Pass the BCS ISTQB Certified Tester CTFL4 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

Consider an estimation session in which a six-member Agile team (Memb1..... Memb6) uses the planning poker technique to estimate a user story (in story points). The team members will use a set of cards with the following values: 1,2, 3,5, 8,13,21. Below is the outcome of the first round of estimation for this session:

Question # 11

Which of the following answers BEST describes how the estimation session should proceed?

Options:

A.

The final estimate of the user story in story points is determined by applying the three-point estimation technique with the following input values most optimistic estimate - 1, most likely estimate - 3, and most pessimistic estimate - 21


B.

Further estimation rounds should be performed until all team members will pick the card having the same value: this value will represent the final estimate of the user story in story points.


C.

The final estimate of the user story in story points is determined by calculating the average value between the most optimistic estimate of 21 story points (Memb4> and the most pessimistic estimate of 1 story point (Memb6)


D.

Memb6 and Memb4 which have produced the most pessimistic and the most optimistic estimates respectively, should explain the reasons of their choices to stimulate a discussion between all members before proceeding to another estimation round


Expert Solution
Questions # 12:

Consider the following examples of risks identified in different software development projects

[1]. It may not be possible to generate the expected workloads to run performance tests, due to the poor hardware equipment of the machines (load injectors) that should generate these workloads.

[ii]. A user's session on a web application is not invalidated after a certain period of inactivity (configured by the system administrator) of the user,

[iii]. The test team will not have an adequate requirements specification (since many requirements will still be missing) by the time test design and analysis activities should begin according to the test plan.

[IV]. Following a failure, the system is unable to continue to maintain its pre-failure operation and some data becomes corrupted.

Which of the following statements is TRUE?

Options:

A.

[ii] and [IV] are product risks; [i] and [iii] are project risks


B.

[ii]and [iii] are product risks. [I] and [IV] are project risks.


C.

[i], and [iV] are product risks; [ii] and [iii] are project risks


D.

[i], [II] and [iii] are product risks, [IV] is a project risk.


Expert Solution
Questions # 13:

A typical objective of testing is to ensure that:

Options:

A.

testing is used to drive the development of a software


B.

a software has been tested using a combination of test techniques


C.

there are no defects in a software that is about to be released


D.

a software has been properly covered


Expert Solution
Questions # 14:

Which of the following statements about static testing and dynamic testing is TRUE?

Options:

A.

Static testing is better suited than dynamic testing for highlighting issues that could indicate inappropriate code modulansation.


B.

Dynamic testing can only be applied to executable work products, while static testing can only be applied to non-executable work products.


C.

Both dynamic testing and static testing cause failures, but failures caused by static testing are usually easier and cheaper to analyse.


D.

Security vulnerabilities can only be detected when the software is being executed, and thus they can only be detected through dynamic testing, not through static testing


Expert Solution
Questions # 15:

Consider the following user story about the authentication functionality of an e-commerce website:

"As a logged-in user, I want to change my current password with a new one, so that I can make my account safer".

The following are some of the acceptance criteria defined for the user story:

[a] After the logged-in user has successfully changed his password, an email confirming the change must be sent to him

[b] To successfully change the password, the logged-in user must enter the current password, enter a new valid password, and finally confirm by pressing the 'Change Password' button

[c] To be valid, the new password entered by the logged-in user is not only required to meet the criteria related to the length and type of characters, but must also be different form the last 5 passwords of that user

[d] A dedicated error message must be presented to the logged-in user when he enters a wrong current password

[e] A dedicated error message must be presented to the logged-in user when he enters the correct current password, but enters an invalid password

Based only on the given information, which of the following ATDD tests is most likely to be written first?

Options:

A.

The logged-in user enters a wrong current password and views the dedicated error message


B.

The logged-in user enters the correct current password, enters a valid new password (different from the last 5 passwords), presses the Change Password' button, and finally receives the e-mail confirming that the password has been successfully changed


C.

The logged-in user enters the correct current password, enters an invalid password, and finally views the dedicated error


D.

The logged-in user submits a purchase order containing ten items, selects to pay with a Visa credit card, enters credit card information of a valid card, presses the 'Confirm' button, and finally views the dedicated message confirming that the purchase has been successful


Expert Solution
Questions # 16:

What type of testing measures its effectiveness by tracking which lines of code were executed by the tests?

Options:

A.

Acceptance testing


B.

Structural testing


C.

Integration testing


D.

Exploratory testing


Expert Solution
Questions # 17:

The statement: "Test activities should start in the early stages of the lifecycle, adhering to the testing principle of early testing” is relevant to which of the recognized software development models?

Options:

A.

Sequential development model.


B.

Iterative development model.


C.

Incremental development model.


D.

All the above


Expert Solution
Questions # 18:

Which of the following statements about the typical activities of a formal review process is TRUE?

Options:

A.

Individual review is only mandatory when the size of the work product under review is too large to cover at the review meeting


B.

Various review techniques that may be applied by participants during individual review are described in the ISO/IEC/IEEE 29119-3 standard.


C.

Choosing which standards to follow during the review process is usually made during review planning.


D.

One of the main goals of the review meeting is to make sure that all participants are aware of their roles and responsibilities in the review process


Expert Solution
Questions # 19:

Which ONE of the following options BEST describes black-box test techniques?

Options:

A.

Black-box testing techniques are based on experience with the test object without knowing the internal structure.


B.

In black-box testing techniques, test cases are created based on the software's implementation.


C.

Black-box testing techniques are based on analyzing the test object's specified and implied behavior without knowledge of its internal data structure.


D.

Black-box testing techniques involve analyzing the specified behavior of the test object without knowledge of its internal structure.


Expert Solution
Questions # 20:

A virtual service emulating a real third-party service and the automated test scripts (aimed at testing the system under test) that interact with that service, are test work products that are typically created during:

Options:

A.

Test monitoring and control


B.

Test implementation


C.

Test design


D.

Test analysis


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions