McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Bachelor of Business Administration in Computer Applications (BBA [CA]) , Bachelor of Business Administration (BBA) , Master of Computer Applications (MCA) .
Chapters
1. |
A configuration management system would NOT normally provide: |
A. | linkage of customer requirements to version numbers. |
B. | the precise differences in versions of software component source code. |
C. | facilities to compare test results with expected results. |
D. | restricted access to the source code library |
Answer» C. facilities to compare test results with expected results. |
2. |
Test cases are designed during: |
A. | test recording. |
B. | test configuration. |
C. | test planning. |
D. | test specification |
Answer» D. test specification |
3. |
In case of Large Systems |
A. | only few tests should be run |
B. | test cases written by good test engineers should be executed |
C. | only good test cases should be executed |
D. | testing should be on the basis of risk |
Answer» D. testing should be on the basis of risk |
4. |
Which of the following is not a type of incremental testing approach? |
A. | big-bang |
B. | top down |
C. | bottom up |
D. | functional incrimination |
Answer» A. big-bang |
5. |
Test Conditions are derived from |
A. | test design |
B. | test cases |
C. | test data |
D. | specifications |
Answer» D. specifications |
6. |
Pick the best definition of quality |
A. | quality is job one |
B. | zero defects |
C. | work as designed |
D. | conformance to requirements |
Answer» D. conformance to requirements |
7. |
Fault Masking is |
A. | creating a test case which does not reveal a fault |
B. | error condition hiding another error condition |
C. | masking a fault by developer |
D. | masking a fault by a tester |
Answer» B. error condition hiding another error condition |
8. |
One Key reason why developers have difficulty testing their own work is: |
A. | lack of technical documentation |
B. | lack of test tools on the market for developer’s |
C. | lack of objectivity |
D. | lack of training |
Answer» C. lack of objectivity |
9. |
In a review meeting a moderator is a person who: |
A. | takes minutes of the meeting |
B. | takes telephone calls |
C. | mediates between people |
D. | writes the documents to be reviewed |
Answer» C. mediates between people |
10. |
Acceptance test cases are based on what? |
A. | decision table |
B. | design |
C. | code |
D. | requirements |
Answer» D. requirements |
11. |
How much testing is enough? |
A. | this question is easy to answer |
B. | this question is impossible to answer |
C. | the answer depends on the risk for your industry, contract and special requirements |
D. | this answer depends on the maturity of your developers |
Answer» C. the answer depends on the risk for your industry, contract and special requirements |
12. |
which of the following is the component test standard? |
A. | ieee 610 |
B. | ieee 829 |
C. | bs7925-1 |
D. | bs7925-2 |
Answer» D. bs7925-2 |
13. |
Which of the following is NOT a standard related to testing? |
A. | ieee610 |
B. | ieee829 |
C. | bs7925-1 |
D. | bs7925-2 |
Answer» A. ieee610 |
14. |
The standard that gives definitions of testing terms is: |
A. | iso/iec 12207 |
B. | bs 7925-1 |
C. | ansi/ieee 729 |
D. | ansi/ieee 829 |
Answer» B. bs 7925-1 |
15. |
Which of the following is NOT true of incidents? |
A. | incidents are raised when expected and actual results differ. |
B. | incidents may be raised against user requirements. |
C. | incidents require investigation and/or correction. |
D. | incident resolution is the responsibility of the author of the software under test. |
Answer» D. incident resolution is the responsibility of the author of the software under test. |
16. |
Which of the following is false? |
A. | in a system two different failures may have different severities. |
B. | a fault need not affect the reliability of a system. |
C. | a system is necessarily more reliable after debugging for the removal of a fault. |
D. | undetected errors may lead to faults and eventually to incorrect behavior. |
Answer» C. a system is necessarily more reliable after debugging for the removal of a fault. |
17. |
Which of the following is the odd one out? |
A. | white box |
B. | functional |
C. | structural |
D. | glass box |
Answer» B. functional |
18. |
Which of the following is a static test? |
A. | coverage analysis |
B. | code inspection |
C. | usability assessment |
D. | installation test |
Answer» B. code inspection |
19. |
Which of the following is a black box design technique? |
A. | statement testing |
B. | error- guessing |
C. | equivalence partitioning |
D. | usability testing |
Answer» C. equivalence partitioning |
20. |
Which of the following is not the integration strategy? |
A. | design based |
B. | bottom-up |
C. | big-bang |
D. | top-down |
Answer» A. design based |
21. |
Expected results are: |
A. | only important in system testing |
B. | most useful when specified in advance |
C. | only used in component testing |
D. | derived from the code |
Answer» B. most useful when specified in advance |
22. |
Incidents would not be raised against: |
A. | requirements |
B. | documentation |
C. | improvements suggested by users |
D. | test cases |
Answer» C. improvements suggested by users |
23. |
Which of the following uses Impact Analysis most? |
A. | non-functional system testing |
B. | component testing |
C. | user acceptance testing |
D. | maintenance testing |
Answer» D. maintenance testing |
24. |
