ExamGecko
Home Home / ISTQB / CTAL-TTA

ISTQB CTAL-TTA Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











At which test level would reliability testing most likely be performed?

A.
Static testing
A.
Static testing
Answers
B.
Component testing
B.
Component testing
Answers
C.
System testing
C.
System testing
Answers
D.
Functional acceptance testing
D.
Functional acceptance testing
Answers
Suggested answer: C

Explanation:

Reliability testing is aimed at verifying the software's ability to function under expected conditions for a specified period of time. It is typically conducted during system testing, where the software is tested in its entirety to ensure that all components work together as expected in an environment that closely simulates the production environment. Reliability testing is not typically associated with static testing, component testing, or functional acceptance testing, as these levels of testing do not address the overall behavior of the system over time.

Consider the following control flow graph:

The control flow represents a software component of a car navigation system. Within the project the maximum cyclomatic complexity to be allowed is set at 5.

Which of the following statements is correct?

A.
No defect needs to be reported since the cyclomatic complexity of the component is calculated at 3.
A.
No defect needs to be reported since the cyclomatic complexity of the component is calculated at 3.
Answers
B.
No defect needs to be reported since the cyclomatic complexity of the component is calculated at 4
B.
No defect needs to be reported since the cyclomatic complexity of the component is calculated at 4
Answers
C.
No defect needs to be reported since the cyclomatic complexity of the component is calculated at 5.
C.
No defect needs to be reported since the cyclomatic complexity of the component is calculated at 5.
Answers
D.
A defect needs to be reported since the cyclomatic complexity of the component is calculated at 6.
D.
A defect needs to be reported since the cyclomatic complexity of the component is calculated at 6.
Answers
Suggested answer: D

Explanation:

Cyclomatic complexity is a measure of the number of linearly-independent paths through a program's source code, which is often used as a measure of the complexity of a program. The control flow graph provided represents the logic of a software component and has more than 5 nodes with decision points, indicating that the complexity would exceed the maximum allowed value of 5. The calculation for cyclomatic complexity is V(G) = E - N + 2P, where E is the number of edges, N is the number of nodes, and P is the number of connected components. In this case, the calculated cyclomatic complexity exceeds the allowed threshold, thus a defect should be reported.

Consider the pseudo code for the Answer program:

Which of the following statements about the Answer program BEST describes the control flow anomalies to be found in the program?

A.
The Answer program contains no control flow anomalies.
A.
The Answer program contains no control flow anomalies.
Answers
B.
The Answer program contains unreachable code.
B.
The Answer program contains unreachable code.
Answers
C.
The Answer program contains unreachable code and an infinite loop.
C.
The Answer program contains unreachable code and an infinite loop.
Answers
D.
The Answer program contains an infinite loop.
D.
The Answer program contains an infinite loop.
Answers
Suggested answer: C

Explanation:

The provided pseudo code for the Answer program shows a WHILE loop that will always execute because the condition for the loop to terminate (a >= d) is never met within the loop's body. This results in an infinite loop. Additionally, since the value of 'b' is initialized with 'a + 10' and 'a' starts from a value that is read and then set to 2, 'b' will never be equal to 12. Therefore, the 'THEN' branch of the IF statement, which includes 'print(b)', is unreachable. These are control flow anomalies because they represent logic in the code that will not function as presumably intended.

Which of the following statements about fault seeding tools is correct?

A.
Fault seeding tools insert defects into the source code to check the effectiveness of testing.
A.
Fault seeding tools insert defects into the source code to check the effectiveness of testing.
Answers
B.
Fault seeding tools insert defects into the source code to test the input checking capabilities of the software.
B.
Fault seeding tools insert defects into the source code to test the input checking capabilities of the software.
Answers
C.
Fault seeding tools insert defects into the source code to support the application of specification-based test design techniques.
C.
Fault seeding tools insert defects into the source code to support the application of specification-based test design techniques.
Answers
D.
Fault seeding tools insert defects into the source code to check the level of maintainability of the software.
D.
Fault seeding tools insert defects into the source code to check the level of maintainability of the software.
Answers
Suggested answer: A

Explanation:

Fault seeding is a method used to evaluate the effectiveness of a testing process. Tools designed for fault seeding intentionally insert known defects into the source code, which are then supposed to be discovered during testing. The main purpose is not to check the input checking capabilities, support specification-based test design techniques, or assess maintainability of the software, but rather to gauge how well the testing process can identify and capture defects. By comparing the number of seeded faults that are found against the total number of faults inserted, test teams can get an insight into the effectiveness of their testing strategies and coverage. This method helps in understanding the detection capabilities of testing efforts and in identifying potential areas for improvement in test processes.

Why might static analysis be used on an Agile project'

SELECT ONE OPTION

A.
To implement a test-driven approach at the component level
A.
To implement a test-driven approach at the component level
Answers
B.
To manually identify potential defects and thus avoid technical debt
B.
To manually identify potential defects and thus avoid technical debt
Answers
C.
To clarify and simplify code design without changing its behavior
C.
To clarify and simplify code design without changing its behavior
Answers
D.
To identify the causes of technical debt through the use of tools
D.
To identify the causes of technical debt through the use of tools
Answers
Suggested answer: D

Explanation:

Static analysis is used on an Agile project to identify the causes of technical debt through the use of tools. This approach allows teams to detect potential issues in code that could lead to technical debt if not addressed promptly, thus maintaining the health of the codebase as it evolves rapidly in Agile environments .

The following User story is being developed using the 8DD approach:

As a Purchasing Manager

i want to see a list of all Purchase Orders placed so far this month with their total value

So that I can control the amount of money being spent

Which scenario is BOTH written in correct Gherkin format AND is appropriate for this User Story9

SEI ECT ONE OPTION

A.
Given that three Purchase Orders with a total value of 21.75 have been placed so far this month AND the Purchasing Manager has navigated to the Purchase Order Reporting page When the Purchasing Manager clicks the button 'List of Purchase Orders placed this month' Then the 3 orders and their total value of 21.75 are displayed
A.
Given that three Purchase Orders with a total value of 21.75 have been placed so far this month AND the Purchasing Manager has navigated to the Purchase Order Reporting page When the Purchasing Manager clicks the button 'List of Purchase Orders placed this month' Then the 3 orders and their total value of 21.75 are displayed
Answers
B.
Given that three Purchase Orders with a total value of 21.75 have been placed so far this month When the Purchasing Manager requests the list of Purchase Orders placed this month Then the appropriate details are displayed
B.
Given that three Purchase Orders with a total value of 21.75 have been placed so far this month When the Purchasing Manager requests the list of Purchase Orders placed this month Then the appropriate details are displayed
Answers
C.
Given that I am a Purchasing Manager AND three Purchase Orders with a total value of 21.75 have been placed so far this month When I request the list of Purchase Orders placed this month Then all orders and their total value of 21.75 are displayed
C.
Given that I am a Purchasing Manager AND three Purchase Orders with a total value of 21.75 have been placed so far this month When I request the list of Purchase Orders placed this month Then all orders and their total value of 21.75 are displayed
Answers
D.
Given that three Purchase Orders with a total value of 21.75 have been placed so far this month When the Purchasing Manager requests the list of Purchase Orders placed this month Then the 3 orders and their total value of 21.75 are displayed
D.
Given that three Purchase Orders with a total value of 21.75 have been placed so far this month When the Purchasing Manager requests the list of Purchase Orders placed this month Then the 3 orders and their total value of 21.75 are displayed
Answers
Suggested answer: D

Explanation:

The scenario written in correct Gherkin format and appropriate for the User Story described is Option D:

Given that three Purchase Orders with a total value of 21.75 have been placed so far this month,

When the Purchasing Manager requests the list of Purchase Orders placed this month,

Then the 3 orders and their total value of 21.75 are displayed.

