ISTQB Learning

Test your knowledge

0%
32
Created on By Admin

Exam 5

1 / 40

1. Which of the following is NOT an example of the shift left approach?

Select ONE option.

2 / 40

2. Which test activity does a data preparation tool support?

Select ONE option.

3 / 40

3. Which of the following is NOT true for white-box testing?

Select ONE option.

4 / 40

4. Which of the following test activities are MOST likely to involve the application of boundary value analysis and equivalence partitioning?

Select TWO options.

5 / 40

5. A storage system can store up to three elements and is modeled by the following state transition diagram. The variable N represents the number of currently stored elements.

Which of the following test cases, represented as sequences of events, achieves the highest level of valid transitions coverage?

Select ONE option.

6 / 40

6. Consider the following testware.

Which test activity produces this testware as an output?

Select ONE option.

7 / 40

7. Which of the following CANNOT be examined by static testing?

Select ONE option.

8 / 40

8. You are testing a PIN validator, which accepts valid PINs and rejects invalid PINs. A PIN is a sequence of digits. A PIN is valid if it consists of four digits, at least two of which are different. You have identified the following valid equivalence partitions:

Variable: PIN code length

• The partition “length correct” - four-digit PINs
• The partition “length incorrect” - PINs with length other than 4

Variable: Number of different digits

• The partition “number of different digits correct” - PINs with at least two different digits
• The partition “number of different digits incorrect” - PINs with all digits being the same

Which of the following is a MINIMUM set of input test data that covers all identified equivalence partitions?

Select ONE option.

9 / 40

9. What does the test pyramid model show?

Select ONE option.

10 / 40

10. Which of the following statements about quality assurance (QA) and/or quality control (QC) is correct?

Select ONE option.

11 / 40

11. Which of the following BEST define EXIT criteria in a testing project?

Select TWO options.

12 / 40

12. For a given risk, its risk level is $1,000 and its risk likelihood is estimated as 50%.

What is the risk impact?

Select ONE options.

13 / 40

13. Which of the following is MOST likely to be a benefit of test automation?

 

Select ONE option.

14 / 40

14. Given the following roles in reviews:

1. Scribe
2. Review leader
3. Facilitator
4. Manager

And the following responsibilities in reviews:

A. Ensures the effective running of review meetings and the setting up a safe review environment
B. Records review information, such as decisions and new anomalies found during the review meeting
C. Decides what is to be reviewed and provides resources, such as staff and time for the review
D. Takes overall responsibility for the review such as organizing when and where the review will take place

Which of the following BEST matches the roles and responsibilities?

Select ONE option.

15 / 40

15. Which of the following are advantages of DevOps?

i. Faster product release and faster time to market
ii. Increases the need for repetitive manual testing
iii. Constant availability of executable software
iv. Reduction in the number of regression tests associated with code refactoring
v. Setting up the test automation framework is inexpensive since everything is automated

Select ONE option.

16 / 40

16. Your organization’s test strategy suggests that once a system is going to be retired, data migration shall be tested. As part of what test type is this testing MOST likely to be performed?

Select ONE option.

17 / 40

17. Which of the following BEST fits as an element of the checklist used in checklist-based testing?

Select ONE option.

18 / 40

18. Which of the following is NOT a benefit of static testing?

Select ONE option.

19 / 40

19. You are testing a form that verifies the correctness of the length of the password given as input. The form accepts a password with the correct length and rejects a password that is too short or too long. The password length is correct if it has between 6 and 12 characters inclusive. Otherwise, it is considered incorrect.

At first, the form is empty (password length = 0). You apply boundary value analysis to the “password length” variable.

Your set of test cases achieves 100% 2-value boundary value coverage. The team decided that due to the high risk of this component, test cases should be added to ensure 100% 3-value boundary value coverage.

Which additional password lengths should be tested to achieve this?

Select ONE option.

20 / 40

20. Which of the following BEST describes the way acceptance criteria can be documented?

Select ONE option.

21 / 40

21. Which of the following activities in the test process makes the MOST use of test progress reports?

Select ONE option.

22 / 40

22. You received the following defect report from the developers stating that the anomaly described in this test report is not reproducible.

Application hangs up
2022-May-03 – John Doe – Rejected
The application hangs up after entering “Test input: $ä” in the Name field on the new user creation screen. Tried to log off, log in with test_admin01 account, same issue. Tried with other test admin accounts, same issue. No error message received; log (see attached) contains fatal error notification. Based on the test case TC-1305, the application should accept the provided input and create the user. Please fix with high priority, this feature is related to REQ-0012, which is a critical new business requirement.

What critical information is MISSING from this test report that would have been useful for the developers?

Select ONE option.

