CSTE Certification Questions 2

CSTE Certficiation question dumps on Software testing continued.

51. Check for defects in process for the primary aim of correcting or establishing new process. This is 
          Both QA & QC                       
          QC - (Correct Defect)
          QA - (Establish process)      
          None of the listed options

52. Which of the following are the important elements of the control environment?
            Ethical Values    
            Integrity Only
            Both Integrity & ethical values( Ans)
53. Testers implement the step-by-step method followed to ensure that standards are met.  This method is called as _____________
            Condition coverage
            None of the listed options
 (Note: Ans is Procedure)

54. Which strategies are used to quickly find cause of defects?
            Writing code to check the validity of system
            Instrumenting code to trap state of system when anamalous condition occur
            Analyze reported defects
            All of the listed options
55. Expand the term COTS
            Commerical Off The Shelf Software
            Continuity of the software system
            Continuity of the Shell software
            Commercial of the system software

56. With thorough testing it is possible to remove defects from a program prior to delivery to customer (T/F). True
57. Which one of the following is the correct definition for procedure ?
             The measure used to evaluate products and identify nonconformance.  The basis upon which adherence to policies is measured.
            Policies provide direction, standards are the rules of measures
            managerial desired and intents concerning either process or products
            The step-by-step method that ensure that standards are met.

58. _________________ testing verifies all the performance criteria have been achieved when the system is placed into production.
            System testing          
            Compliance testing
            User acceptance testing    
            Security testing

59. To log incidents which of the following is used? 
            Test log                 
            Test script
            Defect tracking system         
            User report

60 Effectiveness is doing things right and efficiency is doing the right things (T/F). False

61. Testing ___________ specified the type of test plan, recommended tools and techniques and type of documentation during testing phase.

62. Following lead to improper use of technology EXCEPT
             Improper skill
            Detailed analysis of the technology
            Early use of new software technology
            Early use of new hardware technology

63. ALE Estimation stands for _____________
            Annual loss expectation     
           Actual loss expectation
           Annual loss estimation     
           Actual loss estimation

64. Pareto voting is used in conjunction with 
           Cause and effect(Fishbone)
            Vital few
            Statistical process control

 65. Compatibility testing for products involves all the following EXCEPT
            Functional and non-functional compatibility
            Certified and supported client environments
            High and low level sanity testing
            Client and Server side compatability

 66. Guidelines to writing the test plans are EXCEPT
            Calculate the planning effort       
            Finish early
            Start early
            Spend the time to do a complete test plan

67. Test team should investigate the following characteristics in order to evaluate the  potential magnitude of the risk EXCEPT
            Identify the components for the system
            Asses the severity of potential failures
            Evaluate contigency plans for this system and activities
            Build the test plan

68. Which of the following is NOT a test factor?
            Continuity of processing
            None of the listed options

69. The test design details which of the following
            Sequence and increments of code delivery
            State of the application at the start of testing
            Availability of test equipment
            The types of test that must be conducted

70. Following are the most effective way of communicating moral guidance EXCEPT
            Written code of conduct      
            Lead by examples
            CMM & ISO Standards      
            Verbal communication

71. Which one of the following is not a valid step to collect Benchmark data?
            Analysis Phase            
            Integration Phase
            Construction Phase    
            Planning Phase

72. Which of the following statement is correct? 
            The control environment is established by the highest levels of management and works upward through the organization
            The control environment is established by the middle managentss and work downward through the organization
            The control environment is established by the highest levels of management and works downward through the organization
            The control environment is established by the tester and works downward through the organization
73. The primary goal of defect management is
            to minimize the impact of defects
            to prevent defects
            to find defect as quickly as possible
            All the listed options

73. Which among the following is the quantitative measure of the current level of performance
            Affinity diagram      
            Pareto analysis

74.Regression test level best suites for which type of transaction? 
            Multiple transaction single terminal
            Single transaction multiple terminal
            Single transaction single terminal
            Multiple transaction multiple terminal

75. During software acceptance, the testing technique that is relied upon for more accurate results(than any other testing technique listed below is______________
            Black box              
            White box

76. Testing for the existence or effectiveness of programmed controls required using __________________
            Complex data             
            Invalid data
            Redundant data      
            Valid data

77. Which of the following factor assures that data is processed in accordance with the intents of management for processing of transactions?
            Service Levels        
            Access control

78. The objective in Test design is to _____________
            Minimize test execution cost
            defect as many defects as possible
            minimize test maintenance costs
            all the listed options

 79. Severity is one which determines the order in which defects should be fixed (T/F).    False 

 80. Steps involved in defect discovery are ________,______________and _____________
            Acknowledge, Find , Report
            Find, Report, Acknowledge
            Find, Acknowledge, Report

 81. Tools for documenting defects as they are found and for tracking their status is          
            Defect tracking tools   
            Status Report
            Test log    
82. The best reason for using independent software testing teams is that_______    
           quality of software is given as much consideration as the project budget and  timeline
            software developers do not need to do any testing
            testers do not get involved with the project until testing begins
            stranger will test the software mercilessly

83. Which among process of analyzing and correcting syntactic, logic and other errors identified during testing?  
            Dynamic Analysis        
            Desk Checking
             Error guessing

84. Which of the following statement is correct about monitoring performance?
             The risks to be organization and its products from using the process should be  monitored
            All the listed options
            Management should review the process improvement program regularly
            Careful analysis of results of testing should be performed.

