image


CTFL_Syll2018 Dumps CTFL_Syll2018 Braindumps CTFL_Syll2018 Real Questions CTFL_Syll2018 Practice Test CTFL_Syll2018 Actual Questions


iSQI


CTFL_Syll2018


ISTQB Certified Tester Foundation Level


https://killexams.com/pass4sure/exam-detail/CTFL_Syll2018


QUESTION: 187

Which of the following is a Black Box test design technique?


  1. Decision Coverage

  2. Error Guessing

  3. Statement Coverage

  4. Equivalence Partitioning


Answer: D


QUESTION: 188

A calculator software is used to calculate the result for 5+6. The user noticed that the result given is 6. This is an example of:


  1. Failure

  2. Mistake

  3. Fault

  4. Error


Answer: A


QUESTION: 189

A live defect has been found where a code component fails to release memory after it has finished using it. Which of the following tools would have been the MOST effective at detecting this defect prior to live implementation?


  1. Dynamic analysis tool

  2. Monitoring tool

  3. Configuration management tool

  4. Coverage measurement tool


Answer: A


Which of the following is NOT a valid objective of testing?


  1. Preventing defects from being introduced into the code

  2. Investigating and fixing defects in the software under test

  3. Gaining confidence that the system is fit-for-purpose

  4. Providing information for stakeholders’ decision making


Answer: D


QUESTION: 191

A Test Manager conducts risk assessment for a project One of the identified risks is: ''The sub-contractor may fail to meet his commitment" If this risk materializes, it will lead to delay in completion of testing required for the current cycle. Which of the following sentences correctly describes the risk?


  1. It is a project risk since successful completion of the project depends on successful and timely completion of the tests

  2. It is a product risk since any risk associated with development timelines is a product risk

  3. It is a product risk since default on part of the sub-contractor may lead to delay in release of the product

  4. It is no longer a risk for the Test Manager since an independent party (the sub- contractor) is now managing it


Answer: D


QUESTION: 192

Which of the following is a white-box test technique?


  1. Decision table testing

  2. Exploratory testing

  3. Statement testing

  4. Error guessing


Answer: C


Which of the following is a defect that is more likely to be found by a static analysis tool than by other testing techniques?


  1. Omission of a major requirement

  2. Inadequate decision coverage

  3. Component memory leakage

  4. Variables that are not used improperly declared


Answer: D


QUESTION: 194

Which of the following is by definition a reactive test approach?


  1. Risk-based testing

  2. Automation of regression tests

  3. Exploratory testing

  4. Requirements-based testing


Answer: C


QUESTION: 195

Exhibit


image


The decision table above reflects a golf club's pricing structure for green fees and buggy/cart hire. What is the expected result (actions) for each of the following two test cases (TC1 and TC2)?


  1. TC1 - £23 total charges including buggy hire; TC2 - £21 total charge including buggy hire

  2. TC1 - £18 total charges including buggy hire; TC2 - £16 total charge but no buggy allowed

  3. TC1 - £23 total charges including buggy hire; TC2 - £16 total charge but no buggy allowed

  4. TC1 - £17 total charges but no buggy allowed; TC2 - £21 total charge including buggy hire


Answer: D


A system requirement states that up to 100 users should be able to carry out a transaction, with responses returned within 5 seconds. What type of non-functional testing would you carry out to verify these requirements?


  1. Stress testing

  2. Maintenance testing

  3. Load testing

  4. Usability testing


Answer: A


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG