McqMate
Chapters
1. |
Which of the following uses Impact Analysis most? |
A. | non-functional system testing |
B. | component testing |
C. | user acceptance testing |
D. | maintenance testing |
Answer» D. maintenance testing |
2. |
What type of review requires formal entry and exit criteria, including metrics? |
A. | management review |
B. | inspection |
C. | walkthrough |
D. | post project review |
Answer» B. inspection |
3. |
Which of the following items would not come under Configuration Management? |
A. | operating systems |
B. | live data |
C. | test documentation |
D. | user requirement documents |
Answer» B. live data |
4. |
Maintenance testing is: |
A. | testing to maintain business advantage |
B. | testing a released system that has been changed |
C. | testing by users to ensure that the system meets a business need |
D. | updating tests when the software has changed |
Answer» B. testing a released system that has been changed |
5. |
Which of the following techniques is NOT a black box technique? |
A. | state transition testing |
B. | syntax testing |
C. | lcsaj |
D. | boundary value analysis |
Answer» C. lcsaj |
6. |
What can static analysis NOT find? |
A. | memory leaks |
B. | unreachable (“dead”) code |
C. | the use of a variable before it has been defined |
D. | array bound violations |
Answer» A. memory leaks |
7. |
. In prioritizing what to test, the most important objective is to: |
A. | test high risk areas. |
B. | find as many faults as possible. |
C. | obtain good test coverage. |
D. | test whatever is easiest to test. |
Answer» A. test high risk areas. |
8. |
Which of the following is false? |
A. | an incident can be raised against documentation. |
B. | an incident occurs when expected and actual results differ. |
C. | incidents can be analysed to assist in test process improvement. |
D. | incidents should always be fixed. |
Answer» D. incidents should always be fixed. |
9. |
Configuration Management Plan describes the Configuration Management procedures and structures to be used. |
A. | true |
B. | false |
Answer» A. true |
10. |
Phase Definition. It will come under |
A. | cmm level 1 |
B. | cmm level 2 |
C. | none |
Answer» B. cmm level 2 |
11. |
Software testing which is done without planning and Documentation is known as |
A. | adhoc testing |
B. | unit testing |
C. | regression testing |
D. | functional testing. |
Answer» A. adhoc testing |
12. |
Acceptance testing is known as |
A. | beta testing |
B. | greybox testing |
C. | test automation |
D. | white box testing |
Answer» A. beta testing |
13. |
Retesting the entire application after a change has been made called as? |
A. | full regression testing |
B. | unit regression |
C. | regional regression |
D. | retesting |
Answer» A. full regression testing |
14. |
Boundary value analysis belongs to which testing method? |
A. | black box testing |
B. | white box testing |
Answer» A. black box testing |
15. |
What are the Types of Integration Testing? |
A. | big bang testing |
B. | bottom up testing |
C. | top down testing |
D. | all the above |
Answer» D. all the above |
16. |
Product Risk affects The quality or performance of the software. |
A. | true |
B. | false |
Answer» A. true |
17. |
A metric used to measure the characteristic of documentation and code called as |
A. | process metric |
B. | product metric |
C. | test metrics |
Answer» B. product metric |
18. |
Which is non-functional software testing? |
A. | unit testing |
B. | block box testing |
C. | performance testing |
D. | regression testing |
Answer» C. performance testing |
19. |
The process that deals with the technical and management issues of software development called as? |
A. | delivery process |
B. | testing process |
C. | software process |
Answer» C. software process |
20. |
Executing the same test case on a modified build called as |
A. | regression testing |
B. | retesting |
C. | ad hoc testing |
D. | sanity testing |
Answer» A. regression testing |
21. |
Which is Black-Box Testing method? |
A. | equivalence partitioning |
B. | code coverage |
C. | fault injection |
Answer» A. equivalence partitioning |
22. |
The review process for a particular review begins with a _____________ by the author to the moderator in formal review. |
A. | request for review |
B. | requirement analysis |
C. | notice for review |
D. | goal design |
Answer» A. request for review |
23. |
Configuration management procedures be implemented during ____________ |
A. | test execution |
B. | test planning |
C. | test design |
D. | test success |
Answer» B. test planning |
24. |
_______________ of information refers to protecting information from being modified by unauthorized parties. |
A. | confidentiality |
B. | authentication |
C. | authorization |
D. | integrity |
Answer» D. integrity |
25. |
_____________looks for known security issues by using automated tools to match conditions with known vulnerabilities. |
A. | discovery |
B. | vulnerability scan |
C. | security assessment |
D. | penetration test |
Answer» B. vulnerability scan |
26. |
_________ is driven by an Audit or a Risk function to look at a specific control or compliance issue. |
A. | security audit |
B. | vulnerability scan |
C. | vulnerability assessment |
D. | penetration test |
Answer» A. security audit |
27. |
________________ simulates an attack by a malicious party. |
A. | security audit |
B. | vulnerability scan |
C. | vulnerability assessment |
D. | penetration test |
Answer» D. penetration test |
28. |
______________ builds upon Vulnerability Assessment by adding manual verification to confirm exposure. |
A. | security audit |
B. | security assessment |
C. | vulnerability assessment |
D. | penetration test |
Answer» B. security assessment |
29. |
Which of the following is likely to benefit most from the use of test tools providing test capture and replay facilities? |
A. | integration testing |
B. | regression testing |
C. | system testing |
D. | user acceptance testing |
Answer» B. regression testing |
Done Reading?