Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Software Certifications CSQA - CSQA Certified Software Quality Analyst

Page: 3 / 13
Total 639 questions

The team for establishing a security baseline should consist of:

A.

Individuals responsible for computer security

B.

Auditors for internal control activities

C.

Senior management

D.

All employees

Which of the following is not one of the four major purposes of recording defects?

A.

To ensure the defect is corrected

B.

To determine who made the defect

C.

To report the status of the application

D.

To gather statistics used to develop defect expectations and future applications

E.

To improve the software development process

In the broad context of comparing quality assurance activities and quality control activities in an IT organization, which of the following would be considered a quality assurance activity?

A.

Developing Test Plans

B.

Conducting Design Inspections

C.

Developing Test Processes

D.

Performing Acceptance Testing

E.

Performing Regression Testing

Which is generally considered the most important step in the process of contracting for software development?

A.

Selecting an outside organization as a contractor

B.

Contract negotiations

C.

Operation for maintenance

D.

Budget Criteria

The loss associated with risks can be calculated as follows:

A.

The cost of controls to minimize the risk

B.

The probability of an undesirable event occurring times the loss associated with the event

C.

Implement cost-of-quality accounting

D.

Obtain loss from a control chart

E.

Use budgetary accounting

Which of the following is the correct definition of a policy?

A.

The intended future state of the organization

B.

Managerial control over processes

C.

The step-by-step methods followed to ensure that standards are met

D.

Managerial desires and intents concerning processes and products

E.

A standard that is enforced

A test case tested data values at 0, 9, 10, 11, 49, 50, 51, 100. Which black-box technique was most likely used to generate these data points.

A.

Error Guessing

B.

Boundary Analysis

C.

Equivalence Partitioning

D.

Data Sampling

The acronym COTS refers to:

A.

Critical Organizational Testing Systems

B.

Commercial Off The Shelf Software

C.

Contractor Overview Training System

D.

Code Origination Tracking System

The amount of effort required to intercouple or interconnect computer systems is referred to as:

A.

Reusability

B.

Flexibility

C.

Portability

D.

Interoperability

Which of the following defines special cause of variation?

A.

Variation between the upper and lower control limits

B.

Variation not present in the process

C.

Conditions that regularly contribute to variability

D.

Contributes a small portion to control variation of process outputs

E.

Regular contributors to variability

Acceptance Testing is normally designed and performed by:

A.

The Developer

B.

The Quality Control Manager

C.

The Product Development Manager

D.

The User

Quality Assurance methods are usually considered:

A.

Detective

B.

Corrective

C.

Preventive

D.

Protective

As the continuum of work processes move or evolve towards creative processes, the mix of written procedures and people skills change.

A.

True

B.

False

Which is NOT an objective baseline measure?

A.

Lines of code

B.

Number of abnormal terminations

C.

Help desk empathy with customer's situation

D.

Number of programs

The two common types of Matrixes are:

A.

L-Type and Y-Type

B.

T-Type and X-Type

C.

L-Type and T-Type

D.

Y-Type and X-Type