Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CTAL-TTA Exam Dumps - Certified Tester Advanced Level Technical Test Analyst

Question # 4

Which of the following is NOT a common issue with traditional capture/playback test automation?

A.

Difficult to maintain when software changes.

B.

Recorded scripts are difficult to maintain by non-technical persons.

C.

Data and actions are mixed in the recorded script.

D.

Execution of the recorded script is difficult outside office hours.

Full Access
Question # 5

Consider the pseudo code for the Answer program:

Which of the following statements about the Answer program BEST describes the control flow anomalies to be found in the program?

A.

The Answer program contains no control flow anomalies.

B.

The Answer program contains unreachable code.

C.

The Answer program contains unreachable code and an infinite loop.

D.

The Answer program contains an infinite loop.

Full Access
Question # 6

Within the world of consumer electronics, the amount of embedded software is growing rapidly. The amount of software in high-end television sets has increased by a factor of about eight over the last six years. In addition, the market of consumer electronics has been faced with a 5 -10% price erosion per year. The price of a product is, among a number of other things, determined by the microcontroller used. Therefore, the use of ROM and RAM remains under high pressure in consumer electronic products, leading to severe restrictions on code size.

Within a new high-end TV project, it has been decided to apply dynamic analysis.

Which of the quality goals listed below is MOST appropriate to the project context?

A.

Prevent failures from occurring by detecting wild pointers and loss of system memory.

B.

Analyse system failures which cannot easily be reproduced.

C.

Evaluate network behaviour.

D.

Improve system performance by providing information on run-time system behaviour.

Full Access
Question # 7

Which of the following statements about fault seeding tools is correct?

A.

Fault seeding tools insert defects into the source code to check the effectiveness of testing.

B.

Fault seeding tools insert defects into the source code to test the input checking capabilities of the software.

C.

Fault seeding tools insert defects into the source code to support the application of specification-based test design techniques.

D.

Fault seeding tools insert defects into the source code to check the level of maintainability of the software.

Full Access
Question # 8

Which of the following defect types is NOT an example of a defect type typically found with API testing?

A.

Data handling issues

B.

Timing problems

C.

High architectural structural complexity

D.

Loss of transactions

Full Access
Question # 9

Below is the pseudo-code for the Win program:

The bingo program contains a data flow anomaly. Which data flow anomaly can be found in this program?

A.

Variable 'A" is not assigned a value before using it.

B.

Variable 'D" is defined but subsequently not used.

C.

The program does not contain any comments.

D.

It is recommended to use a variable instead of the hard-coded print results "Win" and *Loose".

Full Access
Question # 10

Assume you are involved in testing a Health Insurance Calculation system.

At the main screen one can enter information for a new client. The information to be provided consists of last name, first name and date of birth. After confirmation of the information, the system checks the age of the potential new client and calculates a proposed premium.

The system also has the option to request information for an existing client, using the client’s ID number.

A keyword-driven automation approach is being used to automate most of the regression testing.

Based on the information provided, which TWO of the options provided would be the MOST LIKELY keywords for this application? (Choose two.)

A.

Remove_Client

B.

Enter_Client

C.

Print_Premium

D.

Select_Client

E.

Exclude_Client

Full Access
Question # 11

Within the world of consumer electronics, the amount of embedded software is growing rapidly. The amount of software in high-end television sets has increased by a factor of about eight over the last six years. In addition, the market of consumer electronics has been faced with a 5 -10% price erosion per year. The price of a product is, among a number of other things, determined by the microcontroller used. Therefore, the use of ROM and RAM remains under high pressure in consumer electronic products, leading to severe restrictions on code size.

You are a Technical Test Analyst involved in the review of the architecture of this project.

Which of the following issues would be MOST important to focus on during the review and when verifying the correct implementation?

A.

Connection pooling

B.

Caching

C.

Transaction concurrency

D.

Lazy instantiation

Full Access
Question # 12

Which of the following is a valid reason for including security testing in a test approach?

A.

There is a threat of unauthorized copying of applications or data.

B.

To provide measurements from which an overall level of availability can be obtained.

C.

To evaluate the ability of a system to handle peak loads at or beyond the limits of its anticipated or specified workloads

D.

Software changes will be frequent after it enters production.

Full Access
Question # 13

Which of the following statements is TRUE regarding tools that support component testing and the build process?

A.

Both are used to examine source code before a program is executed. This is done by analysing a section of code against a set (or multiple sets) of coding rules.

B.

Both are used to reduce the costs of test environments by replacing real devices.

C.

Both provide run-time information on the state of the software code, e.g., unassigned pointers and the use and de-allocation of memory.

D.

Both provide an environment for unit testing in which a component can be tested in isolation with suitable stubs and drivers.

Full Access