not mean anything looks nice
3.       no major problem
4.       potential serious deviations

110. walter she wahart is know for his work on
  1. control chart  
  2. histogram
  3. Scatter plot diagrams                      
  4. run chart
For more articles on Manual testing log on to : Manual Testing

                

CSTE Certification Questions 14


CSTE Certficiation question dumps on Software testing continued.


36. Without preparation of a test plan, at an earlier testing phase, tests may be ________________
  1. Economical                          
  2. uneconomical and ineffective
  3. None of the listed options        
  4. effective

37. Following are the valid defect types EXCEPT
  1. Missing              
  2. Wrong
  3. Extra             
  4. Change Request

38. The test technique to enter errorneous data to determine it cannot affect the integrity of the files is called ______________
  1. Security        
  2. Functional
  3. Error handling                   
  4. File integrity

39. Creating representative processing conditions using test transactions is the concept of _______________
  1. Test plan preparation       
  2. Test data preparation
  3. All the listed options            
  4. Requirements Traceability Matrix

40. _______________ is used to record data as it is gathered
  1. Certification  
  2. Checksheet
  3. Checkpoint    
  4. All the listed options

 41. Test objectives ______________________
  1. Enable the tester and project manager to guage testing progress and success
  2. Guide the development of test cases, procedures and test data
  3. Enhance communication both within and outside of the project team by helping to define the scope of the testing effort.

42. One of the most effective method for estimating expected impact of risk is ______________
  1. Pareto Analysis
  2. None of the listed options
  3. Annual loss expection formula
  4. Risk analysis

43. A Static analysis technique that derives a symbolic expression for each program path is called _______________
  1. Structural testing       
  2. Statistical process control
  3. None of the listed options            
  4. Symbolic execution

44. _______________ in a test phase verifies the application being tested could correctly communicate with interrelated application system
  1. Coupling                      
  2. Functional testing
  3. Unit testing               
  4. Regression testing

45. Which of the following statement is NOT correct?
  1. 90 % of all defects are caused by process problems
  2. Reviews are generally greater than 65% efficient in finding defects
  3. 60% of software defects originate in the requirements phase of the project
  4. Over 50% of the life cycle of software system is spent on requirements

46. Priority of defects should be given to on that caused data corruption, system crash and security violations (T/F). True.  
         FALSE  

47. Which among the following is a set of predefined action items used by test for a process to be complete and acceptable?
  1. Formal analysis          
  2. Exit criteria
  3. Force field analysis      
  4. Error guessing

48. When we talk about analysis performed by executing the program code, we are talking about _____________--
  1. Force field analysis     
  2. Dynamic analysis
  3. Formal analysis         
  4. None of the listed options

 49. Following are the key concepts of the process engineering program EXCEPT
  1. Absolute compliance to standard and procedures is required (Process Engineering)
  2. Process is driven by testing projects (Not a Process Engineering)
  3. Program is driven by management policies (Process Engineering)
  4. Management provides an organizations structure for the workers to develop their                                                own standards and procedures. (Process Engineering)

50. How do you track requirements in test case?
  1. Requirement documents                 
  2. Traceability Matrix
  3. Test plan                      
  4. None of the listed options

51. Check for defects in process for the primary aim of correcting or establishing new process. This is
  1. Both QA &QC                        
  2. QC - (Correct Defect)
  3. QA - (Establish process)       
  4. None of the listed options

52. Which of the following are the important elements of the control environment?
  1. Ethical Values   
  2. Integrity Only
  3. Integrity             
  4. Both Integrity & ethical values

53. Testers implement the step-by-step method followed to ensure that standards are met.  This method is called as _____________-
  1. Coaching         
  2. Condition coverage
  3. Completeness      
  4. None of the listed options

54. Which strategies are used to quickly find cause of defects?
  1. Writing code to check the validity of system
  2. Instrumenting code to trap state of system when anamalous condition occur
  3. Analyze reported defects
  4. All of the listed options

55. Expand the term COTS
  1. Commerical Off The Shelf Software
  2. Continuity of the software system
  3. Continuity of the Shell software
  4. Commercial of the system software

56. With thorough testing it is possible to remove defects from a program prior to delivery to customer (T/F).
True

57. Which one of the following is the correct definition for procedure ?
  1. The measure used to evaluate products and identify nonconformance.  The basis upon which adherence to policies is measured.
  2. Policies provide direction, standards are the rules of measures
  3. managerial desired and intents concerning either process or products
  4. The step-by-step method that ensure that standards are met.

