image


TTA1 Dumps TTA1 Braindumps

TTA1 Real Questions TTA1 Practice Test TTA1 Actual Questions


ASTQB


TTA1


ISTQB-BCS Certified Tester Advanced Level- Technical Test Analyst


https://killexams.com/pass4sure/exam-detail/TTA1

QUESTION: 60

The development manager asks you to identify suitable test coverage entry criteria for a component test. Which TWO of the following would you recommend as appropriate for entry criteria to a component testing phase?

Number of correct answers: 2


  1. 100% statement coverage

  2. No critical outstanding defects

  3. Test log available

  4. Code review completed

  5. Static analysis shows no major violations


Answer: D, E


QUESTION: 61

As a technical test analyst, you are involved in a risk analysis session using the Failure Mode and Effect Analysis technique. You are calculating risk priorities. Which of the following are the major factors in this exercise? Number of correct answers: 1


  1. Severity and priority

  2. Functionality, reliability, usability, maintainability, efficiency and portability

  3. Likelihood and impact

  4. Financial damage, frequency of use and external visibility


Answer: C


QUESTION: 62

As a technical test analyst, you have found out during test case design that the design document is incomplete. Which is an example of a good way to communicate that problem in an email? Number of correct answers: 1


  1. E-mail: “Until I have received an updated version of the design document, I will not do any work on the test design.”

  2. E-mail: “When will it be possible to receive the missing information? Test design is impeded by a lack of clarity here.”

  3. E-mail: “Here we go again. The developer gave us incomplete and ambiguous design specifications. Typical.”

  4. Do not communicate the problem, just log the delaying effect of the information problem and be ready to explain the delays to the test manager later.


QUESTION: 63

Identify TWO main advantages of this approach to incident management. Number of correct answers: 2


  1. Quick to set up and cheap

  2. Electronic rather than manual

  3. Allows attachments (e.g. screen prints) to be linked to the incident reports

  4. Can easily be integrated with open source tools

  5. Large files are not a problem


Answer: A, B


QUESTION: 64

Exhibit:

image


You have now also been given the task to identify the key fields for logging the incident reports. So far the following fields have been in use in the Excel sheet:

-Incident description

-Date

-Author

-State

Which of the following would you recommend as the best combination of fields to add? Number of correct answers: 1


  1. Priority, version of software under test, incident identification

  2. Date to be fixed, priority, incident identification

  3. Developer assigned to the fix, version of software under test, incident identification

  4. Priority, version of software under test, date to be fixed


Answer: A


QUESTION: 65

Defects are discovered through test analysis and design because… Number of correct


  1. the tasks involve extracting information from the test basis

  2. developers are involved in writing test cases

  3. the cost of fixing a defect will increase if found later on

  4. the author of the test basis will have made errors


Answer: A


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG