CSTE Certification Questions 10

CSTE Certficiation question dumps on Software testing continued.

1.  Which one of the following is the correct definition for Policy?
    a. The step-by-step method that ensures that standards are met
            b. The measure used to evaluate products and identify nonconformance. The basis upon which adherence to policies is measured
            c. Policies provide direction; standards are the rules or measures
            d. Managerial desires and intents concerning either process (intended objectives) or products (desired attributes)

2.   The objective in Test design is to _____________.      
            a. minimize test maintenance costs
            b. detect as many defects as possible
            c. All of the listed options
            d. minimize test execution cost

3.  Testing for the existence or effectiveness of programmed controls requires using ___________.
            a. Complex data
            b. Valid data
            c. Redundant data
            d. Invalid data
4.  Work Processes constitute the following EXCEPT:
    a. Standard
            b. Process
            c. Procedure
            d. Policy

5.  Guidelines to Writing the Test Plans are EXCEPT:
    a. Finish early
            b. Calculate the planning effort
            c. Start Early
            d. Spend the time to do a complete Test Plan

6.  Test tool to conduct a recovery test to determine that it can be performed within required time frame is called ____________.               
            a. Disaster test
            b. Tracing  (maybe)
            c. Confirmation or Examination
            d. Recovery testing

7.  Which among the following techniques is NOT used for negative testing?
            a. Equivalence Partitioning
            b. Boundary Value Analysis
            c. State Transition
            d. Error Guessing

8.  The largest cost of quality is from production failure. State True or False.

9.  Which of the following statement is NOT correct?
    a. 90 percent of all defects are caused by process problems
            b. Reviews are generally greater than 65 percent efficient in finding defects
            c. 60 percent of software defects originate in the requirements phase of the project
            d. Over 50 percent of life cycle of software system is spent on requirements

10.  Which among the following is an important attribute for test case?
    a. Test Description & Expected Result
            b. Test Description & Actual Result
            c. Test Case ID & Expected Result
            d. Expected Result and Actual Result

11.  Without preparation of a test plan, at an earlier testing phase, tests may be ______________.
    a. uneconomical and ineffective
            b. None of the listed options
            c. effective
            d. economical

12.  High priority activity in any defect management program should be __________.
    a. to prevent defects
            b. All of the listed options
            c. to identify the best prevention techniques and implement them
            d. to improve the process

13.  Regression analysis is used for the following EXCEPT:
    a. Projecting performance based on multiple variables
            b. Find the regression candidates
            c. Probing to determine the cause of some unfavorable event
            d. Cause and effect relationship of two variables

14.  The process of generating test sets for structural testing based on use of complexity or coverage metrics is called _________________.
    a. Metric based test data generation
            b. Regression testing
            c. Cyclomatic complexity
            d. Quality function deployment

15. Following are the valid Defect Severity EXCEPT:
            a. Showstopper
            b. Critical
            c. Minor
            d. Major

16.  _______A_______ is the method of testing the maintainability of the application system.
    a. Inspections
            b. Code Walkthroughs
            c. Reviews
            d. Functional testing

17. Which of the following is not one of Deming's 14 points for management?
    a. Adopt a new philosophy
            b. Eliminate slogans, exhortations, and targets for the work force
            c. Create constancy of purpose
            d. Mobility of management

18.  Which among the following is a technique designed to ensure the process employed are adequate to produce the desired result and process is being followed?
    a. Quality Control
            b. Testing Methodology
            c. Quality Assurance
            d. Testing Strategy

19. Which one of the following statement is incorrect?
            a. Policies set directions
            b. Policies are developed by senior managers
            c. Policies defines the areas in which processes will be developed
            d. Policies are required in all the areas

20.  Given the following costs:
User documentation - $ 1000 Rework - $ 1500
Design - $ 400 Review of User Documents - $ 800, Code review - $ 1200, The cost of Quality is ______________.
    a. $4,000
            b. $5,000
            c. $2,400
            d. $3,500

21.  Defect Density is calculated by ______________.
    a. Valid Defects/ Effort
            b. Total no. of Defects/ Effort
            c. Invalid Defects/ Valid Defects
            d. Valid Defects/ Total no. of Defect

22.        Effectiveness is doing things right and efficiency is doing the right things. State True or False.

23.  The effective Control environment strive for everything EXCEPT:
    a. Attitude of integrity
            b. Control consciousness and positive “tone at the top”
            c. Competent people
            d. Defect free product

24.   Stage containment means _____________.
    a. creation of stage wise work breakdown structure
            b. identifying defects within the phase where they originate
            c. defect prevention
            d. creating document containing activities of a particular stage

25.  During software acceptance, the testing technique that is relied upon for more accurate results (than any other testing techniques listed below) is __________.
    a. White Box
            b. Incremental
            c. Black Box
            d. Thread

26.  ALE estimation stands for _____________.
    a. Actual loss expectation
            b. Annual Loss estimation
            c. Annual loss expectation
            d. Actual Loss estimation

27.  Following are the guidelines to establish an organizational structure EXCEPT:
    a. Establish a Process engineering committee
            b. Let the standard Ad Hoc committees develop the technical standard
            c. Process engineering committee
            d. Process reengineering committee

28.  Which of the following Software Factors correctly reflects-?

"Employee gross pay can be substantiated by supporting documentation.
Sales tax paid to a specific state can be substantiated by the supporting invoices.
Payments made to vendors can be substantiated should the vendor disavow receiving the payment."
            a. File Integrity
            b. Audit Trail
            c. Authorization
            d. Continuity of Process
            e. Service Levels

29.  Which of the following is an Informal Analysis of the program source code yielding computer software ready for testing?  
    a. Code Walkthrough
            b. Code Inspection
            c. Code Verification
            d. Functional Review

30.  Which of the following statement about different risks type is correct?
    a. Strategic risks are the high - level business risks faced by the software system.
            b. Tactical risks are subsets at a higher level of the strategic risks.
            c. It is not difficult to create test scenarios for high-level risks.

31.  Removing or reducing which of the following can help in diminishing the undesirable behavior?
    a. Promotion & Training
            b. Incentive & Temptations
            c. Training & Promotion
            d. Incentive & Promotion

32.  Which of the following is a correct definition of risk analysis?
            a. Risk analysis is something capable of exploiting vulnerability in the security of a computer system or application. Risk analysis includes both hazards and events that can trigger flaws.
            b. Risk analysis is an analysis of an organization’s information resources, its existing controls, and its remaining organization and computer system vulnerabilities. It combines the loss potential for each resource or combination of resources with an estimated rate of occurrence to establish a potential level of damage in dollars or other assets.
            c. Risk analysis is the potential loss to an organization, as for example, the risk resulting from the misuse of its computer. This may involve unauthorized disclosure, unauthorized modification, and/or loss of information resources, as well as the authorized but incorrect use of a computer. Risk can be measured by performing risk analysis.
            d. None of the listed options

33.  Some organizations divide people into four categories when attempting to identify issues EXCEPT:       
    a. People who will help the software system happen
            b. People who will attempt to make the software system not happen
            c. People who will hope the software system happens
            d. People who will make the software system happen

For more articles on Manual testing log on to : Manual Testing

Post a Comment

Previous Post Next Post