System testing is conducted on a _______ software to evaluate its overall behavior.

  • alpha
  • integrated
  • modular
  • standalone
System testing is conducted on an integrated software to evaluate its complete and end-to-end behavior. It ensures that the entire software functions according to specified requirements. This phase tests the entire software as a single entity.

The process in Configuration Management that involves systematically controlling changes to the configuration items and maintaining their integrity throughout the lifecycle is called _______.

  • Auditing
  • Change Control
  • Status Reporting
  • Version Control
Change Control in Configuration Management involves a systematic approach to manage changes by evaluating, approving, or disapproving changes, ensuring that changes are documented, and ensuring that configuration items maintain their integrity throughout the lifecycle.

Which component of test planning primarily deals with defining the criteria to release the software?

  • Exit Criteria
  • Test Data
  • Test Environment
  • Test Scope
The "Exit Criteria" in test planning defines the specific conditions or metrics that need to be achieved before the software can be released. It ensures that the product has reached a certain quality standard before it's deemed fit for production.

The _______ matrix is a tool used to prioritize risks based on their impact and likelihood.

  • evaluation
  • response
  • risk
  • scoring
The "risk matrix" is a tool that visualizes risks in a matrix format, based on their likelihood (or probability) on one axis and their impact on another. By categorizing risks in this manner, teams can easily prioritize which risks need immediate attention and which can be addressed later or monitored.

Configuration Management aims to ensure the consistency of a product's performance, functional, and _______ attributes with its requirements, design, and operational information.

  • design
  • interface
  • lifecycle
  • physical
Configuration Management ensures consistency across various attributes of a product. One of these attributes is the 'physical' aspect, which relates to the tangible characteristics, components, and structure of the product. This is vital for ensuring the product meets the expected standards and requirements.

In which type of integration testing are all components or units integrated simultaneously after they are fully developed?

  • Big Bang
  • Bottom-Up
  • Incremental
  • Top-Down
Big Bang Integration Testing involves integrating all the modules or components at once after they are fully developed. This can sometimes lead to challenges in identifying defects as all components are integrated in one go without any incremental checks.

In accessibility testing, ensuring that users are given enough time to read and use the content is specified under the _______ guideline.

  • Content Interaction
  • Enough Time
  • Time Adjustment
  • User Feedback
The "Enough Time" guideline under accessibility testing ensures that users, especially those with disabilities, are given adequate time to read, comprehend, and utilize the content. This is crucial to make the web inclusive for all users.

You are given a task to test an e-commerce application. You start from selecting a product, adding it to the cart, checking out, making a payment, and finally receiving a confirmation email. Which testing approach does this scenario represent?

  • End-to-End Testing
  • Performance Testing
  • Smoke Testing
  • Static Testing
End-to-End Testing involves testing an application's flow as a whole to ensure that the entire process of a user accessing and using the site works smoothly. In this scenario, the entire shopping process, from product selection to payment and receiving a confirmation, is being tested, making it a classic case of End-to-End Testing.

What differentiates a security audit from a vulnerability scan?

  • Duration
  • Formality Level
  • The primary objective of the task
  • Use of Automated Tools
While both a security audit and vulnerability scan aim to identify vulnerabilities, a security audit is a more comprehensive review of an organization's entire information system, including policies, procedures, and controls. On the other hand, a vulnerability scan focuses on identifying technical vulnerabilities.

Which method systematically scans a computer system or network to find potential vulnerabilities?

  • Compression
  • Encryption
  • Penetration Testing
  • Vulnerability Scanning
Vulnerability Scanning is a systematic approach that uses specialized tools to identify, rank, and report potential vulnerabilities in a computer system or network. It provides an overview of the security flaws but doesn't necessarily exploit them like penetration testing.