Which type of testing evaluates the upper limits of a system and determines how it behaves when those limits are exceeded?

  • Black Box Testing
  • Regression Testing
  • Smoke Testing
  • Stress Testing
Stress Testing is designed to push a system beyond its normal limits to see how it responds. It helps in identifying the upper boundaries of a software system and checks its robustness. This is crucial in ensuring that the system will not crash or have unacceptable slowdowns when faced with extreme conditions.

In _______ integration testing, integration is performed step by step, starting from integrating two modules, then three, and so on.

  • Big Bang
  • Black Box
  • Incremental
  • Sandwich
Incremental integration testing involves combining modules one by one and testing them. It is performed in a step-by-step manner, starting with two modules and then gradually increasing the number. This ensures that interface-related errors are detected and fixed.

What is the main objective of a "walkthrough" in the review process?

  • Ensuring code optimization
  • Executing the entire application
  • Finding major defects
  • Understanding the functionality
A "walkthrough" in the review process aims at achieving a mutual understanding of the product. It's a type of informal review where the author leads team members through the product, explaining his or her approach, and it primarily serves to share understanding and gather feedback.

You are assessing the efficiency of your test processes. Which metric would give you insights into how many defects remain in the software post-release?

  • Code Coverage
  • Post-release Defect Density
  • Test Execution Time
  • Test Pass Percentage
The "Post-release Defect Density" metric gives insights into the number of defects found in the software after its release. A high density suggests that the testing process might have missed issues, while a low density implies effective testing during the development phase.

How is the "Defect Removal Efficiency" metric typically calculated?

  • (Defects fixed / Defects reported) x 100%.
  • (Defects found by testers / Defects found by users) x 100%.
  • (Defects found post-release / Total defects) x 100%.
  • (Defects found pre-release / Total defects) x 100%.
"Defect Removal Efficiency" (DRE) metric measures the effectiveness of the testing process. It's calculated as the ratio of defects found before release (by the testing team) to the total defects (found both before and after release). A higher DRE indicates a more effective testing process.

Which test metric measures the number of defects detected during a specific phase of the software development lifecycle?

  • Defect Density
  • Defect Severity
  • Phase Containment Rate
  • Test Coverage
"Defect Density" is a test metric that measures the number of defects detected in a specific phase of the software development lifecycle relative to the size of the software. It helps in understanding the quality of the software and the effectiveness of the testing phase.

Resource planning emphasizes the _______ tools and environment setup required for effective testing.

  • Automated Tools
  • Quality Assurance
  • Test Metrics
  • Testing Process
Resource planning is a critical aspect of testing preparation. It focuses on ensuring that the required "Automated Tools" and environment setups are available for the testing process. Having the right tools is essential for effective and efficient testing, especially when it involves complex scenarios.

Test metrics that measure the effectiveness of the testing process by identifying areas that have been most problematic are known as _______.

  • Efficiency Metrics
  • Fault Metrics
  • Performance Metrics
  • Quality Indicators
"Quality Indicators" are test metrics that evaluate the effectiveness of the testing process. They highlight the areas of the software that have been most problematic, assisting teams in focusing their efforts and improving processes.

In security testing, the method that involves simulating malicious attacks on a system and tries to exploit vulnerabilities is called _______.

  • Dynamic Analysis
  • Fuzzing
  • Penetration Testing
  • Stress Testing
Penetration Testing is a type of security testing where testers, often called 'ethical hackers', attempt to exploit vulnerabilities in the system, simulating malicious attacks. This proactive approach helps in identifying security vulnerabilities which might not be detectable with automated network or application vulnerability scanning software.

In white-box testing, what is primarily analyzed to design the test cases?

  • Feedback from End Users
  • Requirements Document
  • Source Code
  • User Interface
White-box Testing, often referred to as structural or clear-box testing, involves the detailed examination of the internal logic of the code. Thus, the primary element analyzed to design test cases is the actual source code of the software component under test.

What is the primary challenge faced by organizations when solely relying on experience-based testing techniques?

  • Difficulty in replicating test scenarios
  • Difficulty in training new testers
  • Increased cost of testing
  • Limited test coverage due to human biases
Solely relying on experience-based testing techniques can result in limited test coverage due to inherent human biases. Testers might focus on areas they're familiar with or consider problematic, potentially overlooking other critical sections or newer functionalities that also require attention.

A proactive approach to identifying future risks that could emerge due to changes in a project is termed as _______ risk identification.

  • anticipatory
  • backward
  • forward-looking
  • retrospective
Anticipatory risk identification involves proactively identifying risks that might emerge in the future due to changes or updates in a project. This approach ensures that potential issues are addressed before they become actual threats to project objectives.