58. _________________ testing verifies all the performance criteria have been achieved when the system is placed into production.
  1. System testing           
  2. Compliance testing
  3. User acceptance testing        
  4. Security testing

59. To log incidents which of the following is used? (Refer: Page no297 from CSTE 2006)
  1. Test log                       
  2. Test script
  3. Defect tracking system       
  4. User report

60 Effectiveness is doing things right and efficiency is doing the right things (T/F).
            False

61. Testing ___________ specified the type of test plan, recommended tools and techniques and type of documentation during testing phase.
  1. Methodology                           
  2. Process
  3. Standards                           
  4. Strategy

62. Following lead to improper use of technology EXCEPT
  1. Improper skill
  2. Detailed analysis of the technology
  3. Early use of new software technology
  4. Early use of new hardware technology

63. ALE Estimation stands for _____________
  1. Annual loss expectation        
  2. Actual loss expectation
  3. Annual loss estimation             
  4. Actual loss estimation

64. Pareto voting is used in conjunction with (Refer Page:345 on CSTE 2006)
  1. Cause and effect(Fishbone)
  2. Vital few
  3. 80-20
  4. Statistical process control

65. Compatibility testing for products involves all the following EXCEPT
  1. Functional and non-functional compatibility
  2. Certified and supported client environments
  3. High and low level sanity testing
  4. Client and Server side compatability

 66. Guidelines to writing the test plans are EXCEPT
  1. Calculate the planning effort       
  2. Finish early
  3. Start early
  4. Spend the time to do a complete test plan

67. Test team should investigate the following characteristics in order to evaluate the                          potential magnitude of the risk EXCEPT
  1. Identify the components for the system
  2. Asses the severity of potential failures
  3. Evaluate contigency plans for this system and activities
  4. Build the test plan

 68. Which of the following is NOT a test factor?
  1. Portability            
  2. Compliance
  3. Continuity of processing
  4. Functionality
  5. None of the listed options

69. The test design details which of the following
  1. Sequence and increments of code delivery
  2. State of the application at the start of testing
  3. Availability of test equipment
  4. The types of test that must be conducted

70. Following are the most effective way of communicating moral guidance EXCEPT
  1. Written code of conduct            
  2. Lead by examples
  3. CMM & ISO Standards         
  4. Verbal communication

71 Which one of the following is not a valid step to collect Benchmark data?
  1. Analysis Phase           
  2. Integration Phase
  3. Construction Phase                 
  4. Planning Phase
For more articles on Manual testing log on to : Manual Testing

CSTE Certification Questions 13


CSTE Certficiation question dumps on Software testing continued.


1. Premature release is defined as releasing the software into production under which of the following conditions EXCEPT?
  1. Test report is not prepared
  2. The test plan has not been completed
  3. The requirements were implemented incorrectly
  4. The test plan has not been completed.

2. Bottoms up integration testing has as its major advantages so that
  1. major decision points are tested early
  2. no drivers needs to be written
  3. no stubs needs to be written
  4. regression testing is not required

3. _____________ provide direction, ______________are the rules or measures by which the implemented policies are measured and the ____________ are the means used to meet or comply with the standards
  1. Standards, Policies , procedures
  2. Policies, standards, procedures
  3. Standards, procedures, policies
  4. Policies, procedures, standards
  5. Procedures, policies, standards.

4. Cost of non-confirmation includes
  1. Training Survey etc.
  2. Survey Studies
  3. Training Survey etc., Studies and Survey
  4. Rework

5.When should you stop testing     
  1. When the quality goals established in the beginning of the projects are met
  2. when you run out of time
  3. None of the listed options
  4. when all the test cases are done

6. Some of the primary testing risks include EXCEPT
  1. Not Enough Training Lack of Test Competency
  2. Lack of Customer and User involvement
  3. Lack of management support   
  4. Lack of Test tools
  
7. Given the following costs
User documentation $1000, Rework - 1500$, Design - 400$, Review of user documents - 800$, code review 1200$, The cost of quality is
  1. $2400            
  2. $5000            
  3. $3500            
  4. $4000

8. Testing that may involve intentionally causing the system to fail so that recovery procedures can be tested is called
  1. Stress testing   
  2. Recovery testing
  3. Disaster testing      
  4. Security testing

9. Post Mortems Review is an Process Review (T/F) True
  
10. A Changes has been done to the design of an application, which of the following is required after this changes is implemented
  1. Unit retesting
  2. Subsystem retesting
  3. None of the listed options
  4. Design re verification
  5. All the listed options

11. _______________ are important elements of test objectives
  1. Feasible and simple
  2. Affordable and Flexible
  3. Reasonable and understandable
  4. Reasonable and Adequate
 (Note: Applicable, reasonable, adequate, feasible, affordable are all test objectives)

