Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements BEST describes how test cases are derived from a use case?

A.

Test cases are derived based on non-functional requirements such as usability

B.

Test cases are designed to cover various user behaviors, including basic, exceptional or alternative and error behaviors associated with human users or systems

C.

Test cases are created using white-box test techniques to execute scenarios of use cases

D.

Test cases are derived based on pair testing between a user and a tester to find defects

During which stage of the fundamental test process is the testability of requirements evaluated?

A.

Test Implementation and Execution

B.

Test Planning and Control

C.

Evaluating Exit Criteria and Reporting

D.

Test Analysis and Design

Which of the following is a key difference between black box and white box test design techniques?

A.

Black box techniques use software code to derive test cases, white box techniques do not.

B.

White box techniques use functional design specifications to derive test cases, black box techniques do not.

C.

White box techniques can measure the extent of code coverage, black box techniques can not.

D.

White box techniques derive test cases from models of the software, black box techniques do not.

For the code fragment given below, which answer correctly represents minimum tests required for statement and branch coverage respectively?

A.

Statement Coverage = 2 Branch Coverage = 4

B.

Statement Coverage = 1 Branch Coverage = 3

C.

Statement Coverage = 2 Branch Coverage = 2

D.

Statement Coverage = 1 Branch Coverage = 2

Which of the following would you NOT expect to see on an incident report from test execution?

A.

The version(s) of the software under test

B.

The test execution schedule

C.

Expected results and actual results

D.

Precise steps to reproduce the problem

Which one of the following statements about techniques for estimating test effort is correct?

A.

The metrics-based technique finds the most similar former project and uses its original estimate for the current project.

B.

The expert-based approach is based on the experience of the owners of the testing tasks or by subject matter experts.

C.

The metrics-based technique uses metrics supplied by the current test team based on their subjective feel for effort required.

D.

In an expert-based approach, the test lead with the most years in the role is chosen to produce the estimate.

Which one of the following statements about testing techniques is TRUE?

A.

Exploratory testing can replace black box techniques when testing time is very limited

B.

Test execution scheduling should give priority to experienced based testing

C.

Specification based techniques can be used as a substitute for a poorly defined test basis

D.

Experienced based techniques are systematic and produce detailed test documentation

What does the term Pesticide paradox' refer to?

A.

The phenomena where a piece of code that has a lot of bugs is likely to have more hidden, yet unfound

B.

The decreasing efficiency of debugging when done in code that has many bugs

C.

Reduced effectiveness of test cases that are repeated and focused on the same scenarios

D.

The redundancy of testing the same objects in both black and white box techniques

The following diagram lists various types of operating systems, databases and application servers supported by the application under test. For complete coverage of all combinations, how many combinations of the above are to be tested?

A.

11

B.

5

C.

45

D.

3

Which of the following is NOT an example of a typical risk-based testing activity?

A.

The evaluation of a risk-management tools to decide which tool to use for future projects

B.

The focus of testing is shifted to an area in the system where tests find with more defects than expected

C.

Brainstorming sessions are held with a wide variety of stakeholders to identify possible failures in the system

D.

Tests are prioritized to ensure that those associated with critical parts of the system are executed earlier