While exploratory testing can be freestyle, many testers employ structured approaches like _____ to document and manage their findings.

  • Test Cases
  • Test Charters
  • Test Plans
  • Test Scripts
Although Exploratory Testing can be freestyle, many testers use "Test Charters" to guide their exploration. Test Charters help in providing a clear context, scope, and purpose of the exploration while allowing testers to document and manage their findings efficiently.

System testing is conducted on a _______ software to evaluate its overall behavior.

  • alpha
  • integrated
  • modular
  • standalone
System testing is conducted on an integrated software to evaluate its complete and end-to-end behavior. It ensures that the entire software functions according to specified requirements. This phase tests the entire software as a single entity.

The process in Configuration Management that involves systematically controlling changes to the configuration items and maintaining their integrity throughout the lifecycle is called _______.

  • Auditing
  • Change Control
  • Status Reporting
  • Version Control
Change Control in Configuration Management involves a systematic approach to manage changes by evaluating, approving, or disapproving changes, ensuring that changes are documented, and ensuring that configuration items maintain their integrity throughout the lifecycle.

Configuration Management aims to ensure the consistency of a product's performance, functional, and _______ attributes with its requirements, design, and operational information.

  • design
  • interface
  • lifecycle
  • physical
Configuration Management ensures consistency across various attributes of a product. One of these attributes is the 'physical' aspect, which relates to the tangible characteristics, components, and structure of the product. This is vital for ensuring the product meets the expected standards and requirements.

In which type of integration testing are all components or units integrated simultaneously after they are fully developed?

  • Big Bang
  • Bottom-Up
  • Incremental
  • Top-Down
Big Bang Integration Testing involves integrating all the modules or components at once after they are fully developed. This can sometimes lead to challenges in identifying defects as all components are integrated in one go without any incremental checks.

In accessibility testing, ensuring that users are given enough time to read and use the content is specified under the _______ guideline.

  • Content Interaction
  • Enough Time
  • Time Adjustment
  • User Feedback
The "Enough Time" guideline under accessibility testing ensures that users, especially those with disabilities, are given adequate time to read, comprehend, and utilize the content. This is crucial to make the web inclusive for all users.

You are given a task to test an e-commerce application. You start from selecting a product, adding it to the cart, checking out, making a payment, and finally receiving a confirmation email. Which testing approach does this scenario represent?

  • End-to-End Testing
  • Performance Testing
  • Smoke Testing
  • Static Testing
End-to-End Testing involves testing an application's flow as a whole to ensure that the entire process of a user accessing and using the site works smoothly. In this scenario, the entire shopping process, from product selection to payment and receiving a confirmation, is being tested, making it a classic case of End-to-End Testing.

What differentiates a security audit from a vulnerability scan?

  • Duration
  • Formality Level
  • The primary objective of the task
  • Use of Automated Tools
While both a security audit and vulnerability scan aim to identify vulnerabilities, a security audit is a more comprehensive review of an organization's entire information system, including policies, procedures, and controls. On the other hand, a vulnerability scan focuses on identifying technical vulnerabilities.

Which method systematically scans a computer system or network to find potential vulnerabilities?

  • Compression
  • Encryption
  • Penetration Testing
  • Vulnerability Scanning
Vulnerability Scanning is a systematic approach that uses specialized tools to identify, rank, and report potential vulnerabilities in a computer system or network. It provides an overview of the security flaws but doesn't necessarily exploit them like penetration testing.

In mobile application testing, which tool is often used for testing the performance and load capability of the app?

  • Appium
  • JIRA
  • JMeter
  • Selenium
JMeter is a popular open-source tool primarily used for performance testing. It allows testers to simulate multiple users and test how much load an app can handle, ensuring the app performs well under heavy usage. While it started for web applications, it is now used for mobile application load testing as well.