Sail E0 Webinar

MCQs

Total Questions : 10
Question 1. Random testing often known as __________ testing
  1.    Monkey
  2.    Amorous
  3.    Sporadic
  4.    Unknown
 Discuss Question
Answer: Option A. -> Monkey


The source of the name monkey testing comes from the infinite monkey theorem.


Question 2. __________________ is a methodology for modelling and documenting software systems based on best practices.
  1.    TDD
  2.    FDD
  3.    Scrum
  4.    AM
 Discuss Question
Answer: Option D. -> AM


Agile modelling is a collection of values and principles that can be applied on an (agile) software development project.


Question 3. A Use-case realization describes how a particular __________ is realized within the design model.
  1.    Class
  2.    Object
  3.    Use case
  4.    Function
 Discuss Question
Answer: Option C. -> Use case


A use case is realized within the design in terms of collaborating objects.


Question 4. Exploratory testing is often thought of as a ______________ technique.
  1.    White box testing
  2.    Functional testing
  3.    Non-functional testing
  4.    Black box testing
 Discuss Question
Answer: Option D. -> Black box testing


Exploratory testing does not require the internals of the product to be known and hence, is thought of as a type of black box testing.


Question 5. A ____________ test is when a valid input is put and some action to be completed in accordance with the specification is expected.
  1.    Positive
  2.    Regression
  3.    Negative
  4.    Neutral
 Discuss Question
Answer: Option A. -> Positive


Positive testing checks that the correct output is produced for correct inputs.


Question 6. Static analysis cannot ____________
  1.    Enforce coding standards
  2.    Help in code understanding
  3.    Identify anomalies or defects in the code
  4.    Detect memory leaks
 Discuss Question
Answer: Option D. -> Detect memory leaks


Memory leaks occur dynamically and hence, static analysis cannot identify them.


Question 7. _____________looks for known security issues by using automated tools to match conditions with known vulnerabilities.
  1.    Discovery
  2.    Vulnerability Scan
  3.    Security Assessment
  4.    Penetration Test
 Discuss Question
Answer: Option B. -> Vulnerability Scan


Vulnerability scanning is supplemented with credential based scanning that remove some common false positives.


Question 8. RTM is prepared ___________
  1.    After test case designing
  2.    Before test case designing
  3.    During test case designing
  4.    Not prepared
 Discuss Question
Answer: Option B. -> Before test case designing


Requirements should already be traceable from Review activities ande RTM is prepared before test case designing.


Question 9. RTM stands for ____________
  1.    Repeated Trade Matrix
  2.    Redundant Trace Module
  3.    Robust Test Mechanism
  4.    Requirement traceability matrix
 Discuss Question
Answer: Option D. -> Requirement traceability matrix


The Requirements Traceability Matrix or RTM is a document that links requirements throughout the validation process.


Question 10. _________ is driven by an Audit or a Risk function to look at a specific control or compliance issue.
  1.    Security Audit
  2.    Vulnerability Scan
  3.    Vulnerability Assessment
  4.    Penetration Test
 Discuss Question
Answer: Option A. -> Security Audit


Characterized by a narrow scope, Security audit is used to diagnose a compliance issue or specific control.


Latest Videos

Latest Test Papers