The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
FEB-08 ISTQB PAPER
1. 1. Input and output combinations that will be treated the same way by the
system can be tested using which technique?
A. Boundary value
B. Equivalence partition
C. Decision table
D. State transition
2. Which statement about use case testing is true?
A. The test cases are designed to find defects in the data flow.
B. The test cases are always designed by customers or end users.
C. The test cases are designed to be used by real users, not by professional testers.
D. The test cases are designed to find defects in the process flow.
3. Which one is the definition of Use Case?
A. A response of system to users interacting with other, integrated systems.
B. An description of an environment in which a system needs to operate.
C. A sequence of transaction between a user and a system to achieve a certain goal.
D. An operation on a system by a user, with no regards to the systems response.
4. Given the following two programs
Program X:
If A>B then
Execute function _A()
Else
Execute function _B()
Endif
Execute function _C()
Program Y:
If D > E Then
Endif
Execute function _D()
Execute function _E()
Execute function _F()
Which of the following is an INCORRECT statement about the programs?
A.At least 2 test cases are needed to achieve 100% statement coverage of program X
B.At least 2 test cases are needed to achieve 100% decision coverage of program X
C.At least 2 test cases are needed to achieve 100% decision coverage of program Y
D.At least 2 test cases are needed to achieve 100% statement coverage of program Y
6. Error seeding
a) Evaluates the thoroughness with which a computer program is tested by purposely inserting errors into a supposedly
correct program.
b) Errors inserted by the developers intentionally to make the system malfunctioning.
c) for identifying existing errors
d) Both Evaluates the thoroughness and errors inserted by the developers
7. Which of the following is not a part of the Test Implementation and Execution Phase?
a) Creating test suites from the test cases
b) Executing test cases either manually or by using test execution tools
c) Comparing actual results
d) Designing the Tests
8.Consider the following statements:
i. an incident may be closed without being fixed.
ii. Incidents may not be raised against documentation.
iii. The final stage of incident tracking is fixing.
iv. The incident record does not include information on test environments.
a) ii is true, i, iii and iv are false
b) i is true, ii, iii and iv are false
c) i and iv are true, ii and iii are false
d) i and ii are true, iii and iv are false
2. 9.Definition of system and Integration testing?
Testing activity which is performed to expose defects in the interfaces and in the interaction between integrated components
is :a) System Level Testing
b) Integration Level Testing
c) Unit Level Testing
d) Component Testing
10. Which one of the following statements about system testing is NOT true?
a) System tests are often performed by independent teams.
b) Functional testing is used more than structural testing.
c) Faults found during system tests can be very expensive to fix.
d) End-users should be involved in system tests.
11. System Integration testing should be done after
A. Integration testing
B. System testing
C. Unit testing
D. Component integration testing
12. Which test support tool can be used to enforce coding standards?
A. Static analysis tool
B. performance testing tool
C. Test comparator
D. Test management tool
13.Which of the following are KEY tasks of a test leader?
i) Understanding the project risks
ii) Measuring performance of comments
iii) Scheduling tests and other activities
iv) Using monitoring tools as needed
A. i and iii
B. i and ii
C. iii and iv
D. ii and iii
14. Which of the following is the task of a Tester?
i. Interaction with the Test Tool Vendor to identify best ways to leverage test tool on the project.
ii. Prepare and acquire Test Data
iii. Implement Tests on all test levels, execute and log the tests.
iv. Create the Test Specifications
a) i, ii, iii is true and iv is false
b) ii,iii,iv is true and i is false
c) i is true and ii,iii,iv are false
d) iii and iv is correct and i and ii are incorrect
15. Person with knowledge of testing should be able to answer about?
a. Scope,objectives,product risks,aspects more testable
b. objectives, test execution schedule,strategies.
c. scope,objectives,product risks,aspects more testable,Test execution schedule and strategies
d. Test execution schedule and strategies
16. If (condition 1) then do B
End if
If (condition 2) then do C
3. Else
Do A
Endif
How many test cases are required for 100% statement coverage?
A.
1
B.
2
C.
5
D. 4
17. A program validates a numeric field as follows, Values less than 10 are
rejected, values between 10 and 21 are accepted, values greater than or
equal to 22 are rejected, Which of the following covers the MOST boundary
values?
A. 9,10,11,22
B. 9,10,21,22
C. 10,11,21,22
D. 10,11,20,21
18. You have to specify test cases based on equivalence partitioning and boundary value analysis for an internet shop
selling baby shoes. The shop provides a selection of shoes based on the following input parameters
There are 4 different sizes, depending on the age of the baby. The system selects the appropriate size based on the
following criteria:
1.
0<age<=4 months: size 1
2.
4<age<=8 months: size 2
3.
8<age<=15 months: size 3
4.
15<age<=24 months: size 4
The gender of the baby: boy or girl
Which of the following statements is true?
A.
All combinations of valid equivalence classes could be covered with 4 test cases.
B.
All valid and invalid equivalence classes could be covered with 6 test cases
C.
The total number of combinations of valid equivalence classes of age and gender is 8
D.
There are two invalid equivalence classes for the age input parameter; age<=0,and age>24
19. Consider the following excerpt from a defect report
‘To recreate the failure we used test file TST_01_TC_16.dat, which is available in the common shared folder”.
Which incident report objective does this excerpt satisfy?
A.
Provides developers with information to isolate the failure
B.
Does not belong in an incident report
C.
Provides ideas for test process improvement
D.
Provides test leaders with information to report test progress
4. 20. In performance testing, tools can be used to collect metrics. Which statement about monitoring tools is correct?
A.
They are technical tools a used by developers and not testers.
B.
They store version information and can be replaced by configuration management tools
C.
D.
They make it possible to observe possible performance problems and give warnings
They supervise the testing effort and report related metrics
ANSWER: C