How does Configuration Auditing differ from Configuration Control?
- Auditing checks for consistency, Control implements changes
- Auditing deals with financial records
- Auditing is a pre-development activity, Control is post-development
- Auditing is about user access management
Configuration Auditing and Configuration Control are both crucial aspects of Configuration Management. Configuration Auditing ensures that the current configuration of an item matches the specified requirements and checks for consistency and completeness, ensuring no unauthorized changes have occurred. On the other hand, Configuration Control involves evaluating, coordinating, approving or disapproving, and implementing changes to configured items.
_______ is a type of static analysis that focuses on ensuring coding standards and conventions are followed.
- Code Inspection
- Code Review
- Linting
- Regression Testing
Linting is a process that involves the use of tools (often termed as "linters") to automatically scan source code for potential issues. These tools typically focus on ensuring that coding standards, conventions, and best practices are adhered to, without executing the program or script.
In the context of CI/CD, what does "breaking the build" mean?
- Deleting necessary files
- Introducing a performance bug
- Introducing code changes that fail the automated tests
- Upgrading the server versions
"Breaking the build" in CI/CD refers to introducing changes to the codebase that cause the automated build process to fail. This often means that a new code change has introduced errors that were caught during the compilation or testing phase of the build process.
Why is boundary value analysis crucial in test case design?
- Enhances user experience
- Identifies loop errors
- Increases code coverage
- Pinpoints edge-case defects
Boundary Value Analysis is a technique where tests are designed around boundary values. Since software often fails at the boundaries, this method is crucial for pinpointing defects that manifest at edge cases, ensuring robustness of the application.
The _______ model in SDLC emphasizes the need for feedback loops where the previous steps can be revisited as the development progresses.
- Iterative
- Spiral
- V-Model
- Waterfall
The "Iterative" model in SDLC emphasizes iterative development. With each iteration, development processes go through the software development life cycle phases like planning, requirements, design, implementation, and testing. Feedback loops allow for constant refinement and adjustment based on lessons learned.
In incremental integration testing, as modules are added, tests are _______ to ensure that they integrate properly with the system.
- expanded
- modified
- reduced
- repeated
In incremental integration testing, as new modules are integrated, tests are "repeated" for the new combined group of modules to ensure that the newly added module integrates properly with the existing system. This ensures that with each addition, the system remains stable and no new issues are introduced due to the integration.
You are leading a team responsible for a critical piece of software. Due to its nature, ensuring the absence of security vulnerabilities is crucial. Which static analysis approach would be most beneficial?
- Code Inspection
- Dynamic Analysis
- Security Testing
- Static Code Analysis
Static Code Analysis involves analyzing the software's source code without executing it to identify potential vulnerabilities. This method can detect security issues like buffer overflows, SQL injection, and more at an early stage, making it a suitable choice for ensuring the software doesn't have security vulnerabilities.
Which testing approach primarily addresses issues like app crashes, broken links, and functional discrepancies in mobile applications?
- Performance Testing
- Regression Testing
- Sanity Testing
- Smoke Testing
Regression Testing is aimed at ensuring that recent code changes haven't adversely affected existing features. Whenever there's a code change to fix defects or introduce new functionalities, there's a potential to introduce or uncover new issues like app crashes, broken links, or functional discrepancies. Regression testing catches these and ensures that the application's previous functionality remains intact.
In a _______ scripting technique, test scripts are developed using a set of keywords and corresponding functions or methods.
- Data-driven
- Descriptive
- Keyword-driven
- Modular
The keyword-driven scripting technique, also known as table-driven testing, allows test scripts to be developed using predefined keywords, each representing a specific functionality or method. This approach abstracts the coding complexity, making it user-friendly and often used in frameworks to separate test logic from the test scripts.
You are handed an application with a primary goal to validate its internal algorithm structures and logic. Without prior detailed information about its functional behavior, which testing technique will you utilize?
- Boundary Testing
- Sanity Testing
- Usability Testing
- White Box Testing
White Box Testing, also known as Glass Box or Structural Testing, involves testing the internal structures of an application. In this case, if the goal is to validate the internal algorithm structures and logic, White Box Testing allows testers to evaluate the intricacies of the application's internal code and logic structures.