BCS CTFL4 - ISTQB Certified Tester Foundation Level CTFL 4.0 Exam
Which of the following is a typical potential risk of using test automation tools?
Which of the following statements best describe Behavior-Driven Development (BDD)?
Following a risk-based testing approach you have designed 10 tests to cover a product risk with a high-risk level. You want to estimate, adopting the three-point test estimation technique, the test effort required to reduce the risk level to zero by executing those 10 tests. You made the following three initial estimates:
• most optimistic = 6 person hours
• most likely = 30 person hours
• most pessimistic = 54 person hours
Based only on the given information, which of the following answers about the three-point test estimation technique applied to this problem is true?
Consider a given test plan which, among others, contains the following three sections: "Test Scope", "Testing Communication", and "Stakeholders". The features of the test object to be tested and those excluded from the testing represent information that is:
Which ONE of the following elements is TYPICALLY used to guide testing duringexploratory testing?
As a tester, as part of a V-model project, you are currently executing some tests aimed at verifying if a mobile app asks the user to grant the proper access permissions during the installation process and after the installation process. The requirements specification states that in both cases the app shall ask the user to grant access permissions only to the camera and photos stored on the device. However, you observe that the app also asks the user to grant access permission to all contacts on the device. Consider the following items:
[I]. Test environment
[ii]. Expected result
[iii]. Actual result.
[IV] Test level.
[V]. Root cause.
Based on only the given information, which of the items listed above, are you able to CORRECTLY specify in a defect report?
Which of the following issues cannot be identified by static analysis tools?
An alphanumeric password must be between 4 and 7 characters long and must contain at least one numeric character, one capital (uppercase) letter and one lowercase letter of the alphabet.
Which one of the following sets of test cases represents the correct outcome of a two-value boundary value analysis applied to the password length? (Note: test cases are separated by a semicolon)
Can "cost" be regarded as Exit criteria?
Which of the following statements is true?