 85. Following are the key indicators to develop testers dashboards EXCEPT
            Schedule status      
            Severity of recorded defect
            Count of defects          
            Budget status

86. Testing on, above and below the edges of classes is called _______________
            Test contributions         
            Cause effect diagram
            Equilance Class partitioning     
            Boundary value analysis

 87.Which among the following are the major concerns testers have on entering the test execution? 
            Inadequate time or resources
            All the listed options
            Significant problem will not be uncovered during testing
            Software not in testable mode

88. Which among the following are the techniques to prevent defects?
            Training and eduction and methodology and standards
            QA,Training and eduction, defensive design and code and finally methodology and standards
            QA &QC
            QA, Training and education, QC and methodology & standards
            QA,QC, defensive design and code and finally methodology and standards

89. Which among the following is the best strategy to reduce impact if there is a problem? 
             Reduce scope of the system and also do not use latest unproven technology
            Contingency plans
            All the listed options
            Disaster recovery plan, contingency plans

90. Test activities are recorded on a _____________
            Test log                                   
            Test plan
            Defect tracking sheet                       
           All the listed option

 91. Which one of the following statements is correct?
            Policies help in defining products
            Policies are set by senior management
            Policies are set by Test managers
            Policies are guidelines

 92. A testing method in which the test data are derived solely from the program structure is ____________
            Structural testing                
            Glass box testing
            White box testing            
            All the listed options

 93. Defects are measure in relation to ____________________
            projects efforts    
            total number of defects
            development team size    
            lines of code

 94. The tool used to verify the operational system results are in compliance with organizations policies and procedures is called _________
           Checklists and inspections         
           confirmation or examination
           Fact fining                         

95. To define test objectives testers need to do the following EXCEPT
            Data bridges and filters
            Validation process for incoming external data
            Define each objective so that you can reference it by a number
            Development of a model showing the internal and external dependency links among core business areas, processes and information systems
96. The tool used to examine the usability of test data for maintenance is called _____________
            Completion based analysis and mapping  
            Test data
            Peer review               

 97. Decision to stop test execution should be based upon ________________
            All the listed options
            a % of coverage for each coverage category
            rate of error detection falls below a specified threshold
            successful use of specific test case design methodologies.

 98. Which of the following is not a perspective of quality 
            User Based
            Product Based

 99. Temptations causes employees to engage in the following improper acts EXCEPT
            Weak internal audit function          
            High decentralization
            Non existent or ineffective control  
            High Centralization

 100. Following are guidelines adhered to tool usage to be more effective and efficient EXCEPT
           The use of test tools should be incorporated into test processes so that the use of tools is mandatory, not optional
           Tester should work together to build open source testing tools
           Testers should have access to an individual in their organization , or the organization that developed the tool.
           Testers should not be permitted to use tools for which they have not received formal training

101. The table of contents of a test plan might contain the following EXCEPT
           Test objective               
           Test Scope
           Test matrix

102. Which among the following is not a defect?
          An extra function provided in the system
          None of the listed options
          A Requirement not implemented in the system
          A Requirement implemented incorrectly

103. The concept of defensive code involves
        adding a syntax checker in middle of code
        None of the listed options
        adding code to a program so that two parts of program must fail before a major problem occurs
        adding throw() and catch()

104. Integration testing should begin once unit testing for the components to be integrated is complete (T/F)  True

105. Which of the following is an  informal analysis of the program source code yielding computer software ready for testing?
        Code walkthrough             
        Code verification
        Code inspection     
        Functional Review  

106. Which of the following strategic issues needs to be addressed in successful software testing process?
 Specify requirements in a quantifiable manner
 All the listed options
 Conduct formal technical review prior to testing
 Consider using independent test terms

 107. Which among the following is NOT a characteristic of good test case?
     1)      Clear to execute
2)      It should be repeatable
3)      It is not traceable to the requirements
4)      A good test case should be repeatable but not traceable to the requirements. 

  108. Correct definition of vulnerability? 
1. vulnerability is the potential loss to an organization as for example, the risk resulting from the    misuse of its computer. this may involve unauthorized disclosure, unauthorized modification and/or loss of information resources, as well as the authorized but incorrect use of a computer. risk can be measured by performing risk analysis.
2.Vulnerability is something capable of exploiting vulnerability in the security of a computer system or application vulnerability include both hazards and events that can trigger flaws.
3. vulnerability is a design, implementation, or operations flaw that may be exploited by a threat, the flaws causes the computer system  or application to operate in a fashion different from its published specifications and to result in destruction or misuse of equipment or data.

109. yellow circle report signifies
1. serious problems
does not mean anything looks nice
no major problem
potential serious deviations

110. walter she wahart is know for his work on
               1. control chart                          
               2. histogram  
               3. scatter plot diagrams   
               4. run chart

For more articles on Manual testing log on to : Manual Testing


Post a Comment

Previous Post Next Post