ISTQB Learning

Test your knowledge

0%
34
Created on By Admin

Exam 5

1 / 40

1. Consider the following defect report for a Book Lending System.

Which of the following is MOST likely to help the developer reproduce the failure quickly?

Select ONE options.

2 / 40

2. Which of the following BEST fits as an element of the checklist used in checklist-based testing?

Select ONE option.

3 / 40

3. The user reported a software failure. An engineer from the support team asked the user for the software version number where the failure was observed. Based on the version number, the team reassembled all the files that made up the release. This later allowed a developer to perform analysis, find the defect, and fix it.

Which of the following enabled the above activity to be performed by the team?

Select ONE options.

4 / 40

4. Which of the following statements about the value of static testing is CORRECT?

Select ONE option.

5 / 40

5. Which of the following BEST describes an example of how configuration management (CM) supports testing?

Select ONE option.

6 / 40

6. W A developer was asked to implement the following business rule:

You design the test cases using 2-value boundary value analysis.

Which of the following sets of test inputs achieves the greatest coverage?

Select ONE option.

7 / 40

7. How can white-box testing be useful in support of black-box testing?

Select ONE option.

8 / 40

8. You are testing a mobile application that allows customers to access and manage their bank accounts. You are running a test suite that involves evaluating each screen, and each field on each screen, against a general list of user interface best practices derived from a popular book on the topic that maximizes attractiveness, ease-of-use, and accessibility for such applications. Which of the following options BEST categorizes the test technique you are using?

Select ONE option.

9 / 40

9. Given the following descriptions of review activities:

1. Detected anomalies are deliberated upon, and determinations are reached regarding their status, ownership, and any further steps needed
2. Issues are recorded, and any needed updates are addressed prior to the acceptance of the work product
3. Reviewers employ techniques to come up with suggestions and questions about the work product and to spot anomalies
4. The objective of the review and its schedule are established to ensure a focused and efficient review
5. Participants are provided with access to the item being reviewed

Which of the following is the CORRECT sequence in the review process of the activities that correspond to the descriptions?

Select ONE option.

10 / 40

10. Which of the following is MOST likely to be an example of a tester using a generic skill when testing?

Select ONE option.

11 / 40

11. The navigation system software has been updated due to it suggesting routes that break traffic laws, such as driving the wrong way down one-way streets. Which of the following BEST describes the testing that will be performed?

Select ONE option.

12 / 40

12. You want to apply branch testing to the code represented by the following control flow graph.

How many coverage items do you need to test?

Select ONE option.

13 / 40

13. Which of the following is MOST likely to describe a task performed by someone in a test management role?

Select ONE option.

14 / 40

14. Which of the following is a good testing practice that applies to all software development lifecycles?

Select ONE option.

15 / 40

15. Which of these statements is NOT a factor that contributes to successful reviews?

Select ONE option.

16 / 40

16. For a given risk, its risk level is $1,000 and its risk likelihood is estimated as 50%.

What is the risk impact?

Select ONE options.

17 / 40

17. Consider the following defect report for a web-based shopping application:

What is the MOST important information that is missing from this report?

Select ONE option.

18 / 40

18. Which of the following is an advantage of the whole-team approach?

Select ONE option.

19 / 40

19. You test a system whose lifecycle is modeled by the state transition diagram shown below. The system starts in the INIT state and ends its operation in the OFF state.

What is the MINIMAL number of test cases to achieve valid transitions coverage?

Select ONE option.

20 / 40

20. Which types of failures (1-4) fit which test levels (A-D) BEST?

1. Failures in system behavior as it deviates from the user’s business needs
2. Failures in communication between components
3. Failures in logic in a module
4. Failures in not correctly implemented business rules

A. Component testing
B. Component integration testing
C. System testing
D. Acceptance testing

Select ONE option.