23 / 40

23. Consider the following part of a test plan.

Testing will be performed using component testing and component integration testing. The regulations require to demonstrate that 100% branch coverage is achieved for each component classified as critical.

Which part of the test plan does this part belong to?

Select ONE option.

24 / 40

24. You are testing a sort function that gets a set of numbers as input and returns the same set of numbers sorted in ascending order. The log from the test execution looks as follows.

Which of the following provides the BEST description of the failure that can be used in a defect report?

Select ONE option.

25 / 40

25. You are testing a temperature control system for a horticultural cold storage facility. The system receives the temperature (in full degrees Celsius) as the input. If the temperature is between 0 and 2 degrees inclusive, the system displays the message “temperature OK”. For lower temperatures, the system displays the message "temperature too low" and for higher temperatures it displays the message “temperature too high”.

Using two-value boundary value analysis, which of the following sets of test inputs provides the highest level of boundary value coverage?

Select ONE option.

26 / 40

26. Which of the following statements describe a valid test objective?

Select ONE option.

27 / 40

27. The system for selling cinema tickets calculates the discount type based on the client’s birth year (BY) and on the current year (CY) as follows:

 

Let D be the difference between CY and BY, that is, D = CY – BY

• If D < 0 then print the error message “birth year cannot be greater than current year”

• If 0 ≤ D < 18 then apply the student discount

• If 18 ≤ D < 65 then apply no discount • If D ≥ 65 then apply the pensioner discount

Your test suite already contains two test cases:

• BY = 1990, CY = 2020, expected result: no discount
• BY = 2030, CY = 2029, expected result: print the error message

Which of the following test data sets should be added to achieve full valid equivalence partitioning coverage for the discount type?

Select TWO options.

28 / 40

28. The ‘absence-of-defects fallacy’ is one of the principles of testing. Which of the following is an example of addressing this principle in practice?

Select ONE option.

29 / 40

29. Given the following risks:

1. Ineffective loop implementation causes long system responses
2. Consumers change their preferences
3. Flooding of the server room
4. Patients above a certain age receive inaccurate reports

And the following mitigation activities:

A. Risk acceptance
B. Performance testing
C. Using boundary value analysis as the test technique
D. Risk transfer

Which of the following BEST matches the risks with the mitigation activities?

Select ONE option.

30 / 40

30. Which of the following is a good testing practice that applies to all software development lifecycles?

Select ONE option.

31 / 40

31. Which of the following is a product quality metric?

Select ONE option.

32 / 40

32. Your test suite S for a program P achieves 100% statement coverage. It consists of three test cases, each of which achieves 50% statement coverage.

Which of the following statements is CORRECT?

Select ONE option.

33 / 40

33. Which of the following is an example of a test-first approach to development?

Select ONE option.

34 / 40

34. You are testing a user story with three acceptance criteria: AC1, AC2 and AC3. AC1 is covered by test case TC1, AC2 by TC2, and AC3 by TC3. The test execution history had three test runs on three consecutive versions of the software as follows:

Tests are repeated once you are informed that all defects found in the test run are corrected and a new version of the software is available.
Which of the above tests are executed as regression tests?

Select ONE option.

35 / 40

35. Which of the following is an example of how product risk analysis may influence the thoroughness and scope of testing?

Select ONE option.

36 / 40

36. Which of the following statements is CORRECT?

Select ONE option.

37 / 40

37. Which of the following is a benefit of early and frequent stakeholder feedback?

Select ONE option.

38 / 40

38. The user reported a software failure. An engineer from the support team asked the user for the software version number where the failure was observed. Based on the version number, the team reassembled all the files that made up the release. This later allowed a developer to perform analysis, find the defect, and fix it.

Which of the following enabled the above activity to be performed by the team?

Select ONE options.

39 / 40

39. The team wants to estimate the time needed for one tester to execute four test cases for a software component. The team has gathered the following measures of the effort used to execute a single test case:

• Best-case scenario: 1 hour
• Worst-case scenario: 8 hours
• Most likely scenario: 3 hours

Given that the three-point estimation technique is being used, what is the final estimate of the time needed to execute all four test cases?

Select ONE option.

40 / 40

40. You are designing test cases based on the following decision table.

So far you have designed the following test cases:

• TC1: 19-year-old, unregistered man with no experience; expected result: category A
• TC2: 65-year-old, unregistered woman with 5 years of experience; expected result: category B
• TC3: 66-year-old, registered man with no experience; expected result: category C
• TC4: 65-year-old, registered woman with 4 years of experience; expected result:
category D

Which of the following test cases, when added to the existing set of test cases, will increase the decision table coverage?

Select ONE option.

0%

Scroll to top