ExamGecko
Home Home / ISTQB / CTAL-TTA

ISTQB CTAL-TTA Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Which of the following does NOT contribute to a more effective review preparation by the Technical Test Analyst?

A.
Ensure that participants spend enough time during preparation, e.g.. by managing checking rate (number of pages checked per hour during review preparation).
A.
Ensure that participants spend enough time during preparation, e.g.. by managing checking rate (number of pages checked per hour during review preparation).
Answers
B.
Managing logging rate (number of defects logged per minute during the meeting).
B.
Managing logging rate (number of defects logged per minute during the meeting).
Answers
C.
The usage of review checklists.
C.
The usage of review checklists.
Answers
D.
Review training for the Technical Test Analyst.
D.
Review training for the Technical Test Analyst.
Answers
Suggested answer: B

Explanation:

An effective review preparation by a Technical Test Analyst includes ensuring that participants are well-prepared and that they spend enough time on preparation, which can be managed by checking the rate (option A). The use of review checklists (option C) and providing review training (option D) are also methods that contribute to more effective review preparation. However, managing the logging rate (option B), or the number of defects logged per minute during the meeting, is not related to the preparation phase but rather to the defect detection and logging phase during the actual review meeting. It is not a preparation activity but a review execution activity.

A product risk assessment has revealed the following product risks:

* lack of usability requirements

* security during on-line transactions

* perceived performance of the system and response time from the user interface

* a required availability of almost 100%

To address the 4th risk, which of the following quality characteristics for technical testing should be part of the test approach?

A.
Adaptability
A.
Adaptability
Answers
B.
Reliability
B.
Reliability
Answers
C.
Portability
C.
Portability
Answers
D.
Compatibility
D.
Compatibility
Answers
Suggested answer: B

Explanation:

To address the product risk of requiring an availability of almost 100%, the quality characteristic of reliability should be part of the test approach. Reliability testing focuses on the ability of the system to perform under expected conditions for a specified period of time. It is essential for systems that need to be operational continuously or near-continuously. This characteristic encompasses the system's uptime, fault tolerance, recoverability, and the ability to perform under anticipated conditions, all of which are relevant to maintaining high availability.

You have been assigned to perform a review on code provided below:

Which type of defect should you report as part of the code review?

A.
Endless loop
A.
Endless loop
Answers
B.
Unreachable code
B.
Unreachable code
Answers
C.
Too many nested levels
C.
Too many nested levels
Answers
D.
No defects should be reported, code is correct.
D.
No defects should be reported, code is correct.
Answers
Suggested answer: A

Explanation:

The code provided contains a potential endless loop. The loop is conditioned on the variable 'E' being less than 1 (IF E < 1), but within the loop, there is no operation that modifies the value of 'E'. Therefore, once the loop is entered, if the condition A > B holds true, the value of 'E' remains unchanged, leading to an endless loop situation. The decrement of 'A' in line 15 does not guarantee an exit condition for the loop, as it does not affect the value of 'E'. This is a control flow defect that could cause the program to hang or crash.

Within the world of consumer electronics, the amount of embedded software is growing rapidly. The amount of software in high-end television sets has increased by a factor of about eight over the last six years. In addition, the market of consumer electronics has been faced with a 5 -10% price erosion per year. The price of a product is, among a number of other things, determined by the microcontroller used. Therefore, the use of ROM and RAM remains under high pressure in consumer electronic products, leading to severe restrictions on code size.

Within a new high-end TV project, it has been decided to apply dynamic analysis.

Which of the quality goals listed below is MOST appropriate to the project context?

A.
Prevent failures from occurring by detecting wild pointers and loss of system memory.
A.
Prevent failures from occurring by detecting wild pointers and loss of system memory.
Answers
B.
Analyse system failures which cannot easily be reproduced.
B.
Analyse system failures which cannot easily be reproduced.
Answers
C.
Evaluate network behaviour.
C.
Evaluate network behaviour.
Answers
D.
Improve system performance by providing information on run-time system behaviour.
D.
Improve system performance by providing information on run-time system behaviour.
Answers
Suggested answer: D

Explanation:

In the context of consumer electronics, where there is rapid growth in embedded software and pressure to minimize code size due to cost constraints, dynamic analysis can be particularly useful for improving system performance. Dynamic analysis involves examining the system's behavior during execution, which can provide insights into the efficiency of the code at runtime, memory utilization, and processing speed. In a high-end TV project where the use of ROM and RAM is under severe restrictions, dynamic analysis would be most appropriately applied to improve system performance, ensuring that the software runs efficiently within the available hardware resources. This supports the project context by contributing to the optimization of the software to run within the constraints of the microcontroller used, thereby potentially reducing costs.

Consider the pseudo code provided below regarding a customer request for cash withdrawal from an ATM.

If the customer has sufficient funds in their account

OR the customer has the credit granted

THEN the ATM machine pays out the requested amount to the customer

Which of the following test cases would be the result of applying multiple condition testing, but would NOT be the result of applying modified condition/decision testing?

