Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The terms quality assurance and quality control are often used incorrectly. Describe the types of activities that are the responsibility of the quality assurance function and describe the responsibilities of the quality control function.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

You have been working for years in a company that does not have any defined processes at the organizational level. The organization now wants to adopt CMMI Level 3 practices. You have been promoted to QA Manager and your first order of business is to establish the process definition framework. Describe the steps for effective process definition.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Many organizations have chosen to outsource all or part of their IT services. Assume you are an IT quality assurance manager and you have been asked by senior management in your organization about outsourcing. They want to know the answer to these two questions:

1. What are the major advantages to outsourcing software development?

2. What are the major disadvantages to outsourcing software development?

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Identifying, analyzing, and prioritizing risks require knowledge of the business functions and user involvement. The Project Management Institute's Project Management Body of Knowledge (PMBOK) defines four risk management processes. List and describe the four processes.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Evaluating and quantifying the risks, controls, and vulnerabilities is called _________ .

A.

Risk Analysis

B.

Risk Planning

C.

Risk

D.

Risk Management

Though priority assigned to a defect is usually subjective, but are dependent on user input(s) or factor(s) such as:

A.

Importance of the defect

B.

Resources available to fix

C.

Risk

D.

A and B

E.

A, B, and C

Three fundamental types of mistakes that IT leaders make are:

A.

Isolation, lack of modeling, lack of business perspective

B.

Isolation, inability to reward, lack of dedication

C.

Isolation, inability to reward, lack of business perspective

D.

None of the above

When auditors are engaged by the Board of Directors to audit an organization is an example of ____________.

A.

Supervisor Monitoring

B.

Peer Monitoring

C.

Ongoing Monitoring

D.

Independent Monitoring

A type of "Review" where the producer of the material facilitates the review is a:

A.

Walkthrough

B.

Inspection

C.

Peer Review

D.

Test Readiness Review

E.

All of the above

What does 'C' stand for in PDCA cycle?

A.

Correct

B.

Check

C.

Confirm

D.

Continuous

Establishing security baseline is the starting point to a better security program.

A.

True

B.

False

Process improvement is most effective when __________ are involved in improving the process.

A.

Users of the Process

B.

Quality Assurance Function

C.

Staff

D.

Management

When developing testing tactics for a project, which of the following should be considered?

A.

Determine the project scope

B.

Determine the type of development project

C.

Identify the tactical risks

D.

A and C

E.

A, B, and C

When comparing the ratio of testers to developers in your organization with the ratio of testers to developers in another organization, this would be:

A.

Baselining

B.

Benchmarking

C.

ROI Analysis

D.

Measurement

E.

None of the above

Statement Coverage is:

A.

White-Box Testing

B.

Black-Box Testing

C.

Tree Testing

D.

Static Testing

E.

Functional Testing