060010711/040250111-software testing...

40
060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 1 Introduction Unit – 1 Short Questions 1. Why we need to do software test? 2. List out any three software testing principle. 3. What test analyst should do? 4. List out test analyst task. 5. Define role of test analyst. 6. Which are the major domain specific documents reviewed by domain test analyst? 7. Enlist the types of systems. 8. “System of System is developed using building concept “give comments for this statement. 9. State the major deficiency of systems of systems approach. 10. Which are basic environmental needs of test plan specification document? 11. Whether actual data are included in concrete test cases? 12. How inter-case dependencies manage in test case specification document? 13. When do test closure activities occur? 14. Which strategic document guides stakeholders regarding the test process? 15. Which document provides information related to locating and installing the software? 16. What is ECSS? 17. What is FDA? 18. What is JAA? 19. Who manage test process? 20. Write steps of test process. Long Questions 1. Explain Testing principle. 2. Write Test Process with all steps. 3. Compare and contrast validation with verification. 4. How to run a test case is explained in which document? List the information available in this document. 5. Which things are determined by test analyst during test planning and test control phase of test process? 6. Give any two differences between project risk and product risk. 7. Give any two differences between logical test case and concrete test case. 8. During which phase of test process static testing is initiated? Enlist the information managed in the document maintained during this phase. 9. Which are concern issues for test analyst while determining the type of system? 10. Which are the fundamental abilities are expected from test analyst? 11. What is the role of technical test analyst? 12. What are the tasks performed by domain test analyst? 13. Discuss the marathon system with its general requirement. 14. Why the cost of testing for system of system is increased? 15. Explain real time and embedded system with test challenges of it. 16. Assume you are a technical test analyst working on a banking project to upgrade an existing

Upload: others

Post on 29-May-2020

17 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 1

Introduction Unit – 1

Short Questions

1. Why we need to do software test? 2. List out any three software testing principle. 3. What test analyst should do? 4. List out test analyst task. 5. Define role of test analyst. 6. Which are the major domain specific documents reviewed by domain test analyst? 7. Enlist the types of systems. 8. “System of System is developed using building concept “give comments for this statement. 9. State the major deficiency of systems of systems approach. 10. Which are basic environmental needs of test plan specification document? 11. Whether actual data are included in concrete test cases? 12. How inter-case dependencies manage in test case specification document? 13. When do test closure activities occur? 14. Which strategic document guides stakeholders regarding the test process? 15. Which document provides information related to locating and installing the software? 16. What is ECSS? 17. What is FDA? 18. What is JAA? 19. Who manage test process? 20. Write steps of test process.

Long Questions

1. Explain Testing principle. 2. Write Test Process with all steps. 3. Compare and contrast validation with verification. 4. How to run a test case is explained in which document? List the information available in this

document. 5. Which things are determined by test analyst during test planning and test control phase of

test process? 6. Give any two differences between project risk and product risk. 7. Give any two differences between logical test case and concrete test case. 8. During which phase of test process static testing is initiated? Enlist the information

managed in the document maintained during this phase. 9. Which are concern issues for test analyst while determining the type of system? 10. Which are the fundamental abilities are expected from test analyst? 11. What is the role of technical test analyst? 12. What are the tasks performed by domain test analyst? 13. Discuss the marathon system with its general requirement. 14. Why the cost of testing for system of system is increased? 15. Explain real time and embedded system with test challenges of it. 16. Assume you are a technical test analyst working on a banking project to upgrade an existing

Page 2: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 2

ATM system to allow customers to obtain cash advances from supported credit cards. One of the exit criteria in the test plan requires documentation of successful cash advances of at least 500 Rs. for all supported credit cards. The correct list of supported credits cards is American Express, Visa, Japan Credit Bank, Euro card, and MasterCard.

After test execution, a complete list of cash advance test results shows the following:

American Express allowed advances of up to 1,000 Rs. Visa allowed advances of up to 500 Rs. Eurocard allowed advances of up to 1,000 Rs. MasterCard allowed advances of up to 500 Rs.

