ExamGecko
Home Home / ISTQB / CTAL-TTA

ISTQB CTAL-TTA Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Which of the following are activities that the Technical Test Analyst performs when setting up a test automation project?

1. Schedule the manual testing

2. Define interface requirements between tools

3. Perform a code review on the functional specifications

4. Determine whether to use a rule-dnven approach

5. Tram the test analysts to use and supply the data

A.
1.2
A.
1.2
Answers
B.
3. 5
B.
3. 5
Answers
C.
1.4
C.
1.4
Answers
D.
2,5
D.
2,5
Answers
Suggested answer: D

Explanation:

In setting up a test automation project, the Technical Test Analyst performs activities such as defining interface requirements between tools and training the test analysts to use and supply the data. These activities are crucial for ensuring that the automation tools are effectively integrated and that the team is capable of utilizing these tools efficiently.

What is the earliest stage in the application's SDLC at which performance efficiency testing can be performed?

A.
During requirements analysis
A.
During requirements analysis
Answers
B.
During unit testing
B.
During unit testing
Answers
C.
During system testing
C.
During system testing
Answers
D.
During beta testing
D.
During beta testing
Answers
Suggested answer: A

Explanation:

The earliest stage in the application's SDLC at which performance efficiency testing can be performed is during requirements analysis. At this stage, performance requirements and goals are established, providing a baseline for what needs to be tested and verified throughout the later stages of development.

You have been assigned the task of defining the risk-based approach to testing the performance efficiency of a new application. Which of the following is an ISTQB defined technique to use for Identifying the risks?

A.
Reviewing the unit testing that has already been conducted on the application to verify performance efficiency
A.
Reviewing the unit testing that has already been conducted on the application to verify performance efficiency
Answers
B.
Analyzing the requirements to look for areas where performance efficiency requirements have not been well-defined
B.
Analyzing the requirements to look for areas where performance efficiency requirements have not been well-defined
Answers
C.
Interviewing performance efficiency experts to determine what areas are likely to contain the highest levels of risk
C.
Interviewing performance efficiency experts to determine what areas are likely to contain the highest levels of risk
Answers
D.
Conducting a hazard analysis with the non-technical business stakeholders to identify areas in the code that are likely to contain high levels of performance efficiency risk
D.
Conducting a hazard analysis with the non-technical business stakeholders to identify areas in the code that are likely to contain high levels of performance efficiency risk
Answers
Suggested answer: B

Explanation:

An ISTQB defined technique for identifying risks when defining a risk-based approach to testing the performance efficiency of a new application is to analyze the requirements to look for areas where performance efficiency requirements have not been well-defined. This technique ensures that testing efforts are focused on areas of the application that are critical for performance but may have insufficient coverage in terms of detailed requirements.

Consider the following code segments.

Segment 1:

If a > b then setc = 12

elseif c >7 set c = 5

endif

Segment 2: setc= 12 for n = 1 to c

display c

endfor

Segment 3:

If (a > b) or (c < d) then

set c = 12

else

set c = 5

endlf

Segment 4:

set y = 4

call (segments)

segments:

start

for I = 1 to y

print y

endfor

end

Which segment would receive the highest cyclomatic complexity value?

A.
Segment 1
A.
Segment 1
Answers
B.
Segment 2
B.
Segment 2
Answers
C.
Segment 3
C.
Segment 3
Answers
D.
Segment 4
D.
Segment 4
Answers
Suggested answer: C

Explanation:

Cyclomatic complexity is a measure of the number of linearly independent paths through a program's source code. Segment 3 has two conditions: if (a > b) or (c < d) and the associated else. This structure introduces multiple decision points, thereby increasing the number of potential execution paths. Comparatively, the other segments have fewer conditions and straightforward loops, which contribute to a lower cyclomatic complexity. Segment 3, with its compound condition and branching logic, likely has the highest cyclomatic complexity.

Consider the following section of pseudo code and associated test Input data:

If withdrawal-amount <= amount-on-deposit then Set authorize-transaction = true

Else

If withdrawal-amount <= S100 AND preferred-customer = true then Set authorize-transaction = true

Else

Set authorize-transaction = false

Endif

Endif

Input data set #1

withdrawal-amount = 160

amount-on-deposit = 100

preferred-customer = true

Input data set #2

withdrawal-amount = 500

amount-on-deposit = 500

preferred-customer = false

Input data set #3

withdrawal-amount = 50

amount-on-deposit = 500

preferred-customer = false

What would be the decision coverage achieved if each of these test input data sets were run once?

A.
100%
A.
100%
Answers
B.
50%
B.
50%
Answers
C.
0%
C.
0%
Answers
D.
33%
D.
33%
Answers
Suggested answer: A

Explanation:

To achieve decision coverage, each branch of the decision structure in the code must be executed at least once. The code snippet has three branches:

withdrawal-amount <= amount-on-deposit

withdrawal-amount <= $100 AND preferred-customer = true

Default case where the transaction is not authorized

Data set #1 triggers the second branch because the withdrawal amount is not less than the amount on deposit, but it is less than $100, and the user is a preferred customer.

Data set #2 triggers the first branch where the withdrawal amount is equal to the amount on deposit.

Data set #3 tests the condition where the withdrawal amount is less than the deposit amount, but the user is not a preferred customer, triggering the default case.

All decision branches are covered by these test cases, achieving 100% decision coverage.

Within an embedded software project, the maintainability of the software is considered to be critical. It has been decided to use static analysis on each delivered software component.

Which of the following metrics is NOT a maintainability metric typically used with static analysis?

A.
Number of Lines of Code (LOG)
A.
Number of Lines of Code (LOG)
Answers
B.
Number of Function Calls
B.
Number of Function Calls
Answers
C.
Mean Time Between Failures
C.
Mean Time Between Failures
Answers
D.
Comment Frequency
D.
Comment Frequency
Answers
Suggested answer: C

Explanation:

Maintainability metrics typically used with static analysis include measures that reflect the complexity and understandability of the code, such as Number of Lines of Code (LOC), Number of Function Calls, and Comment Frequency. These metrics help in assessing how easily the software can be understood, modified, and maintained. Mean Time Between Failures (MTBF), on the other hand, is a reliability metric. It measures the time elapsed between inherent failures of a system during operation. MTBF is used to predict the system's reliability and is not directly related to the maintainability of the code. Reliability metrics like MTBF would be used in the testing phase to measure the operational reliability of the system rather than during static analysis for maintainability assessment.

You are involved in testing a system in the medical domain. Testing needs to comply with the FDA requirements and is rated as being safety critical. A product risk assessment has been performed and various mitigation actions have been identified. Reliability testing is one of the test types that needs to be performed throughout the development lifecycle.

Based on the information provided, which of the following activities would need to be addressed in the test plan?

A.
Perform a vulnerability scan.
A.
Perform a vulnerability scan.
Answers
B.
Design and execution of specific tests that evaluate the software's tolerance to faults in terms of handling unexpected input values.
B.
Design and execution of specific tests that evaluate the software's tolerance to faults in terms of handling unexpected input values.
Answers
C.
Design and execution of test cases for scalability.
C.
Design and execution of test cases for scalability.
Answers
D.
Testing whether the installation/de-installation can be completed.
D.
Testing whether the installation/de-installation can be completed.
Answers
Suggested answer: B

Explanation:

In the context of safety-critical systems, particularly in the medical domain, reliability is of utmost importance. For such systems, it is crucial to ensure that the software can handle unexpected input values and continue to operate without failure. This is essential to ensure patient safety and compliance with FDA requirements. Vulnerability scans (option A) are more related to security testing, whereas scalability (option C) and installation/de-installation (option D) are important but not specifically related to the reliability and safety criticality of the system in the medical domain.

The following characteristics were identified during an early product risk-assessment for a software system:

* the software system needs to manage synchronization between various processes

* microcontrollers will be used that will limit product performance

* the hardware that will be used will make use of timeslots

* the number of tasks supported in parallel by the software system is large and are often highly complex.

Based on the information provided, which of the following non-functional test types is MOST appropriate to be performed?

A.
Maintainability testing
A.
Maintainability testing
Answers
B.
Security testing
B.
Security testing
Answers
C.
Time-behaviour testing
C.
Time-behaviour testing
Answers
D.
Portability testing
D.
Portability testing
Answers
Suggested answer: C

Explanation:

The characteristics listed in the question point towards the need to manage synchronization between processes and make efficient use of limited hardware resources, such as microcontrollers and timeslots. Additionally, the complexity and concurrency of tasks highlight the importance of the software's performance over time. Time-behaviour testing is the most appropriate non-functional test type to perform in this scenario as it focuses on evaluating the timing aspects of the system, such as response times, processing times, and throughput rates. It ensures that the system meets its time-related requirements, which is critical for systems reliant on synchronization and limited by hardware performance constraints.

Consider the pseudo code for the Price program:

Which of the following statements about the Price program describes a control flow anomaly to be found in the program?

A.
The Price program contains no control flow anomalies.
A.
The Price program contains no control flow anomalies.
Answers
B.
The Price program contains unreachable code.
B.
The Price program contains unreachable code.
Answers
C.
The Price program contains data flow defects.
C.
The Price program contains data flow defects.
Answers
D.
The Price program contains an infinite loop.
D.
The Price program contains an infinite loop.
Answers
Suggested answer: D

Explanation:

The pseudo code provided for the Price program shows a potential for an infinite loop due to the way the 'Del_Charge' variable is being manipulated. The loop is set to continue 'WHILE Del_Charge > 0', and within the loop, 'Del_Charge' is initially set to 5 and then potentially decreased by 2 if 'Sale_Value > 60000'. However, at the end of each loop iteration, 'Del_Charge' is increased by 1. This means that if 'Sale_Value' is not greater than 60000, 'Del_Charge' will not decrease and will instead increment indefinitely, causing an infinite loop. Even if 'Sale_Value' is greater than 60000, the decrement by 2 could be negated by the subsequent increments if the loop runs enough times, potentially leading to an infinite loop situation. There is no guaranteed exit condition once the loop is entered, which is a control flow anomaly.

A major Caribbean bank typically develops their own banking software using an Agile methodology. However, for some specific components COTS software is acquired and used. The bank does not want to create a dependency on any external COTS supplier.

As part of the test approach, portability testing will be performed. Which portability sub-characteristic is especially relevant for the Caribbean bank?

A.
In stall ability
A.
In stall ability
Answers
B.
Adaptability
B.
Adaptability
Answers
C.
Replaceability
C.
Replaceability
Answers
D.
Co-existence
D.
Co-existence
Answers
Suggested answer: C

Explanation:

Portability testing is concerned with how well software can be transferred from one environment to another. In the context of a bank using COTS (Commercial Off-The-Shelf) software, the sub-characteristic of replaceability becomes particularly relevant. This is because the bank does not want to create a dependency on any external COTS supplier, meaning it should be able to replace the software with another product without significant effort or operational disruption. Replaceability ensures that if needed, the bank can switch to different software, thereby mitigating the risk of supplier dependency.

Total 129 questions
Go to page: of 13