While exploratory testing can be freestyle, many testers employ structured approaches like _____ to document and manage their findings.
- Test Cases
- Test Charters
- Test Plans
- Test Scripts
Although Exploratory Testing can be freestyle, many testers use "Test Charters" to guide their exploration. Test Charters help in providing a clear context, scope, and purpose of the exploration while allowing testers to document and manage their findings efficiently.
System testing is conducted on a _______ software to evaluate its overall behavior.
- alpha
- integrated
- modular
- standalone
System testing is conducted on an integrated software to evaluate its complete and end-to-end behavior. It ensures that the entire software functions according to specified requirements. This phase tests the entire software as a single entity.
The process in Configuration Management that involves systematically controlling changes to the configuration items and maintaining their integrity throughout the lifecycle is called _______.
- Auditing
- Change Control
- Status Reporting
- Version Control
Change Control in Configuration Management involves a systematic approach to manage changes by evaluating, approving, or disapproving changes, ensuring that changes are documented, and ensuring that configuration items maintain their integrity throughout the lifecycle.
You are given a task to test an e-commerce application. You start from selecting a product, adding it to the cart, checking out, making a payment, and finally receiving a confirmation email. Which testing approach does this scenario represent?
- End-to-End Testing
- Performance Testing
- Smoke Testing
- Static Testing
End-to-End Testing involves testing an application's flow as a whole to ensure that the entire process of a user accessing and using the site works smoothly. In this scenario, the entire shopping process, from product selection to payment and receiving a confirmation, is being tested, making it a classic case of End-to-End Testing.
What differentiates a security audit from a vulnerability scan?
- Duration
- Formality Level
- The primary objective of the task
- Use of Automated Tools
While both a security audit and vulnerability scan aim to identify vulnerabilities, a security audit is a more comprehensive review of an organization's entire information system, including policies, procedures, and controls. On the other hand, a vulnerability scan focuses on identifying technical vulnerabilities.
Which method systematically scans a computer system or network to find potential vulnerabilities?
- Compression
- Encryption
- Penetration Testing
- Vulnerability Scanning
Vulnerability Scanning is a systematic approach that uses specialized tools to identify, rank, and report potential vulnerabilities in a computer system or network. It provides an overview of the security flaws but doesn't necessarily exploit them like penetration testing.
In mobile application testing, which tool is often used for testing the performance and load capability of the app?
- Appium
- JIRA
- JMeter
- Selenium
JMeter is a popular open-source tool primarily used for performance testing. It allows testers to simulate multiple users and test how much load an app can handle, ensuring the app performs well under heavy usage. While it started for web applications, it is now used for mobile application load testing as well.
What's the primary difference between test planning and test strategy?
- Planning's documentation
- Planning's scope
- Strategy's duration
- Strategy's overarching approach
The primary difference between test planning and test strategy is their purpose and scope. While test planning is a document that outlines the specifics of the testing process for a particular project, test strategy provides an overarching approach to testing across multiple projects or for an entire organization.
Which tool or method would be best for identifying vulnerabilities in a web application's code before it's deployed?
- Code Review
- JUnit
- Selenium
- Wireshark
A Code Review is a systematic examination of the application's source code. It's conducted to find vulnerabilities or bugs before the app is deployed. While tools like Selenium and JUnit focus on functional testing, and Wireshark on network analysis, only a thorough code review provides insights into code vulnerabilities.
_______ is a white-box testing technique that focuses on evaluating the logic of the program.
- Boundary Testing
- Compatibility Testing
- Path Testing
- Usability Testing
Path testing is a white-box testing technique that ensures every path through the program is tested at least once. It is particularly focused on evaluating the program's internal logic paths to ensure all code branches and potential execution paths are tested.