Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CTFL_Syll_4.0 Exam Dumps - ISTQB Certified Tester Foundation Level (CTFL) v4.0

Go to page:
Question # 41

Which of the following statements about the test pyramid is true?

A.

Each layer of the test pyramid groups tests related to a single non-functional quality characteristic

B.

The higher the layer of the test pyramid, the more production code a single automated test within the layer tends tocover

C.

The higher the layer of the test pyramid, the more maintainable a single automated test within the layer tends to be

D.

The higher the layer of the test pyramid, the more isolated a single automated test within the layer tends to be

Full Access
Question # 42

Which of the following statements about white-box test techniques is true?

A.

Achieving full statement coverage and full branch coverage for a software product means that such software product has been fully tested and there are no remaining bugs within the code

B.

Code-related white-box test techniques are not required to measure the actual code coverage achieved by black-box testing, as code coverage can be measured using the coverage criteria associated with black-box test techniques

C.

Branch coverage is the most thorough code-related white-box test technique, and therefore applicable standards prescribe achieving full branch coverage at the highest safety levels for safety-critical systems

D.

Code-related white-box test techniques provide an objective measure of coverage and can be used to complement black-box test techniques to increase confidence in the code

Full Access
Question # 43

The following chart represents metrics related to testing of a project that was competed. Indicate what is represented by tie lines A, B and the axes X.Y

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

Which ONE of the following roles is responsible for mediating, managing time, and generating a safe review environment in which everyone can speak freely?

A.

Manager

B.

Reviewer

C.

Review leader

D.

Moderator

Full Access
Question # 45

Use Scenario 1 “Happy Tomatoes” (from the previous question).

When running test caseTC_59, the actual result fort = 35degrees Celsius isOUTPUT = Xinstead of the expected output.

Which information should NOT be included in the defect report?

A.

Identification of the test object and test environment

B.

A concise title and a short summary of the defect being reported

C.

Description of the structure of the test team

D.

Expected results and actual results

Full Access
Question # 46

In addition to thorough testing of the requirements specification, a development team aims to involve users as early as possible in the development process, using practices such as prototyping, to ensure that the software systems being developed will meet the users’ expectations. This approach is especially useful at mitigating the risks associated with one of the seven testing principles, which one?

A.

Tests wear out

B.

Absence-of-errors fallacy

C.

Working software over comprehensive documentation

D.

Defects cluster together

Full Access
Question # 47

Consider the following examples of risks identified in different software development projects:

[I]. The contrast color ratio for both normal text and large text of a website does not comply with the applicable accessibility guidelines, making it difficult for many users to read the content on the pages

[II]. A development vendor fails to deliver their software system on time, causing significant delays to system integration testing activities that have been planned as part of a development project for a system of systems

[III]. People in the test team do not have sufficient skills to automate tests at the test levels required by the test automation strategy which does not allow production of an effective regression test suite

[IV]. In a web application, data from untrusted sources is not subject to proper input validation, making the application vulnerable to several security attacks

Which of the following statements is true?

A.

[I] and [III] are product risks; [II] and [IV] are project risks

B.

[I] and [IV] are product risks. [II] and [III] are project risks

C.

[II], [III] and [IV] are product risks; [I] is a project risk

D.

[IV] is a product risk; [I]. [II] and [III] are project risks

Full Access
Question # 48

In a review, which of the following is the responsibility of the manager?

A.

Organizing the logistics of the review meeting

B.

Measuring the performance of each reviewer

C.

Ensuring that sufficient time is available for review

D.

Performing detailed review based on past experience

Full Access
Go to page: