During mobile usability testing, what aspect is being primarily evaluated?
- Application's functionality
- Application's load time
- Application's security
- User's experience and interface interactions
Mobile usability testing primarily focuses on assessing the user's experience and interface interactions. It ensures that the app is intuitive, easy to navigate, and meets the expectations of the users. While functionality, load time, and security are vital, usability testing centers on the user's overall experience.
Which component of test planning primarily deals with defining the criteria to release the software?
- Exit Criteria
- Test Data
- Test Environment
- Test Scope
The "Exit Criteria" in test planning defines the specific conditions or metrics that need to be achieved before the software can be released. It ensures that the product has reached a certain quality standard before it's deemed fit for production.
While exploratory testing can be freestyle, many testers employ structured approaches like _____ to document and manage their findings.
- Test Cases
- Test Charters
- Test Plans
- Test Scripts
Although Exploratory Testing can be freestyle, many testers use "Test Charters" to guide their exploration. Test Charters help in providing a clear context, scope, and purpose of the exploration while allowing testers to document and manage their findings efficiently.
System testing is conducted on a _______ software to evaluate its overall behavior.
- alpha
- integrated
- modular
- standalone
System testing is conducted on an integrated software to evaluate its complete and end-to-end behavior. It ensures that the entire software functions according to specified requirements. This phase tests the entire software as a single entity.
The process in Configuration Management that involves systematically controlling changes to the configuration items and maintaining their integrity throughout the lifecycle is called _______.
- Auditing
- Change Control
- Status Reporting
- Version Control
Change Control in Configuration Management involves a systematic approach to manage changes by evaluating, approving, or disapproving changes, ensuring that changes are documented, and ensuring that configuration items maintain their integrity throughout the lifecycle.
Which method systematically scans a computer system or network to find potential vulnerabilities?
- Compression
- Encryption
- Penetration Testing
- Vulnerability Scanning
Vulnerability Scanning is a systematic approach that uses specialized tools to identify, rank, and report potential vulnerabilities in a computer system or network. It provides an overview of the security flaws but doesn't necessarily exploit them like penetration testing.
In mobile application testing, which tool is often used for testing the performance and load capability of the app?
- Appium
- JIRA
- JMeter
- Selenium
JMeter is a popular open-source tool primarily used for performance testing. It allows testers to simulate multiple users and test how much load an app can handle, ensuring the app performs well under heavy usage. While it started for web applications, it is now used for mobile application load testing as well.
What's the primary difference between test planning and test strategy?
- Planning's documentation
- Planning's scope
- Strategy's duration
- Strategy's overarching approach
The primary difference between test planning and test strategy is their purpose and scope. While test planning is a document that outlines the specifics of the testing process for a particular project, test strategy provides an overarching approach to testing across multiple projects or for an entire organization.
Which tool or method would be best for identifying vulnerabilities in a web application's code before it's deployed?
- Code Review
- JUnit
- Selenium
- Wireshark
A Code Review is a systematic examination of the application's source code. It's conducted to find vulnerabilities or bugs before the app is deployed. While tools like Selenium and JUnit focus on functional testing, and Wireshark on network analysis, only a thorough code review provides insights into code vulnerabilities.
_______ is a white-box testing technique that focuses on evaluating the logic of the program.
- Boundary Testing
- Compatibility Testing
- Path Testing
- Usability Testing
Path testing is a white-box testing technique that ensures every path through the program is tested at least once. It is particularly focused on evaluating the program's internal logic paths to ensure all code branches and potential execution paths are tested.