A.
TC 1: Customer has sufficient funds. Credit has not been granted.
A.
TC 1: Customer has sufficient funds. Credit has not been granted.
Answers
B.
TC 2: Customer does not have sufficient funds. Credit has been granted.
B.
TC 2: Customer does not have sufficient funds. Credit has been granted.
Answers
C.
TC 3: Customer does not have sufficient funds. Credit has not been granted.
C.
TC 3: Customer does not have sufficient funds. Credit has not been granted.
Answers
D.
TC 4: Customer has sufficient funds. Credit has been granted.
D.
TC 4: Customer has sufficient funds. Credit has been granted.
Answers
Suggested answer: C

Explanation:

Multiple condition testing requires each possible combination of conditions to be tested, whereas modified condition/decision testing (MC/DC) requires each condition to be shown to independently affect the outcome. In the case of the ATM withdrawal, TC 3 (Customer does not have sufficient funds and credit has not been granted) would not result in the machine paying out, which is a result of applying multiple condition testing. However, for MC/DC, this test case would not be included because it doesn't provide an independent assessment of either condition's effect on the decision since both conditions are negative and the outcome is as expected (no payout).

Which of the following statements BEST describes how tools support model-based testing?

A.
Finite state machines are used to describe the intended execution-time behavior of a software-controlled system.
A.
Finite state machines are used to describe the intended execution-time behavior of a software-controlled system.
Answers
B.
Random sets of threads of execution are generated as test cases.
B.
Random sets of threads of execution are generated as test cases.
Answers
C.
Large sets of test cases are generated to provide full code coverage.
C.
Large sets of test cases are generated to provide full code coverage.
Answers
D.
An engine is provided that allows the user to execute the model.
D.
An engine is provided that allows the user to execute the model.
Answers
Suggested answer: A

Explanation:

Model-based testing tools support the creation and execution of tests based on models of the system under test. Finite state machines (FSMs) are often used in model-based testing to describe the expected behavior of a system during execution. FSMs help in defining the states of the system and the transitions between these states based on events, which can then be used to generate test cases that validate the system's behavior against the model.

A component has been analysed during a risk-assessment and rated as highly critical. Which of the following white-box test techniques provides the highest level of coverage and could therefore be used to test this component?

A.
Decision testing
A.
Decision testing
Answers
B.
Statement testing
B.
Statement testing
Answers
C.
Multiple condition testing
C.
Multiple condition testing
Answers
D.
Modified condition/decision testing
D.
Modified condition/decision testing
Answers
Suggested answer: D

Explanation:

Modified condition/decision testing (MC/DC) provides a higher level of coverage compared to other white-box testing techniques because it requires each condition in a decision to be shown to independently affect that decision's outcome. It is more rigorous than both decision testing (which only requires each decision's possible outcomes to be tested) and statement testing (which requires only each executable statement to be executed). Therefore, for a highly critical component, MC/DC is more appropriate as it ensures a more thorough assessment of the logic in the software component.

Consider the following fault attack:

* Force all possible incoming errors from the software/operating system interfaces to the application.

Which of the following is the kind of failure you are looking for when using this attack?

A.
Application crashes when unsupported characters are pasted into an input field.
A.
Application crashes when unsupported characters are pasted into an input field.
Answers
B.
Application crashes when the network is unavailable.
B.
Application crashes when the network is unavailable.
Answers
C.
Application crashes due to a lack of portability.
C.
Application crashes due to a lack of portability.
Answers
D.
Application miscalculates total monthly balance due on credit cards.
D.
Application miscalculates total monthly balance due on credit cards.
Answers
Suggested answer: A

Explanation:

The fault attack described involves forcing all possible incoming errors from software/operating system interfaces. The type of failure being sought is one where the application does not handle erroneous or unexpected input correctly, which can lead to crashes or other unintended behavior. Thus, an application crash when unsupported characters are pasted into an input field is a typical failure that this kind of fault attack would aim to uncover.

Which of the following is NOT a common issue with traditional capture/playback test automation?

A.
Difficult to maintain when software changes.
A.
Difficult to maintain when software changes.
Answers
B.
Recorded scripts are difficult to maintain by non-technical persons.
B.
Recorded scripts are difficult to maintain by non-technical persons.
Answers
C.
Data and actions are mixed in the recorded script.
C.
Data and actions are mixed in the recorded script.
Answers
D.
Execution of the recorded script is difficult outside office hours.
D.
Execution of the recorded script is difficult outside office hours.
Answers
Suggested answer: D

Explanation:

Common issues with traditional capture/playback test automation include difficulty in maintaining the scripts when software changes (option A), the challenge for non-technical persons to maintain recorded scripts (option B), and the issue that data and actions are often intertwined within the recorded script (option C), which can make them hard to understand and modify. However, the timing of the execution of the recorded script (option D), such as the difficulty of running scripts outside office hours, is not typically a problem inherent to capture/playback test automation itself but rather an environmental or scheduling issue.

Which of the following is a valid reason for including security testing in a test approach?

A.
There is a threat of unauthorized copying of applications or data.
A.
There is a threat of unauthorized copying of applications or data.
Answers
B.
To provide measurements from which an overall level of availability can be obtained.
B.
To provide measurements from which an overall level of availability can be obtained.
Answers
C.
To evaluate the ability of a system to handle peak loads at or beyond the limits of its anticipated or specified workloads
C.
To evaluate the ability of a system to handle peak loads at or beyond the limits of its anticipated or specified workloads
Answers
D.
Software changes will be frequent after it enters production.
D.
Software changes will be frequent after it enters production.
Answers
Suggested answer: A

Explanation:

Including security testing in a test approach is valid when there are concerns about unauthorized access or activities, such as the threat of unauthorized copying of applications or data (option A). This type of testing aims to uncover vulnerabilities that could be exploited to compromise the confidentiality, integrity, or availability of the system. The other options listed---availability measurements (option B), system's peak load handling (option C), and frequent software changes (option D)---relate to different aspects of testing, such as reliability, performance, and maintainability, which are not directly associated with security testing.

Total 129 questions
Go to page: of 13