12. Unit testing is conducted in the development environment (T/F). True

13. Test planning should begin
  1. before Requirement collection
  2. At the time of Requirement definition
  3. after Requirement collection
  4. after design

14. Summary project status report include information like
  1. Resource, status, budget
  2. Time, status, budget
  3. Resource, budget, time
  4. time, resource, budget

15. Following are the examples of satisfaction metrics EXCEPT
  1. Ease of use
  2. Acceptance criteria met
  3. Customer subject assessment
  4. Customer satisfaction

16. A white box testing technique that measures the number of or percentage of decision outcomes covered by the test cases designed is called
  1. Consistent condition set           
  2. Basis path coverage
  3. Modified decision coverage     
  4. Decision coverage

17. The functional testing that verifies the procedures to balance file function property is called
  1. Compatability testing    
  2. File integrity
  3. Compliance testing      
  4. Integration testing

18. Activities asssociated with risk management are
  1. Risk reduction methods  
  2. Risk analysis
  3. Risk Migitation    
  4. Risk estimation

19. One of the most commonly identified weakness in software testing is
  1. lack of time      
  2. lack of skilled resources
  3. lack of metrics     
  4. lack of defects count

20. To develop a software test matrix follow these steps EXCEPT
  1. Definite test plan
  2. prepare the software test matrix
  3. define test as required
  4. define verification tests


21. Test coverage can be measured by EXCEPT ________________-
  1. Traceability
  2. Global data coverage
  3. All of the listed options
  4. User specified data coverage
  5. Statement coverage

22. When one application feeds data to second application, the latter application is called as _____________application  
  1. Regression         
  2. Stage containment
  3. Downstream   
  4. Message Processing

23. The test tool that is used to test manual procedures in order to verify whether authorization procedures are followed is
  1. Symbolic execution
  2. Cause effect graphing
  3. Inspections
  4. Pareto analysis

 24. Which of the following testing demonstrates key functional capabilities by testing a string of units that accomplish a specific function in the application?
  1. Thread testing       
  2. Unit testing
  3. Integration testing  
  4. Black box testing

25. Due to a change in design, the requirement for an already coded critical software component got modified in its entirely.  The developer had to modify the code based on new requirement.  Testing team is to choose the appropriate type of regression test to minimize the impact to the project schedule.  Which type of regression test would you choose.
  1. Full regression test
  2. Unit regression test
  3. Regional regression test
  4. System Testing

26. Cost of confirmation includes
  1. Training Survey etc.     
  2. Studies
  3. Training  Survey  etc.,
  4. Studies and Survey     
  5. Rework

27. The test schedule section includes which of the following except
  1. Sequence of tests
  2. Major test activities
  3. The types of tests that must be conducted
  4. Initial estimates for each activity

28 High priority in any defect management program should be
  1. To improve the process
  2. All the listed options
  3. to prevent defects
  4. to identify the best prevents on techniques and implement them

29. Testers insert additional code into a program to collect information about program behavoiur during program execution.  This is called as ___________
  1. Instrumentation   
  2. Dynamic assertion
  3. Inspection             
  4. Integration Testing

30. The inability of a system or components to perform its required functions when specified requirement is called
  1. Bug              
  2. error
  3. Failure          
  4. Defect

31. Which of the following statement about different risk type is correct?
  1. It is not difficult to create test scenarios for high level risks
  2. Strategic risks are the high level business risk faced by the software system
  3. Tactical risk  are subsets at a higher level of the strategic risks

32. Which among the following is NOT a way to define and measure test coverage?
  1. User specified data coverage
  2. Global data coverage
  3. Stable/ Control Coverage
  4. Modified Decision coverage

33. Which among the following is the correct sequence to test execution?
  1. Identify test cases and test cycles, assign test scripts, set up test environment, review test cases
  2. Set up test environment, identify test cases and test cycles, assign test scripts, review test results
  3. Set up test environment, identify test case, review test result, assign test scripts
  4. All the listed options

34. Following are examples of intentional act EXCEPT
  1. False message may be inserted into the system
  2. Communication protocol may fail to positively identify the transmitter or receiver of a message
  3. Messages may be recorded and replayed into the system
  4. If encryption (i.e use of codes) is used  may be stolen

35. Which among the following is a suggested prioritization method to follow?
  1. Critical, Major, Low
  2. Major, Minor, High
  3. Critical, Major, Minor, High
  4. Critical, Low, High
  5. Critical , Major, Minor
For more articles on Manual testing log on to : Manual Testing