This scenario correctly uses the Gherkin syntax with Given-When-Then structures that clearly specify the context, the action taken by the user, and the expected outcome, making it directly relevant to the user story's intent .

Which requirements engineering technique would BEST identify how different groups of users may interact with a system, helping to identify gaps and inconsistencies in a user story-'

SELECT ONE OPTION

A.
Personas
A.
Personas
Answers
B.
Storyboards
B.
Storyboards
Answers
C.
Use Cases
C.
Use Cases
Answers
D.
Story Mapping
D.
Story Mapping
Answers
Suggested answer: A

Explanation:

Personas are the best requirements engineering technique for identifying how different groups of users may interact with a system. This technique involves creating detailed profiles for fictional users that represent different user segments. By exploring these personas, developers and testers can uncover unique needs, behaviors, and potential gaps in the system's design and functionality .

Which of the following elicitation techniques is BEST usedwhen questioning a large number of stakeholders specifically to obtain information for non-functional acceptance criteria?

SELECT ONE OPTION

A.
Quality Analysis
A.
Quality Analysis
Answers
B.
Quantitative Questionnaires
B.
Quantitative Questionnaires
Answers
C.
Qualitative Questionnaires
C.
Qualitative Questionnaires
Answers
D.
Qualitative Review
D.
Qualitative Review
Answers
Suggested answer: B

Explanation:

Quantitative Questionnaires are the best elicitation technique for questioning a large number of stakeholders specifically to obtain information for non-functional acceptance criteria. This method allows for collecting measurable, numerical data from a broad audience efficiently, which is crucial for understanding and defining non-functional requirements such as performance, scalability, and usability

Which option below describes the BEST approach for testing a Medium risk mission- or safety-critical system?

SELECT ONE OPTION

A.
Automated tests recommended. Exploratory tests recommended, manual Black-box tests recommended
A.
Automated tests recommended. Exploratory tests recommended, manual Black-box tests recommended
Answers
B.
Automated tests recommended. Exploratory tests highly recommended, manual Black box tests recommended.
B.
Automated tests recommended. Exploratory tests highly recommended, manual Black box tests recommended.
Answers
C.
Automated tests optional (neutral). Exploratory tests highly recommended, manual Black-box tests optional (neutral).
C.
Automated tests optional (neutral). Exploratory tests highly recommended, manual Black-box tests optional (neutral).
Answers
D.
Automated tests optional. Exploratory tests highly recommended, manual Black-box tests recommended
D.
Automated tests optional. Exploratory tests highly recommended, manual Black-box tests recommended
Answers
Suggested answer: B

Explanation:

For a Medium risk mission- or safety-critical system, the best testing approach includes a combination of automated tests, exploratory tests, and manual black-box tests. Option B is the most comprehensive, advocating for automated tests to ensure reliability and repeatability, highly recommending exploratory tests to cover unforeseen scenarios, and recommending manual black-box tests to cover standard use cases. This multifaceted approach ensures thorough testing coverage essential for medium risk, safety-critical systems.

You have identified existing test cases that require re-factoring, Which is the NEXT task you should perform?

SELECT ONE OPTION

A.
Adjust the observable behavior of the tests to meet the user stories
A.
Adjust the observable behavior of the tests to meet the user stories
Answers
B.
Re run the tests to ensure that the test results remain the same
B.
Re run the tests to ensure that the test results remain the same
Answers
C.
Analyze the Impact of the functionality of the current iteration on the existing regression tests
C.
Analyze the Impact of the functionality of the current iteration on the existing regression tests
Answers
D.
Make changes to the internal structure of the tests to improve maintainability
D.
Make changes to the internal structure of the tests to improve maintainability
Answers
Suggested answer: D

Explanation:

Once existing test cases have been identified for refactoring, the next step is typically to make changes to the internal structure of these tests to improve their maintainability. This involves revising the code or scripts to make them cleaner, more efficient, and easier to understand, which helps in maintaining them over time as the software evolves. This process may also involve updating test data or dependencies to ensure that the tests remain robust and reliable .

Total 129 questions
Go to page: of 13