How exit criteria are determined for above scenario? 17. A company recently purchased a commercial off-the-shelf application to automate their

bill-paying process. They now plan to run an acceptance test against the package prior to putting it into production. Which is the most likely reason for testing?

18. Given the following fragment of code, how many tests are required for 100% decision coverage? if width > length then biggest_dimension = width if height > width then biggest_dimension = height end_if else biggest_dimension = length if height > length then biggest_dimension = height end_if end_if

19. Analyse the following highly simplified procedure: Ask: “What type of ticket do you require, single or return?” IF the customer wants ‘return’ Ask: “What rate, Standard or Cheap-day?” IF the customer replies ‘Cheapday’ Say: “That will be 11.20 Rs.″ ELSE Say: “That will be 19.50Rs.″ ENDIF ELSE Say: “That will be 9.75Rs.″ ENDIF

Now decide the minimum number of test cases that are needed to ensure that all the questions have been asked, all combinations have occurred and all replies given. Multiple Choice Questions

1. Who is the test personnel whose focus is on performing static and dynamic analysis?

a. Technical test analyst b. Domain test analyst c. Tester d. Test Manager

Page 3: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 3

2. Where is comprehensive assessment managed?

a. Test closure activities level b. Evaluation of exit criteria and reporting level c. Test implementation and execution level d. Test Analysis and Test Design level

3. Who are the test personnel that apply tools for efficiency testing such as performance

and analysis? a. Test manager b. Tester c. Domain test analysis d. Technical test analysis

4. Industry standards often apply to which type of system?

a. Safety-critical systems b. Real-time embedded system c. System of systems d. None of these

5. Product risk is related to _______________.

a. Control of the test project. b. The test object. c. A single test item. d. A potential negative outcome.

6. Whose responsibility is related to risk management?

a. Test manager b. Domain test analysis c. Tester d. Technical test analysis

7. Ensuring that test design starts during the requirements definitions phase is important to

enable which of the following test objectives? a. Preventing defects in the system. b. Finding defects through dynamic testing. c. Gaining confidence in the system. d. Finishing the project on time.

8. Input and output specifications are part of which document?

a. Test Closure Activities b. Test implementation and Test execution c. Test planning test control d. Test analysis and design e. Exit criteria and reporting

9. Release notes and defect report is maintained in which document?

a. Test item document b. Test Log

Page 4: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 4

c. Test summary report d. Test incident report

10. How to run a set of test cases is explained in which document?

a. Test case specification b. Test Procedure c. Test incident report d. Test log

11. In which document describe in IEEE 829 would you find instructions for the steps to be

taken for a test including set-up, logging, environment and measurement? a. Test Plan b. Test design specification c. Test case specification d. Test procedure specification

12. Put the test cases that implement the following test conditions into the best order for

the test execution schedule, for a test that is checking modifications of customers on a database.

1. Print modified customer record. 2. Change customer address: house number and street name. 3. Capture and print the on-screen error message. 4. Change customer address: postal code. 5. Confirm existing customer is on the database by opening that record. 6. Close the customer record and close the database. 7. Try to add a new customer with no details at all.

a. 5, 4, 2, 1, 3, 7, 6 b. 4, 2, 5, 1, 6, 7, 3 c. 5, 4, 2, 1, 7, 3, 6 d. 5, 1, 2, 3, 4, 7, 6

13. Which document contains information that need to locate and install the software that

is going to be tested? a. Test item transmittal report b. Test Log c. Test Summary report d. Test case specification

14. Test deliverables information belongs to which document?

a. Test Summary report b. Test plan specification c. Test design specification d. Test case specification

15. A test team consistently finds between 90 % to 95 % of the defects presents in the

system under test. While the test manager understands that this is a good defect-detection percentage for her test team and industry, senior manager and executives remain disappointed in the test group, saying that the test team missed too many

Page 5: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 5

bugs. Give that the user are generally happy with the system and that the failures which have occurred have generally been low impact, which of the following testing principles is most likely help the tester manager to explain to these managers and executives why some defects are likely to be missed ?

a. Exhaustive testing is impossible. b. Defect clustering. c. Pesticide paradox. d. Absence-of-errors fallacy.

True False

1. Test analyst adds specialty into tester role. 2. Technical test analyst serves more business-oriented approach. 3. ISTQB shortens the name of technical analyst to plain test analyst. 4. Marathon example is a safety-critical system. 5. Safety-critical systems require more rigorous testing. 6. Risk management is the responsibility of test analyst. 7. Never trust a user to stay on the primary path. 8. Use cases are only valuable if they reflect realistic usage scenarios. 9. Bigger is better for orthogonal arrays, at least in terms of test case reduction. 10. State diagrams/tables help visualization for the tester. 11. Decision tables are helpful to clarify combinations of conditions. 12. Boundary value analysis only works on ordered partitions. 13. Partitions exits in many places to save testing time through find it out. 14. Equivalence partitions significantly reduce the numbers of tests based on its need. 15. Don’t overlook the invalid partitions while testing the valid partitions. 16. If we don’t learn from our mistakes, we are very likely to do the same wrong things in

the next project. 17. Start static testing as soon as you have something to read. 18. Testing strategies are influenced by the type of system under test. 19. The marathon is an example of systems of systems. 20. System integration testing play a critical role. 21. If you are the master of more technique than you can overcome more testing challenges. 22. Structured-based techniques increase coverage levels. 23. Structural testing will not detect a missing requirement. 24. Structural techniques can’t apply on code. 25. Condition determination testing reduces the number of test cases. 26. There are dangers in using path coverage testing. 27. Targeting specific bugs can help us to focus on testing efforts.

Fill in the blanks

1. Software that needs to function in _________ is often “embedded” within a

Page 6: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 6

hardware environment.

2. Normally the criticality of a project is estimated as a part of the project’s ________ study. 3. Determining usage scenarios and testing accordingly can be achieved through ______testing. 4. Using a graphical notation to show the test conditions and combinations addressed by the

test cased is achieved through _________ method. 5. ___________ determines the combinations of configurations to be tested. 6. System of system is developed on _____________________concept. 7. System of system provides ____________ which plays critical role at intersystem level. 8. Safety-critical systems require more _____________testing. 9. Feature pass/fail criteria applied at ____________stage. 10. Domain test analyst is also referred as _____________. 11. Tester need a plan of ____________ and need to prepare for the test, which is not_________________

.but is ________________ and allows risk-based decision about the outcome. 12. Tester must make a ______________ evaluation, __________ the test outcome and report factual

observations about the test. 13. Tester need to check against requirements to carry out particular task _______________. 14. Tester are not evaluating for perfection but for meeting ________________________ of the

attributes required to pass the test. Specification-Based, Structure-Based, Defect-Based Testing Techniques

Unit – 2 Short Questions

1. Which information from SRS is used by Specification based testing? 2. Enlist the forms of specifications which are used by tester. 3. Who uses specification-based techniques? 4. What is boundary value? 5. State the purpose of state transition testing. 6. What is the coverage criteria for equivalence partition? 7. Define coverage criteria for BVA. 8. What is decision table testing? 9. State the usage of coverage criteria for decision table testing. 10. Define coverage criteria for cause-effect graph. 11. What is all pair testing/orthogonal array? 12. Define coverage criteria for all pair testing/orthogonal array. 13. Define coverage criteria for state transition table. 14. What is classification tree? State the coverage criteria for classification tree. 15. What is tested using use case? 16. Which paths are considered in use case testing? 17. What is the major advantage of structure-based techniques? 18. Define: Statement testing.

Long Questions

Page 7: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 7

1. Write a brief note on equivalence partitioning with example. 2. Which are the strength and weakness of equivalence partitioning? 3. If you take the train before 9:30 am or in the afternoon after 4:00 pm until 7:30 pm,

you must pay full fare. A saver ticket is available for trains between 9:30 am and 4:00pm, and after 7:30 pm. What are the partitions and boundary values to test the train times for ticket types? Which are valid partitions and which is invalid partition? What are the boundary values? Derive test cases for the partition and boundaries.

