Chapter: Specialized Testing and Testing Tools
1.

Which of the following uses Impact Analysis most?

A. non-functional system testing
B. component testing
C. user acceptance testing
D. maintenance testing
Answer» D. maintenance testing
2.

What type of review requires formal entry and exit criteria, including metrics?

A. management review
B. inspection
C. walkthrough
D. post project review
Answer» B. inspection
3.

Which of the following items would not come under Configuration Management?

A. operating systems
B. live data
C. test documentation
D. user requirement documents
Answer» B. live data
4.

Maintenance testing is:

A. testing to maintain business advantage
B. testing a released system that has been changed
C. testing by users to ensure that the system meets a business need
D. updating tests when the software has changed
Answer» B. testing a released system that has been changed
5.

Which of the following techniques is NOT a black box technique?

A. state transition testing
B. syntax testing
C. lcsaj
D. boundary value analysis
Answer» C. lcsaj
6.

What can static analysis NOT find?

A. memory leaks
B. unreachable (“dead”) code
C. the use of a variable before it has been defined
D. array bound violations
Answer» A. memory leaks
7.

. In prioritizing what to test, the most important objective is to:

A. test high risk areas.
B. find as many faults as possible.
C. obtain good test coverage.
D. test whatever is easiest to test.
Answer» A. test high risk areas.
8.

Which of the following is false?

A. an incident can be raised against documentation.
B. an incident occurs when expected and actual results differ.
C. incidents can be analysed to assist in test process improvement.
D. incidents should always be fixed.
Answer» D. incidents should always be fixed.
9.

Configuration Management Plan describes the Configuration Management procedures and structures to be used.

A. true
B. false
Answer» A. true
10.

Phase Definition. It will come under

A. cmm level 1
B. cmm level 2
C. none
Answer» B. cmm level 2
11.

Software testing which is done without planning and Documentation is known as

A. adhoc testing
B. unit testing
C. regression testing
D. functional testing.
Answer» A. adhoc testing
12.

Acceptance testing is known as

A. beta testing
B. greybox testing
C. test automation
D. white box testing
Answer» A. beta testing
13.

Retesting the entire application after a change has been made called as?

A. full regression testing
B. unit regression
C. regional regression
D. retesting
Answer» A. full regression testing
14.

Boundary value analysis belongs to which testing method?

A. black box testing
B. white box testing
Answer» A. black box testing
15.

What are the Types of Integration Testing?

A. big bang testing
B. bottom up testing
C. top down testing
D. all the above
Answer» D. all the above
16.

Product Risk affects The quality or performance of the software.

A. true
B. false
Answer» A. true
17.

A metric used to measure the characteristic of documentation and code called as

A. process metric
B. product metric
C. test metrics
Answer» B. product metric
18.

Which is non-functional software testing?

A. unit testing
B. block box testing
C. performance testing
D. regression testing
Answer» C. performance testing
19.

The process that deals with the technical and management issues of software development called as?

A. delivery process
B. testing process
C. software process
Answer» C. software process
20.

Executing the same test case on a modified build called as

A. regression testing
B. retesting
C. ad hoc testing
D. sanity testing
Answer» A. regression testing
21.

Which is Black-Box Testing method?

A. equivalence partitioning
B. code coverage
C. fault injection
Answer» A. equivalence partitioning
22.

The review process for a particular review begins with a _____________ by the author to the moderator in formal review.

A. request for review
B. requirement analysis
C. notice for review
D. goal design
Answer» A. request for review
23.

Configuration management procedures be implemented during ____________

A. test execution
B. test planning
C. test design
D. test success
Answer» B. test planning
24.

_______________ of information refers to protecting information from being modified by unauthorized parties.

A. confidentiality
B. authentication
C. authorization
D. integrity
Answer» D. integrity
25.

_____________looks for known security issues by using automated tools to match conditions with known vulnerabilities.

A. discovery
B. vulnerability scan
C. security assessment
D. penetration test
Answer» B. vulnerability scan
26.

_________ is driven by an Audit or a Risk function to look at a specific control or compliance issue.

A. security audit
B. vulnerability scan
C. vulnerability assessment
D. penetration test
Answer» A. security audit
27.

________________ simulates an attack by a malicious party.

A. security audit
B. vulnerability scan
C. vulnerability assessment
D. penetration test
Answer» D. penetration test
28.

______________ builds upon Vulnerability Assessment by adding manual verification to confirm exposure.

A. security audit
B. security assessment
C. vulnerability assessment
D. penetration test
Answer» B. security assessment
29.

Which of the following is likely to benefit most from the use of test tools providing test capture and replay facilities?

A. integration testing
B. regression testing
C. system testing
D. user acceptance testing
Answer» B. regression testing
Tags
Question and answers in Specialized Testing and Testing Tools, Specialized Testing and Testing Tools multiple choice questions and answers, Specialized Testing and Testing Tools Important MCQs, Solved MCQs for Specialized Testing and Testing Tools, Specialized Testing and Testing Tools MCQs with answers PDF download