What is the initial state of a defect when it is first identified and logged?

  • Closed
  • Deferred
  • Open
  • Rejected
When a defect is first identified and logged, it is in the "Open" state. This means that the defect is now recognized and needs investigation or action. It has yet to undergo the various phases of the defect life cycle where its validity and resolution will be determined.

In a situation where the management wants a measure of how successful the testing phase was in identifying and rectifying defects, which metric would you recommend?

  • Defect Density
  • Defect Removal Efficiency
  • Test Case Efficiency
  • Test Duration
The "Defect Removal Efficiency" metric quantifies the effectiveness of the testing process in identifying and rectifying defects. A higher percentage indicates that the testing process was successful in catching and resolving a large proportion of defects during testing.

Which type of accessibility testing primarily focuses on checking the application's compatibility with voice commands?

  • Cognitive Load Testing
  • Manual Accessibility Testing
  • Visual Testing
  • Voice Command Testing
Voice Command Testing primarily focuses on ensuring that an application or website can be navigated and operated using voice commands. As voice-activated devices and technologies are becoming more prevalent, it's essential for web content and applications to be compatible with such methods to aid users with specific disabilities.

In the context of security testing, which type of testing focuses specifically on evaluating how a system responds to malicious input?

  • Functional Testing
  • Load Testing
  • Penetration Testing
  • Regression Testing
Penetration testing specifically evaluates a system's security by simulating cyberattacks. It aims to identify potential vulnerabilities in the system by seeing how it responds to malicious inputs. This proactive approach helps secure systems against real-world hacking attempts.

In unit testing, when a function relies on an external component, which technique is used to isolate the function for testing?

  • Fuzzing
  • Mutation Testing
  • Regression Testing
  • Stubbing
Stubbing involves creating a 'stub' or a simple implementation of the external component that simulates its behavior. This allows the function being tested to operate as if the external component is working, ensuring isolation in unit tests.

The accessibility guideline that ensures that all functionalities can be performed using a keyboard is termed as _______.

  • Keyboard Accessibility
  • Keyboard Compatibility
  • Touch Accessibility
  • Voice Recognition
The principle of "Keyboard Accessibility" ensures that all features and functionalities on a website or application can be accessed and executed using only the keyboard. This is essential for users who cannot use a mouse or other pointing devices effectively.

In a situation where the project is running out of time, and the testing team hasn't covered all the test cases, which software testing principle should guide their next steps in choosing what to test?

  • Exhaustive Testing is Impossible
  • Test Early and Often
  • Test Important Functions First
  • Testing shows presence of defects
The principle that "Exhaustive Testing is Impossible" acknowledges that it's impractical to test every possible scenario due to constraints like time. In cases where time is limited, prioritizing test cases becomes crucial, focusing on high-risk or high-importance areas of the application.

What is a common metric used in usability testing to determine the effectiveness of a user interface?

  • Code Coverage
  • Error Rate
  • Path Complexity
  • Response Time
The Error Rate in usability testing refers to the number of errors users make when interacting with a product or system. A high error rate may indicate that the user interface is not intuitive or is confusing, necessitating design changes to enhance usability.

When using the _______ approach in incremental integration testing, testing starts from the higher levels of the hierarchy.

  • Big Bang
  • Bottom-up
  • Sandwich
  • Top-down
In the Top-down approach of incremental integration testing, testing starts from the top or main module and moves downwards, incorporating sub-modules one by one. This approach allows testing of the main functionality earlier in the development process, even if all sub-modules aren't complete yet.

Which tool or technique is NOT typically used in the risk identification process in software testing?

  • Brainstorming
  • Flowcharting
  • Photoshop
  • Risk Matrix
"Photoshop" is a graphic design and photo editing software and is not typically used in the risk identification process in software testing. On the other hand, Brainstorming, Risk Matrices, and Flowcharting are common techniques and tools used to identify and visually represent risks.

The _______ serves as a guideline for all testing processes and activities within a project.

  • Bug Report
  • Test Case
  • Test Plan
  • Test Script
The "Test Plan" is a comprehensive document that outlines the scope, approach, resources, and schedule of testing activities. It serves as a blueprint for all testing processes and activities, ensuring that every aspect of the testing process is covered and understood by all stakeholders.

Which Configuration Management activity ensures that the current design and build state of the software matches the latest product baseline?

  • Auditing
  • Build Automation
  • Status Accounting
  • Version Control
Auditing in Configuration Management ensures that the current design and build state of the software matches the latest product baseline. It involves a systematic examination of the processes, making certain that all procedures and standards are being followed, ensuring the integrity of the product.