4. Explain Boundary value analysis with its strength and weakness in detail. 5. How does boundary value analysis improve the performance of equivalence

partitioning technique? 6. Assume you are a tester working on a banking project to upgrade an existing

automated teller machine system to allow customer to obtain cash advances from supported credit cards. The system should allow cash advances from 20 dollar to 500 dollars, inclusively, for all supported credit cards. The correct list of supported credit cards is American Express, Visa, Japan Credit Bank, Euro card, and MasterCard. Create a test case for the above scenario for Equivalence Partition.

7. Explain equivalence partitioning for selection of test data. 8. Explain decision table in brief with an appropriate example. 9. If you hold an ‘over 60s’ rail card, you get a 34% discount on whatever ticket you

buy. If you are traveling with a child (under 16),you can get a 50% discount on any ticket if you hold a family rail card, otherwise you get a 10% discount. You can only hold one type of rail card. Produce a decision table showing all the combinations of fare types and resulting discounts and derive test cases from the decision table.

10. Assume you are a tester working on a banking project to upgrade an existing automated teller machine system to allow customer to obtain cash advances from supported credit cards. The system should allow cash advances from 20 dollar to 500 dollars, inclusively, for all supported credit cards. The correct list of supported credit cards is American Express, Visa, Japan Credit Bank, Euro card, and MasterCard. The user interface starts with a default amount of 100 dollars for advances, and the ATM keypad is sued to increase or decrease that amount in 20-dollar increment. Create a test case for the above scenario for Boundary Value Analysis.

11. What are the strength and weakness of decision table? 12. A website shopping basket starts out as empty. Purchases are selected, they are

added to the shopping basket. Items can also be removed from the shopping basket. when the customer decides to check out, a summary of the items in the basket and the total cost are shown, for the customer to say whether this is OK or not. If the contents and price are Ok, then you leave the summary display and go to the payment system. Otherwise you go back to shopping. Produce a state diagram showing the different states and transactions. Define a test, in terms of the sequence of states, to cover all transactions. Produce a state table. Give an example test for an invalid transaction.

13. Explain Classification Tree. Draw configuration Data Table, Configuration diagram

Page 8: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 8

for Configuration data table from given configuration tree.

14. Explain the importance of state transition tables in testing with a valid example. 15. Discuss the strength and weakness of state transition diagrams. 16. A vending machine dispenses either hot or cold drinks. If you choose a hot drink, it

asks if you want milk, then it asks if you want sugar, then your drink is dispensed. Draw a control flow diagram for this example. Give the following tests, What is the statement coverage achieved? What is

the decision coverage achieved? o Test 1: Cold Drink. o Test 2: Hot drink with milk and sugar.

What additional tests would be needed to achieve 100% statement coverage? What additional tests would be needed to achieve 100 % decision coverage?

17. Explain the procedure of orthogonal array with an example. 18. Write strength and weakness of orthogonal Array. 19. Explain classification tree in detail with a real world example. 20. Write short note on use case testing. 21. Describe the benefits and drawbacks of Structure-Based Techniques. 22. Assume you are a tester working on a banking project to upgrade an existing

automated teller machine system to allow customer to obtain cash advances from supported credit cards. The system should allow cash advances from 20 dollar to 500 dollars, inclusively, for all supported credit cards. The correct list of supported credit cards is American Express, Visa, Japan Credit Bank, Euro card, and MasterCard. The user interface starts with a default amount of 100 dollars for advances, and the ATM keypad is sued to increase or decrease that amount in 20-dollar increment. Create a Decision table for given scenario.

