What differentiates a security audit from a vulnerability scan?
- Duration
- Formality Level
- The primary objective of the task
- Use of Automated Tools
While both a security audit and vulnerability scan aim to identify vulnerabilities, a security audit is a more comprehensive review of an organization's entire information system, including policies, procedures, and controls. On the other hand, a vulnerability scan focuses on identifying technical vulnerabilities.
You are given a task to test an e-commerce application. You start from selecting a product, adding it to the cart, checking out, making a payment, and finally receiving a confirmation email. Which testing approach does this scenario represent?
- End-to-End Testing
- Performance Testing
- Smoke Testing
- Static Testing
End-to-End Testing involves testing an application's flow as a whole to ensure that the entire process of a user accessing and using the site works smoothly. In this scenario, the entire shopping process, from product selection to payment and receiving a confirmation, is being tested, making it a classic case of End-to-End Testing.
In accessibility testing, ensuring that users are given enough time to read and use the content is specified under the _______ guideline.
- Content Interaction
- Enough Time
- Time Adjustment
- User Feedback
The "Enough Time" guideline under accessibility testing ensures that users, especially those with disabilities, are given adequate time to read, comprehend, and utilize the content. This is crucial to make the web inclusive for all users.
In which type of integration testing are all components or units integrated simultaneously after they are fully developed?
- Big Bang
- Bottom-Up
- Incremental
- Top-Down
Big Bang Integration Testing involves integrating all the modules or components at once after they are fully developed. This can sometimes lead to challenges in identifying defects as all components are integrated in one go without any incremental checks.
Configuration Management aims to ensure the consistency of a product's performance, functional, and _______ attributes with its requirements, design, and operational information.
- design
- interface
- lifecycle
- physical
Configuration Management ensures consistency across various attributes of a product. One of these attributes is the 'physical' aspect, which relates to the tangible characteristics, components, and structure of the product. This is vital for ensuring the product meets the expected standards and requirements.
The _______ matrix is a tool used to prioritize risks based on their impact and likelihood.
- evaluation
- response
- risk
- scoring
The "risk matrix" is a tool that visualizes risks in a matrix format, based on their likelihood (or probability) on one axis and their impact on another. By categorizing risks in this manner, teams can easily prioritize which risks need immediate attention and which can be addressed later or monitored.
You are assigned a project where components are being developed concurrently by multiple teams. What form of integration testing can ensure that as each piece is completed, it works correctly with the others?
- Acceptance Testing
- Big Bang Integration
- Incremental Integration
- System Testing
Incremental Integration testing involves testing parts of a system sequentially as they're developed. In environments where multiple teams work on different components, this approach ensures that each new piece integrates smoothly with the existing parts, helping detect issues early and reducing integration risks.
The phase in the bug life cycle where the defect is retested to ensure its rectification is termed _______.
- Resolution
- Retesting
- Validation
- Verification
The "Retesting" phase in the bug life cycle is when a specific defect or bug has been fixed and is tested to ensure its rectification. It's a verification process to confirm that the particular defect has been successfully addressed.
_______ testing is a subtype of performance testing where specific functions or modules are rigorously evaluated for performance.
- Component
- Smoke
- Soak
- System
Component Testing: Also known as module or unit testing, this focuses on testing specific functions or modules of an application independently to ensure their performance. It aims to identify any issues at the component level before integrating them into the larger system.
You're a software engineer tasked with ensuring a function behaves correctly for a vast range of input numbers. Which test design technique would be most effective?
- Decision Table Testing
- Equivalence Partitioning
- State Transition Testing
- Usability Testing
Equivalence Partitioning is a test design technique where input data is divided into different equivalence classes based on their behavior. Testing only one value from each class is deemed sufficient. For a vast range of input numbers, it reduces the number of tests while ensuring effective coverage.
_______ testing is beneficial when there are frequent code changes, and immediate feedback on the changes is needed.
- Dynamic Testing
- Regression Testing
- Smoke Testing
- Unit Testing
Regression Testing is the process of testing changes to applications to make sure that the older programming still works with the new changes. It's crucial when there are frequent code changes to ensure that new code doesn't negatively impact existing functionality.
When testers explore the application without any specific plans and simultaneously design and execute tests, they are engaged in _____.
- Exploratory Testing
- Regression Testing
- Scripted Testing
- Smoke Testing
Exploratory Testing involves testers exploring the software without pre-defined test cases or a specific plan. It's a dynamic process where testers learn the application and simultaneously design and execute tests to find defects.