1. : Select from which of the following regression testing should be performed.
(A) When the environment has changed
(B) After the software has changed
(C) As often as possible
(D) Both option (A, B)
2. : When would the testing have been stopped?
(A) When all the tests run
(B) When the faults have been fixed
(C) When the time completed
(D) When all the risks are resolved
3. : Non-functional test does not belong to which of the following categories?
(A) Performance
(B) Usability and Security
(C) State level Transition
(D) All of the above
4. : Which of the following is a form of functional testing?
(A) Security level testing
(B) Boundary value analysis
(C) Performance testing
(D) Usability testing
5. : When reporting faults found to developers, testers should be:
(A) Polite and helpful
(B) Diplomatic
(C) Sensitive and insisting that a bug is not a “feature” if it should be fixed
(D) All of the above
6. : Impact Analysis helps to decide which of the following?
(A) How much regression testing should be done
(B) How many more test cases need to be written
(C) Exit Criteria
(D) Different Tools to perform Regression Testing
7. : Select which of the below is not a Fundamental Test Process?
(A) Test Planning
(B) Requirement Analysis
(C) Implementation and Execution
(D) Evaluating test criteria and reporting
8. : Which of the following techniques is NOT a black box technique?
(A) Syntax testing
(B) Linear Code Sequence and Jump
(C) State transition testing
(D) Boundary value analysis
9. : What should be done in the kick-off phase of a formal review?
(A) Explaining all objectives
(B) Follow-up meetings
(C) Fixing defects found
(D) Individual Meeting
10. : Select Impact Analysis is used in which of the following?
(A) User acceptance testing
(B) Component testing
(C) Non-functional system testing
(D) Maintenance testing
11. : Which of the following is not checked by Statement Coverage?
(A) Missing Statements
(B) Unused Branches
(C) Dead Code
(D) Unused Statement
12. : What is used as a measure of code coverage?
(A) Test Effectiveness
(B) Trends analysis
(C) Defects
(D) Time Spent Testing
13. : Which of the following technique ensures that the impact of risk will be less?
(A) Risk Avoidance Technique
(B) Risk Contingency Technique
(C) Risk Mitigation Technique
(D) All of the above
14. : The Effective Risk management plan needs to address which of the following issues?
(A) Risk avoidance
(B) Risk monitoring
(C) Risk management and contingency planning
(D) All of the above
15. : The Risk Mitigation and risk monitoring is which Risk Activity?
(A) Increasing, Project tracking
(B) Avoidance, Project tracking
(C) Project tracking, Avoidance
(D) Random, Tracking
16. : After deployment of a system, a software incorrectly performs one of its main functionalities, at that time the one who is going to determine how badly it will hamper the Organization is:
(A) QA Personnel
(B) Developer
(C) Business Analyst
(D) Technical People
17. : What does the RE represent?
(A) Risk Expense
(B) Related Expense
(C) Risk Evaluation
(D) Risk Exposure
18. : ______ is treated as the Regular Expression.
(A) |
(B) [ ]
(C) $
(D) { }
19. : The RGB and the Pixel Tolerance are related to which of the following?
(A) Image checkpoint
(B) Bitmap checkpoint
(C) All of these
(D) None of these
20. : The Parameterization is required when:
(A) Object hierarchy is changed
(B) Someone copies, pastes, or moves an object from a shared object repository to a local object repository
(C) Both of these
(D) None of these
21. : A table containing rules ______________ table would be an example of Decision Table for retail shopping software.
(A) Of discount
(B) For interfaces between components
(C) Of employee behavior
(D) For combination of input
22. : ______________ Use Cases are useful.
(A) Performance Testing
(B) Business Scenarios
(C) Static Testing
(D) Unit Testing
23. : When different combinations of input require different combinations of actions, _______________ technique is used.
(A) Boundary Value Analysis
(B) Equivalence Partition
(C) Decision Table
(D) Decision Coverage