21 / 40

21. Given the following risks:

1. Ineffective loop implementation causes long system responses
2. Consumers change their preferences
3. Flooding of the server room
4. Patients above a certain age receive inaccurate reports

And the following mitigation activities:

A. Risk acceptance
B. Performance testing
C. Using boundary value analysis as the test technique
D. Risk transfer

Which of the following BEST matches the risks with the mitigation activities?

Select ONE option.

22 / 40

22. Which of the following is MOST likely to be a challenge encountered when implementing DevOps?

Select ONE option.

23 / 40

23. Which of the following is MOST likely to be performed as part of system testing?

Select ONE option.

24 / 40

24. Which of the following BEST explains a benefit of independence of testing?

Select ONE option.

25 / 40

25. Consider the following list:

• Correct input not accepted
• Incorrect input accepted
• Wrong output format
• Division by zero

What test technique is MOST PROBABLY used by the tester who uses this list when performing testing?

Select ONE option.

26 / 40

26. You are testing a form that verifies the correctness of the length of the password given as input. The form accepts a password with the correct length and rejects a password that is too short or too long. The password length is correct if it has between 6 and 12 characters inclusive. Otherwise, it is considered incorrect.

At first, the form is empty (password length = 0). You apply boundary value analysis to the “password length” variable.

Your set of test cases achieves 100% 2-value boundary value coverage. The team decided that due to the high risk of this component, test cases should be added to ensure 100% 3-value boundary value coverage.

Which additional password lengths should be tested to achieve this?

Select ONE option.

27 / 40

27. Which of the following is NOT anticipated by the tester while applying error guessing?

Select ONE option.

28 / 40

28. Which of the following test levels is MOST likely being performed if the testing is focused on validation and is not being performed by testers?

Select ONE option.

29 / 40

29. Which of the following is an example of how product risk analysis influences thoroughness and scope of testing?

Select ONE option.

30 / 40

30. Which TWO of the following options are common metrics used for reporting on the quality level of the test object?

Select TWO options.

31 / 40

31. The table shows the traceability matrix from test cases to requirements. “X” means that a given test case covers the corresponding requirement.

You want to prioritize the test cases following the additional coverage prioritization technique.

You execute all four test cases.

Which test case should be executed as the LAST one?

Select ONE options.

32 / 40

32. Which work product can be used by an agile team to show the amount of work that has been completed and the amount of total work remaining for a given iteration?

Select ONE option.

33 / 40

33. Which of the following factors (i-v) have SIGNIFICANT influence on the test process?

i. The SDLC
ii. The number of defects detected in previous projects
iii. The identified product risks
iv. New regulatory requirements forcing formal white-box testing
v. The test environment setup

Select ONE option.

34 / 40

34. You are testing a sort function that gets a set of numbers as input and returns the same set of numbers sorted in ascending order. The log from the test execution looks as follows.

Which of the following provides the BEST description of the failure that can be used in a defect report?

Select ONE option.

35 / 40

35. Which of the following statements BEST describes the difference between decision table testing and branch testing?

Select ONE option.

36 / 40

36. Which of the following is a good testing practice that applies to all software development lifecycles?

Select ONE option.

37 / 40

37. You have just started designing test cases for the following user story.

In all test cases the precondition is as follows: there are only two products available, products A and B. Product A costs $100 and product B costs $110.

Which of the following is the BEST example of a test case for this user story?

Select ONE option.

38 / 40

38. How is the whole team approach present in the interactions between testers and business representatives?

Select ONE option.

39 / 40

39. Which of the following is MOST likely to be a trigger that leads to maintenance testing of a currency exchange system?

Select ONE option.

40 / 40

40. Given the following testware:

1. Coverage items
2. Change requests
3. Test execution schedule
4. Prioritized test conditions

And the following test activities

A. Test analysis
B. Test design
C. Test implementation
D. Test completion

Which of the following BEST shows the testware produced by the activities?

Select ONE option.

0%

Scroll to top