Which of the following is an example of the use of a defect taxonomy for test design?
Part 2: “Test Analyst various”
Which of the following is an example of the use of a defect taxonomy for test design?
Which THREE techniques would you recommend?
Part 2: “Test Analyst various”
A company wants to develop a web site to implement an on-line sales channel. The company has
decided to do some usability testing. However, this has to be as efficient as possible. Which THREE
techniques would you recommend? 2 out of 3 correct
Which ISO 9126 quality attribute is most likely to always be of importance when testing a web site?
Part 2: “Test Analyst various”
Which ISO 9126 quality attribute is most likely to always be of importance when testing a web site?
Which of the following is the least appropriate action to mitigate risk for a www application?
Part 2: “Test Analyst various”
Which of the following is the least appropriate action to mitigate risk for a www application?
Which of the following places these in their logical sequence?
Part 2: “Test Analyst various”
Consider the following list of test process activities:
i. Analysis and design
ii. Test closure activities
iii. Evaluating exitcriteria and reporting
iv. Planning and control
v. Implementation and execution
Which of the following places these in their logical sequence?
Which of the following is a risk mitigation action?
Part 2: “Test Analyst various”
Which of the following is a risk mitigation action?
Which of the following items are characteristics of good testing in any life cycle model?
Part 2: “Test Analyst various”
Which of the following items are characteristics of good testing in any life cycle model?
i. Every development activity has a corresponding test activity
ii. Development documents are reviewed early in the life cycle
iii. There are separate levels for performance and usability testing
iv. Each test level has objectives specific to that level
v. Each test level is based on the same test basis
Which of the following is the kind of failure you are looking for when using this attack?
Part 2: “Test Analyst various”
Consider the following fault attack: “Force all possible incoming errors from the software/OS
interfaces to the application”. Which of the following is the kind of failure you are looking for when
using this attack?
which technique would you most likely use?
Part 2: “Test Analyst various”
If you are testing a set of signal changes at a railway station, which technique would you most likely
use?
Which of the following statements is true?
Consider the following list of findings regarding the requirement. Which of the following statements
is true?