ExamGecko
Home Home / ISTQB / CTFL-2018

ISTQB CTFL-2018 Practice Test - Questions Answers, Page 37

Question list
Search
Search

Related questions











Given the following examples of entry and exit criteria:

1. A defined level of code coverage has been achieved

2. The test automation tool has been installed and properly configured

3. The number of unresolved defects is within the predefined limit

4. The performance test environment has been set-up and is available

5. The user stones hove proper acceptance criteria defined

6. The testing budget has been spent and the project sponsor bears the risk of not testing any further

Which of the following BEST categorizes them as entry and exit criteria:

A.
Entry criteria - 1, 3. 4; Exit criteria - 2. 5. 6
A.
Entry criteria - 1, 3. 4; Exit criteria - 2. 5. 6
Answers
B.
Entry criteria - 2. 4. 5; Exit criteria - 1. 3, 6
B.
Entry criteria - 2. 4. 5; Exit criteria - 1. 3, 6
Answers
C.
Entry criteria - 2. 4: Exit criteria - 1. 3. 5. 6
C.
Entry criteria - 2. 4: Exit criteria - 1. 3. 5. 6
Answers
D.
Entry criteria - 2, 4. 5, 6; Exit criteria -1.3
D.
Entry criteria - 2, 4. 5, 6; Exit criteria -1.3
Answers
Suggested answer: B

Explanation:

The correct answer is B, as it categorizes them as entry and exit criteria correctly.Entry criteria are conditions that must be met before testing can begin or continue with a specific activity or phase3.Exit criteria are conditions that must be met before testing can conclude or stop for a specific activity or phase3. The following table shows how each example can be categorized:

Therefore, option B is the correct answer.Options A, C, and D are incorrect, as they do not categorize them as entry and exit criteria correctly.

Reference:3, Section 2.4

Given the following priorities and dependencies for these test cases:

Which of the following lest execution schedules BEST takes into account the priorities and technical and logical dependencies?

A.
TC3 - TC4 - TC2 - TC6 - TC1 - TC5
A.
TC3 - TC4 - TC2 - TC6 - TC1 - TC5
Answers
B.
TC1 - TC3 - TC2 - TC4 - TC6 - TC5
B.
TC1 - TC3 - TC2 - TC4 - TC6 - TC5
Answers
C.
TC1 - TC3 - TC2 - TC4 - TC5 - TC6
C.
TC1 - TC3 - TC2 - TC4 - TC5 - TC6
Answers
D.
TC2 - TC4 - TC1 - TC3 - TC5 - TC6
D.
TC2 - TC4 - TC1 - TC3 - TC5 - TC6
Answers
Suggested answer: A

Explanation:

The correct answer is A, as it provides the best test execution schedule that takes into account the priorities and technical and logical dependencies.A test execution schedule is a plan that defines the order and timing of test cases to be executed based on various factors such as dependencies, risks, priorities, and resources1. In this case, the factors are the priorities and technical and logical dependencies of the test cases.The priorities are the levels of importance or urgency assigned to the test cases, such as low, medium, or high1.The technical dependencies are the relationships between the test cases that require one test case to be executed before another test case can be executed1.The logical dependencies are the relationships between the test cases that make sense to execute one test case after another test case for better understanding or efficiency1. Option A provides the best test execution schedule that takes into account these factors, as it follows these rules:

Execute high priority test cases before medium or low priority test cases

Execute test cases that have technical dependencies in the correct order

Execute test cases that have logical dependencies in a sensible order

The following table shows how option A follows these rules:

Option B does not follow these rules, as it executes TC1 before TC2, which violates the technical dependency. Option C does not follow these rules, as it executes TC5 before TC6, which violates the logical dependency.Option D does not follow these rules, as it executes TC2 before TC3, which violates the technical dependency.

Reference:1, Section 2.5

You are testing an e-commerce system The system accepts four different types of Credit Cards; each card has its own rules for valid and invalid numbers. The following is a portion of the Decision Table for Order Management.:

The combination of the conditions Valid Card Number (NO) + Purchase Approved (YES) is not feasible.

You wish to perform a test which completely covers all the combinations of equivalence partitioning tor the different types of credit card, according to the rules shown in the above Decision Table

How many test cases do you need?

A.
8
A.
8
Answers
B.
4
B.
4
Answers
C.
16
C.
16
Answers
D.
12
D.
12
Answers
Suggested answer: C

Explanation:

The combination of the conditions Valid Card Number (NO) + Purchase Approved (YES) is not feasible, as a purchase cannot be approved with an invalid card number. Therefore, this combination can be ignored in the equivalence partitioning for the different types of credit card. Each type of credit card has two valid equivalence partitions: Valid Card Number (YES) + Purchase Approved (YES) and Valid Card Number (YES) + Purchase Approved (NO). Each type of credit card also has one invalid equivalence partition: Valid Card Number (NO) + Purchase Approved (NO). Therefore, to cover all the combinations of equivalence partitions for the four types of credit card, we need 4 x (2 + 1) = 12 test cases.

A, B, and D are incorrect answers. A implies that there are two equivalence partitions for each type of credit card, which is not true as there are three. B implies that there is only one equivalence partition for each type of credit card, which is not true as there are two valid ones and one invalid one. D implies that there are four equivalence partitions for each type of credit card, which is not true as there are only three.

Which of the following would be LEAST appropriate as part of an incident report covering the observation of a failure during testing?

A.
The expected result for the list friends response time was less than 10 seconds, whereas the average response time obtained was 13 seconds.
A.
The expected result for the list friends response time was less than 10 seconds, whereas the average response time obtained was 13 seconds.
Answers
B.
The user interface was complicated and confusing and I found it quite difficult to follow the test script.
B.
The user interface was complicated and confusing and I found it quite difficult to follow the test script.
Answers
C.
The updates made as part of the add new member' function did not reflect the expected change as the name was written into the address field.
C.
The updates made as part of the add new member' function did not reflect the expected change as the name was written into the address field.
Answers
D.
SQL injection into the username entry field allowed a variety of SQL commands to be executed by the application without the appropriate authority
D.
SQL injection into the username entry field allowed a variety of SQL commands to be executed by the application without the appropriate authority
Answers
Suggested answer: B

Explanation:

The user interface being complicated and confusing is not an appropriate part of an incident report covering the observation of a failure during testing, as it is a subjective opinion and not a factual description of the failure.An incident report should include objective and relevant information that can help to identify, reproduce, and resolve the failure3defines an incident report as follows:

An incident report is a document that records the occurrence of an abnormal or unexpected event during testing, such as a deviation from expected results, a defect in the system under test, or a problem in the test environment. An incident report typically includes the following information:

Identifier: A unique identifier for the incident report.

Summary: A brief description of the incident.

Incident details: A detailed description of the incident, including the inputs, expected results, actual results, environment, date and time, severity, priority, and any other relevant information.

Steps to reproduce: A sequence of steps that can be followed to reproduce the incident.

Attachments: Any screenshots, logs, files, or other artifacts that can help to understand or reproduce the incident.

Which of the following statements about static analysis are FALSE?

I Static analysis can be used instead of dynamic testing.

II, Static analysis can uncover defects like security vulnerabilities.

II,I Static analysis can be used to check conformance to specifications and standards.

IV Static analysis typically detects failures prior to component testing.

A.
II, Ill
A.
II, Ill
Answers
B.
I, IV
B.
I, IV
Answers
C.
I, II,
C.
I, II,
Answers
D.
II,I, IV
D.
II,I, IV
Answers
Suggested answer: C

Explanation:

I and II, are false statements about static analysis. Static analysis cannot be used instead of dynamic testing (I), as it cannot verify the behavior or performance of the system under test at runtime. Static analysis can uncover defects like security vulnerabilities (II,), as it can detect potential weaknesses or flaws in the source code that may lead to security breaches. defines static analysis as follows:

Static analysis is a type of software testing that analyzes the source code or other software artifacts without executing them. Static analysis can be used to check conformance to specifications and standards, detect syntax and logical errors, measure complexity and quality metrics, identify code smells and bad practices, find potential security vulnerabilities, and improve maintainability and readability.

II,I and IV are true statements about static analysis. Static analysis can be used to check conformance to specifications and standards (II,I), as it can compare the source code or other software artifacts against predefined rules or criteria. Static analysis typically detects failures prior to component testing (IV), as it can be performed early in the development cycle before compiling or executing the code.

Total 365 questions
Go to page: of 37