The _______ serves as a guideline for all testing processes and activities within a project.

  • Bug Report
  • Test Case
  • Test Plan
  • Test Script
The "Test Plan" is a comprehensive document that outlines the scope, approach, resources, and schedule of testing activities. It serves as a blueprint for all testing processes and activities, ensuring that every aspect of the testing process is covered and understood by all stakeholders.

Which Configuration Management activity ensures that the current design and build state of the software matches the latest product baseline?

  • Auditing
  • Build Automation
  • Status Accounting
  • Version Control
Auditing in Configuration Management ensures that the current design and build state of the software matches the latest product baseline. It involves a systematic examination of the processes, making certain that all procedures and standards are being followed, ensuring the integrity of the product.

What role does a Risk Management Plan play in the Software Testing Life Cycle (STLC)?

  • To allocate budget for projects
  • To code the software
  • To debug issues
  • To guide risk-based testing
In the STLC, a Risk Management Plan provides a structured approach to identify, assess, and prioritize risks associated with the testing process. It offers a framework for making decisions and allocating resources based on potential impacts and likelihood of risks.

Which of the following is NOT a type of white-box testing technique?

  • Cyclomatic Complexity
  • Path Testing
  • Statement Coverage
  • Usability Testing
White-box testing is focused on the internal structures of an application. While Cyclomatic Complexity, Statement Coverage, and Path Testing are white-box techniques, Usability Testing is a type of black-box testing, focusing on user experience.

A company undergoes a security audit and finds that their password policies are lax, with most employees using easily guessable passwords. As a security auditor, what would be your primary recommendation?

  • Enforce a strong password policy
  • Implement Multi-Factor Authentication
  • Increase lockout time
  • Regular password audits
Enforcing a strong password policy would be the primary recommendation, as it directly addresses the core issue of weak passwords. This policy would mandate criteria like password length, complexity, and change frequency. While MFA and regular audits are beneficial, addressing the root cause is essential.

During Test Planning, the identification and assignment of roles, responsibilities, and required resources are typically documented in the _______.

  • Test Case
  • Test Plan
  • Test Scenario
  • Test Strategy
During Test Planning, the Test Plan is the key document that captures all aspects of testing, including the identification and assignment of roles and responsibilities, resources, schedules, and other relevant details to guide the testing efforts throughout the cycle.

You're testing an app, and while the functionality works correctly, you find that the buttons are too close together, making them hard to tap, and the text is misaligned on some screens. Which testing method will help uncover such issues?

  • Compatibility Testing
  • Load Testing
  • Usability Testing
  • White-box Testing
Usability Testing focuses on a user's experience with the application. It ensures that the product is easy to use and provides a good user experience. Issues like button placements, text alignment, and other design-related aspects that might hamper the user's experience or make the application difficult to navigate are typically identified in Usability Testing.

Performance metrics such as latency and throughput are typically gathered during _______ testing.

  • Compatibility
  • Load
  • Stress
  • Usability
Load testing focuses on understanding the behavior of the system under a specific load or request volume. Metrics like latency (response time) and throughput (number of requests processed per unit time) are crucial.

In which testing technique does a tester attempt to break the system using scenarios that are based on their past experiences with system failures?

  • Error Guessing
  • Monkey Testing
  • Regression Testing
  • Usability Testing
Error Guessing is a testing technique where testers rely on their past experiences and knowledge of system failures to identify potential defects. Instead of using a systematic approach, testers use their intuition to "guess" where defects might be present and construct tests based on these hunches, drawing from previous issues they have encountered.

In the context of performance testing, which metric is NOT typically used: Load Time, Number of Defects, Response Time, or Throughput?

  • Load Time
  • Number of Defects
  • Response Time
  • Throughput
While Load Time, Response Time, and Throughput are common metrics used in performance testing to measure various aspects of the system's performance, "Number of Defects" is not a performance metric. It is typically associated with functional testing and bug tracking.

Continuous Delivery ensures that the software can be reliably released at any time, whereas Continuous _______ ensures that the software is actually released frequently.

  • Deployment
  • Feedback
  • Integration
  • Testing
Continuous Delivery focuses on ensuring that code changes can be deployed to production at any time, making the release process reliable. Continuous Deployment, on the other hand, ensures these changes are automatically deployed to production frequently without human intervention.

What is the key advantage of using QTP (Quick Test Professional) over other automation tools?

  • Limited Language Support
  • Open-Source Nature
  • Supports Visual Basic Scripting
  • Supports only Web Applications
QTP (now known as UFT - Unified Functional Testing) stands out because it supports Visual Basic Scripting (VBScript) for customization of the test procedures. This offers testers flexibility and power in designing test scripts tailored to specific testing needs, setting it apart from some other tools.