Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements describes an advantage of bi-directional traceability between requirements / user stories and test cases?

A.

Testers can easily identify the source code module that most probably causes the defects observed during test execution

B.

Project managers and/or product owner can analyze the coverage of test cases for a given requirement / user story

C.

Test case reviewers can verify whether the test case covers all acceptance criteria of the linked requirement / user story

D.

Business analysts can verify the completeness of the user stories / requirements with respect to business needs

What is a common way to use business process modeling for ATDD?

A.

Tester use business process models to write test cases that cover the different paths

B.

Business analysts use workflow descriptions to derive testing rules from the business process model

C.

Testers define acceptance criteria for requirements / user stories to provide input for BPMN model

D.

Business analysts automatically generate requirements / user stories from the graphical workflow

Which of the following statements about test approaches and test techniques for acceptance testing is MOST correct?

A.

The review of user requirements / user stories and associated acceptance criteria avoids dynamic acceptance u testing

B.

The refinement of requirements / user stories into acceptance criteria provides test conditions for the creation of acceptance tests

C.

Code coverage and Test-Driven Development are generally combined with boundary value analysis in acceptance testing

D.

If exploratory tests are performed, then there is no need to cover the acceptance criteria

Which one of the following combinations between high-level security requirements and security testing techniques matches BEST?

A.

Static vulnerability analysis to test authentication and authorization mechanisms

B.

Penetration testing to test the validation and sanitization of input data

C.

Fuzzing to test the performance of cryptographic algorithms

D.

Threat modeling to test the organizational security policy

As an acceptance tester, you are stuck between two stakeholders that demand contradicting acceptance criteria

Which one of the following actions is MOST promising to resolve the conflict?

A.

You organize a meeting of the two stakeholders so that they can solve the conflict personally

B.

Together with the business analyst, you determine which stakeholders is more important to decide between them

C.

After having collected the pros and cons of each solutions, you base your decision on those objective criteria

D.

Instead of discussing conflicting technical solutions, you try to understand the underlying business needs

On a project to develop an event booking platform, a review session is being conducted on acceptance test cases written in Ghenkin's language. Consider the following test case:

1. GIVEN I am logged in on the event booking platform

2. AND I have selected an event from the list displayed for the "live concert" category

3. WHEN I click "Buy Tickets" buttom

4. AND I enter "3" into "Ticket quantify" field

5. AND I agree on terms and conditions

6. THEN The system should display the checkout page

7. AND I should provide my personal data for payment and eticket delivery

Which of the following sentences MOST closely corresponds to a comment that could be made on this test case during the review?

A.

Line 3 refers to and element of the user interface which is to be avoided, line 4 the quantity should not be set and line 7 is an action and not a result

B.

This test case is perfectly written

C.

Line 3 refers to an element to the user interface, which is to be avoided and line 7 is and action and not a result

D.

The "When" part lacks an action to enter number of tickets request that is greater than the limit allowed per person

As a tester you participate in the project of the decision support system for granting a loan. You are asked to review the acceptance criteria for the following requirement:

REQ 3.28. The automated system records critical credit application data (CCAD. needed to support application screening.

Assume that it is well known what kind of data CCAD are. Which of the following would be the BEST example of an acceptance criterion for this requirement?

A.

The CCAD are stored in the MySQL relational database after each successful data entry procedure.

B.

The CCAD is not recorded if it is incomplete and a message is displayed.

C.

The CCAD record process is quick and reversible.

D.

The process for collecting CCAD meets corporate usability guidelines.

Which of the following statements BEST describes the relationship between beta testing and acceptance testing?

A.

Beta testing is a specific from of acceptance testing required for Commercial Off-the-Shelf Software

B.

Beta testing is often used for acceptance testing of Software as a Service (SaaS) platforms

C.

Beta testing and acceptance testing are distinct testing techniques and have nothing to do with each other

D.

Beta testing and acceptance testing mean the same, but acceptance testing is the term used in Agile projects

Which of the following sentences explains BEST how business process and business rule modeling can be used for ATDD?

A.

In an ATDD approach, business process/rule models must be created before the project starts.

B.

In an ATDD approach, business process models replace acceptance criteria.

C.

In an ATDD approach, testers use business process and business rule models to generate acceptance tests.

D.

In an ATDD approach, process models are created for initial test design but are not maintained afterwards.

A green courier working for an urban delivery service company uses three types of vehicles: normal bicycles, electric cargo bikes and electric vans. The following DMN table provides the rules used to select the type of zero emission vehicle to be used according to the weight (in kg) and the largest dimension (in cm) of the parcel, and the delivery distance (in km)

Which one of the following statements is consistent with this DMN table?

A.

Electric vans are systematically used when the parcel size is larger than 150cm

B.

Normal bicycles are mainly used for short trips regardless of the weight of the parcel

C.

Electric cargo bikes are never used for short distances

D.

When the weight of the parcel exceeds 50kg then the electric cargo bike is necessarily used