Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CT-GenAI Exam Dumps - ISTQB Certified Tester Testing with Generative AI (CT-GenAI) v1.0

Searching for workable clues to ace the iSQI CT-GenAI Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CT-GenAI PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 4

You must use GenAI to perform test analysis on a payments module with finalized requirements: (1) generate test conditions, (2) prioritize by risk, (3) check coverage gaps. Which sequence best applies prompt chaining?

A.

Generate prioritized conditions in one shot —> verify coverage

B.

Generate conditions —> prioritize by risk —> map to requirements to find gaps

C.

Detect requirement defects —> generate conditions —> prioritize

D.

Prioritize requirements —> generate conditions —> review defects

Full Access
Question # 5

Which concept refers to breaking text into smaller units for processing by LLMs?

A.

Transformer

B.

Embeddings

C.

Context Window

D.

Tokenization

Full Access
Question # 6

Which technique MOST directly reduces hallucinations by grounding the model in project realities?

A.

Provide detailed context

B.

Randomize prompts each run

C.

Rely on generic examples only

D.

Use longer temperature settings

Full Access
Question # 7

Who typically defines the system prompt in a testing workflow?

A.

A tester configuring the assistant

B.

End user during normal chat use

C.

CI server automatically without human input

D.

Product owner in user stories only

Full Access
Question # 8

An attacker sends extremely long prompts to overflow context so the model leaks snippets from its training data. Which attack vector is this?

A.

Data poisoning

B.

Malicious code generation

C.

Data exfiltration

D.

Request manipulation

Full Access
Go to page: