ISTQB Sample Questions Set - 29



1.    Item transmittal report is also known as
A. Incident report
B. Release note
C. Review report
D. Audit report
2.    COTS is known as
A. Commercial off the shelf software
B. Compliance of the software
C. Change control of the software
D. Capable off the shelf software
3.    Change request should be submitted through development or program management. A change request must be written and should include the following criteria.
I. Definition of the change
II. Documentation to be updated
III. Name of the tester or developer
IV. Dependencies of the change request.
A. I, III and IV
B. I, II and III
C. II, III and IV
D. I, II and IV
4.    Change X requires a higher level of authority than Change Y in which of the following pairs? Change X Change Y
A. Code in development Code in production
B. Specifications during requirements analysis Specifications during systems test
C. Documents requested by the technical development group Documents requested by customers
D. A product distributed to several sites A product with a single user
5.    Cause effect graphing is related to the standard
A. BS7799
B. BS 7925/2
C. ISO/IEC 926/1
D. ISO/IEC 2382/1
6.    The primary goal of comparing a user manual with the actual behavior of the running program during system testing is to
A. Find bugs in the program
B. Check the technical accuracy of the document
C. Ensure the ease of use of the document
D. Ensure that the program is the latest version
7.    During the testing of a module tester ‘X’ finds a bug and assigned it to developer. But developer rejects the same, saying that it’s not a bug. What ‘X’ should do?
A. Report the issue to the test manager and try to settle with the developer.
B. Retest the module and confirm the bug
C. Assign the same bug to another developer
D. Send to the detailed information of the bug encountered and check the reproducibility
8.    One of the more daunting challenges of managing a test project is that so many dependencies converge at test execution. One missing configuration file or hard ware device can render all your test results meaning less. You can end up with an entire platoon of testers sitting around for days. Who is responsible for this incident?
A. Test managers faults only
B. Test lead faults only
C. Test manager and project manager faults
D. Testers faults only

9.    You are a tester for testing a large system. The system data model is very large with many attributes and there are a lot of inter dependencies with in the fields. What steps would you use to test the system and also what are the efforts of the test you have taken on the test plan
A. Improve super vision, More reviews of artifacts or program means stage containment of the defects.
B. Extend the test plan so that you can test all the inter dependencies
C. Divide the large system in to small modules and test the functionality
D. Test the interdependencies first, after that check the system as a whole
10.                       Testing of software used to convert data from existing systems for use in replacement systems
A. Data driven testing

B. Migration testing
C. Configuration testing
D. Back to back testing
11.                       A test manager wants to use the resources available for the automated testing of a web application. The best choice is
A. Test automater, web specialist, DBA, test lead
B. Tester, test automater, web specialist, DBA
C. Tester, test lead, test automater, DBA
D. Tester, web specialist, test lead, test automater
12.                       From the below given choices, which one is the ‘Confidence testing’
A. Sanity testing
B. System testing
C. Smoke testing
D. Regression testing
13.                        Consider the following statements
i. A incident may be closed without being fixed
ii. Incidents may not be raised against documentation
iii. The final stage of incident tracking is fixing
iv. The incident record does not include information on test environments
v. Incidents should be raised when someone other than the author of the software performs the test

A. ii and v are true, I, iii and iv are false
B. i and v are true, ii, iii and iv are false
C. i, iv and v are true, ii and iii are false
D. i and ii are true, iii, iv and v are false
E. i is true, ii, iii, iv and v are false
14.                       Which test suite will check for an invalid transition using the diagram below?
 
A. S0-S1-S2-S3-S1-S4
B. S0-S1-S4-S1-S2-S3
C. S0-S1-S3-S1-S2-S1
D. S0-S1-S2-S3-S1-S2
15.                        Who OFTEN performs system testing and acceptance testing, respectively?
A. Senior programmers and professional testers
B. Technical system testers and potential customers
C. Independent test team and users of the system
D. Development team and customers of the system
16.                        Which test levels are USUALLY included in the common type of V-model?
A. Integration testing, system testing, acceptance testing, and regression testing
B. Component testing, integration testing, system testing, and acceptance testing
C. Incremental testing, exhaustive testing, exploratory testing, and data driven testing
D. Alpha testing, beta testing, black-box testing, and white-box testing
17.                        Which general testing principles are characterized by the descriptions below?
W) Early testing
X) Defect clustering
Y) Pesticide paradox
Z) Absence-of-errors fallacy

1) Testing should start at the beginning of the project
2) Conformance to requirements and fitness for use
3) Small Number of modules contain the most defects
4) Test cases must be regularly renewed and revised
A. W1, X2, Y3, and Z4
B. W1, X3, Y4, and Z2
C. W2, X3, Y1, and Z4
D. W1, X4, Y2, and Z3

18.                       What should be taken into account to determine when to stop testing?
I. Technical risk
II. Business risk
III Project constraints
IV Product documentation
A. I and II are true. III and N are false
B. III is true, I, II, and IV are false
C. I, II, and IV are true; III is false
D. I, II, and III are true, IV is false
19.                        Data defects can occur when accessing the programs data log files.
A. True
B. False
20.                        Configuration management tools support activities related to managing the environment, including configuration management, change control, library control, documentation control.
A. True
B. False
1
2
3
4
5
6
7
8
9
10
B
A
D
D
B
B
D
A
A
B
11
12
13
14
15
16
17
18
19
20
B
C
B
C
C
B
B
D
B
A

No comments:

Post a Comment