What type of review requires formal entry and exit criteria, including metrics? |
A. | management review |
B. | inspection |
C. | walkthrough |
D. | post project review |
Answer» B. inspection |
25. |
Which of the following items would not come under Configuration Management? |
A. | operating systems |
B. | live data |
C. | test documentation |
D. | user requirement documents |
Answer» B. live data |
26. |
Maintenance testing is: |
A. | testing to maintain business advantage |
B. | testing a released system that has been changed |
C. | testing by users to ensure that the system meets a business need |
D. | updating tests when the software has changed |
Answer» B. testing a released system that has been changed |
27. |
Which of the following techniques is NOT a black box technique? |
A. | state transition testing |
B. | syntax testing |
C. | lcsaj |
D. | boundary value analysis |
Answer» C. lcsaj |
28. |
What can static analysis NOT find? |
A. | memory leaks |
B. | unreachable (“dead”) code |
C. | the use of a variable before it has been defined |
D. | array bound violations |
Answer» A. memory leaks |
29. |
. In prioritizing what to test, the most important objective is to: |
A. | test high risk areas. |
B. | find as many faults as possible. |
C. | obtain good test coverage. |
D. | test whatever is easiest to test. |
Answer» A. test high risk areas. |
30. |
Which of the following is false? |
A. | an incident can be raised against documentation. |
B. | an incident occurs when expected and actual results differ. |
C. | incidents can be analysed to assist in test process improvement. |
D. | incidents should always be fixed. |
Answer» D. incidents should always be fixed. |
31. |
Configuration Management Plan describes the Configuration Management procedures and structures to be used. |
A. | true |
B. | false |
Answer» A. true |
32. |
Phase Definition. It will come under |
A. | cmm level 1 |
B. | cmm level 2 |
C. | none |
Answer» B. cmm level 2 |
33. |
Software testing which is done without planning and Documentation is known as |
A. | adhoc testing |
B. | unit testing |
C. | regression testing |
D. | functional testing. |
Answer» A. adhoc testing |
34. |
Acceptance testing is known as |
A. | beta testing |
B. | greybox testing |
C. | test automation |
D. | white box testing |
Answer» A. beta testing |
35. |
Retesting the entire application after a change has been made called as? |
A. | full regression testing |
B. | unit regression |
C. | regional regression |
D. | retesting |
Answer» A. full regression testing |
36. |
Boundary value analysis belongs to which testing method? |
A. | black box testing |
B. | white box testing |
Answer» A. black box testing |
37. |
What are the Types of Integration Testing? |
A. | big bang testing |
B. | bottom up testing |
C. | top down testing |
D. | all the above |
Answer» D. all the above |
38. |
Product Risk affects The quality or performance of the software. |
A. | true |
B. | false |
Answer» A. true |
39. |
A metric used to measure the characteristic of documentation and code called as |
A. | process metric |
B. | product metric |
C. | test metrics |
Answer» B. product metric |
40. |
Which is non-functional software testing? |
A. | unit testing |
B. | block box testing |
C. | performance testing |
D. | regression testing |
Answer» C. performance testing |
41. |
The process that deals with the technical and management issues of software development called as? |
A. | delivery process |
B. | testing process |
C. | software process |
Answer» C. software process |
42. |
Executing the same test case on a modified build called as |
A. | regression testing |
B. | retesting |
C. | ad hoc testing |
D. | sanity testing |
Answer» A. regression testing |
43. |
Which is Black-Box Testing method? |
A. | equivalence partitioning |
B. | code coverage |
C. | fault injection |
Answer» A. equivalence partitioning |
44. |
The review process for a particular review begins with a _____________ by the author to the moderator in formal review. |
A. | request for review |
B. | requirement analysis |
C. | notice for review |
D. | goal design |
Answer» A. request for review |
45. |
Configuration management procedures be implemented during ____________ |
A. | test execution |
B. | test planning |
C. | test design |
D. | test success |
Answer» B. test planning |
46. |
_______________ of information refers to protecting information from being modified by unauthorized parties. |
A. | confidentiality |
B. | authentication |
C. | authorization |
D. | integrity |
Answer» D. integrity |
47. |
_____________looks for known security issues by using automated tools to match conditions with known vulnerabilities. |
A. | discovery |
B. | vulnerability scan |
C. | security assessment |
D. | penetration test |
Answer» B. vulnerability scan |
48. |
_________ is driven by an Audit or a Risk function to look at a specific control or compliance issue. |
A. | security audit |
B. | vulnerability scan |
C. | vulnerability assessment |
D. | penetration test |
Answer» A. security audit |
49. |
________________ simulates an attack by a malicious party. |
A. | security audit |
B. | vulnerability scan |
C. | vulnerability assessment |
D. | penetration test |
Answer» D. penetration test |
50. |
______________ builds upon Vulnerability Assessment by adding manual verification to confirm exposure. |
A. | security audit |
B. | security assessment |
C. | vulnerability assessment |
D. | penetration test |
Answer» B. security assessment |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.