Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

iSQI CTFL_Syll2018 - ISTQB Certified Tester Foundation Level (Syllabus 2018)

Page: 7 / 11
Total 365 questions

Which of the following is NOT an example of a typical risk-based testing activity?

A.

The evaluation of a risk-management tools to decide which tool to use for future projects

B.

The focus of testing is shifted to an area in the system where tests find with more defects than expected

C.

Brainstorming sessions are held with a wide variety of stakeholders to identify possible failures in the system

D.

Tests are prioritized to ensure that those associated with critical parts of the system are executed earlier

Given the following requirement:

Which of the following statements is NOT correct?

A.

7 and 13 are boundary values for the equivalence partition including age 10.

B.

Thursday is a valid input boundary value

C.

A minimum of 6 valid test cases are derived from boundary value analysis based on input age

D.

$3.01 is a valid output boundary value

The following diagram lists various types of operating systems, databases and application servers supported by the application under test. For complete coverage of all combinations, how many combinations of the above are to be tested?

A.

11

B.

5

C.

45

D.

3

Where and by whom is Beta testing normally performed?

A.

By customers or potential customers at their own locations

B.

By an independent test team at the developing organization's location

C.

At the developing organization's site, but not by the developing team

D.

By customers or potential customers at the developing organization's site

Which of the following test types is a part of the V-Model?

A.

Black-box testing

B.

White-box testing

C.

Experience-based testing

D.

Component testing

Which statement about use case testing is true?

A.

The test cases are designed to find defects in the data flow.

B.

The test cases are designed to find defects in the process flow

C.

The test cases are designed to be used by real users, not by professional testers

D.

The test cases are always designed by customers or end users

Out of the following, what is not needed to specify in defect report?

A.

How to fix the defect

B.

Severity and priority

C.

Test environment details

D.

How to reproduce the defect

Testing should provide sufficient information to stakeholders to make informed decisions about the release of the software or system being tested. At which of the following fundamental test process activity the sufficiency of the testing and the resulting information are assessed?

A.

Implementation and execution

B.

Requirements specification

C.

Evaluating exit criteria and reporting.

D.

Analysis and design

Which of the following is a correct set of boundary values to test the "Group Size" parameter, as defined by the following statement;

"In a reservation system for groups visiting a small museum, the graphical user interface presents a field asking the number of group members. Group size can be anywhere from 2 to 20 visitors"

A.

0,1,8,21,22

B.

0,1,2,3,10,19,20,21,22

C.

2,3,19,20

D.

1,2,20,21

The following program part is given:

IF (condition A)

then DO B

END IF

How many test cases are necessary in order to achieve 100% statement coverage?

A.

1

B.

2

C.

4

D.

a very high number