23. Write the applications of Structure-Based Techniques. 24. Assume you are a test analyst working on a project to create a programmable

thermostat for home use to control central heating, ventilation, and air conditioning (HVAC) system. You want to test the ability of the thermostat to properly interact with the central HVAC unit. At any given moment, the HVAC unit is in either an off state or an on state. The thermostat can send the HVAC unit either a start event or a

Page 9: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 9

state and it receives a stop event, it will always deactivate and display an “idle” message. If the unit is in an off state and it receives a start event, it will activate and display an active message if all conditions are normal. However, if the unit is in an off state and it receives a start event, it might fail to activate under one of three condition :

No power to the HVAC unit, the compressor, or other component. A failure of the HVAC unit, the compressor, or the other component. To prevent damage to the HVAC unit, the compressor, or other component.

If it fails to activated, it displays an error code associated with the condition that caused the failure to activate. Draw decision table for the given scenario.

25. Discuss the criteria used for selecting the Structure-Based Techniques. 26. Assume you are a test analyst working on a project to create a programmable

thermostat for home use to control central heating, ventilation, and air conditioning (HVAC) system. In addition to the normal HVAC control functions, the thermostat also has the ability to download data to a browser-based application that runs on PCs for future analysis. You are planning to do some compatibility testing of application and feature. You identify the following factors and, for each factor, the following options:

Supported PC/thermostat connections: USB and Bluetooth. Supported operating system: Windows 2000, Windows XP, Windows Vista,

Mac X, and Linux. Supported Browser: Internet Explorer, Firefox, Opera

Draw configuration data, classification tree, and configuration diagram for configuration data.

27. Write a short note on Defect-Based Testing Techniques.

Multiple Choice Questions

1. In equivalence portioning, we search for _____________ that will be handled

identically and put them together into a partition. a. test manager b. domain test analysis c. test conditions d. technical test analysis

2. Which of the following is a typical defect that equivalence partitioning would

identify? a. Improper handling of sequences of events.

Page 10: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 10

b. Improper handling of combinations of conditions. c. Improper handling of large and small values. d. Improper handling of classes of inputs.

3. ___________in equivalence partitioning testing is determined by the number of

tested partitions divided by the total number of partitions, but partitions can exist in many places.

a. coverage b. test cases c. test conditions d. test plan

4. BVA stands for ___________________________.

a. Boundary Vector Array b. Basic Value Array c. Boundary Value Analysis d. Boundary Value Array

5. Boundary values are those values or conditions that occur on the edges of the

_____________. a. array b. partitions c. class d. region

6. Which of the following is a typical defect that boundary value analysis would

identify? a. Improper handling of sequences of events. b. Improper handling of combinations of conditions. c. Improper handling of large and small values. d. Improper handling of classes of inputs.

7. _____________graphing is a graphical representation of the testing effort showing

the various possible “cause” scenarios with the resulting effect. a. Call graph b. Cause-effect c. Control-effect d. Classification trees

8. Which of the following is a typical defect that decision table testing would

identify? a. Improper handling of sequences of events. b. Improper handling of combinations of conditions. c. Improper handling of large and small values. d. Improper handling of classes of inputs.

9. Why are both specification-based and structural-based testing techniques useful?

Page 11: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 11

a. They find different types of defect. b. Using more techniques is always better. c. Both find the same types of defects. d. Because specifications tend to be unstructured.

10. The purpose of _____________testing is to ensure that the software can move correctly

from state to state and that invalid state transition attempts are prevented. a. performance b. all-pair c. acceptance d. state transition

11. _____________testing looks at taking pairings of the options, eliminating the

combinations that are impossible or unlikely to occur, and testing all realistic pair combinations.

a. performance b. all-pair c. acceptance d. state transition

12. __________________provide a graphical representation of the combinations of conditions to be tested.

a. performance b. all-pair c. acceptance d. state transition

13. ____________ are oriented toward transactions rather than functional areas. a. Use case testing b. statement testing c. orthogonal testing d. state transition testing

14. ____________ designed to tests that cause executable statements to be executed at least once.

a. Use case testing b. statement testing c. orthogonal testing d. state transition testing

15. Which of the following is a typical defect that state-based testing would identify? a. Improper handling of sequences of events. b. Improper handling of combinations of conditions. c. Improper handling of large and small values. d. Improper handling of classes of inputs.

16. In condition testing, the individual conditions (e.g., x>1) are sometimes called ____________ because they are the simplest form of code that can result in a “true” or a “false” outcome.

a. paired conditions

Page 12: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 12

b. logical conditions c. partial conditions d. semi-partial conditions

17. _________________testing has closed the potential weakness of simple condition

testing but at the expense of more test cases and the potential making of defects. a. Use case testing b. Statement testing c. Multiple condition testing d. State transition testing

18. ______________covers the independent paths through our code with test cases.

a. Use case testing b. Path testing c. Multiple condition testing d. State transition testing

19. _____________________test techniques derive the test conditions and test cases from the

system or software requirements specifications. a. Specification-based testing b. Structure testing c. Functional testing d. Black box testing

20. What is a key characteristic of structure-based testing techniques?

a. They are mainly used to assess the structure of a specification. b. They are used both to measure coverage and to design tests to increase

coverage. c. They are based on the skills and experience of the tester. d. They use a formal or informal model of the software or component.

21. There are also _____________partitions, which are the partitions that contain values

that should be considered “invalid” by the software being tested. a. valid b. invalid c. partial d. broken

22. _____________can also be made for sets of discrete items, in which case the partition

would be either in the set or out of the set. a. Partitions b. Region c. Coverage d. Boundaries

23. _________________reduces the number of tests we need to run.

a. Boundary Value Analysis

Page 13: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 13

b. All-pair testing c. Equivalence partitioning d. Static analysis

24. ____________exists everywhere in the software, not just on the input values.

a. Partitions b. Region c. Coverage d. Boundaries

25. Coverage in ____________________________ testing is determined by the number of

distinct boundary values that are tested divided by the total number of boundary values.

a. Boundary Value Analysis b. All-pair testing c. Equivalence partitioning d. Static analysis

26. Which of the following would be an example of decision-table testing for a

financial application applied at the system-test level? a. A table containing rules for combinations of inputs to two fields on a

screen. b. A table containing rules for interfaces between components. c. A table containing rules for mortgage application. d. A table containing rules for chess.

27. Which of the following could be a coverage measure for state transition testing?

1. All states have been reached. 2. The response time for each transaction is adequate. 3. Every transaction has been exercised. 4. All boundaries have been exercised. 5. Specific sequences of transitions have been exercised.

a. 3, 4 and 5 b. 1, 3, 4 and 5 c. 2,3 and 4 d. 1, 3 and 5.

28. Postal rates for ‘light letters’ are 25p up to 10g,35p up to 50g plus an extra 10p for

each additional 25g up to 100g.Which test inputs would be selected using equivalence partitioning?

a. 8, 42, 82, 102 b. 4, 15, 65, 92, 159 c. 10, 50, 75, 100 d. 5, 20, 40, 60, 80

29. Which of the following could be used to assess the coverage achieved for

specification-based test techniques? 1. Decision outcomes exercised.

Page 14: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 14

2. Partitions exercised. 3. Boundaries exercised. 4. State transitions exercised. 5. Statement exercised.

a. 1, 2 4 or 5. b. 2, 3 or 4. c. 1, 3 or 5. d. 2, 3, 4 or 5.

30. Which of the following would structure-based test design techniques be most

likely to be applied to? 1. Boundaries between mortgage interest rate bands. 2. An invalid transaction between two different arrears statuses. 3. The business process flow for mortgage approval. 4. Control flow of the program to calculate repayments.

a. 2, 3 and 4. b. 2 and 4 c. 3 and 4 d. 1,2 and 3

31. Use case testing is useful for which of the following?

1. Designing acceptance tests with users or customers. 2. Making sure that the mainstream business processes are tested. 3. Finding defects in the interaction between components. 4. Identifying the maximum and minimum values for every input field. 5. Identifying the percentage of statements exercised by sets of tests.

a. 1, 2 and 3 b. 2, 4 and 5 c. 1, 2 and 4 d. 3, 4 and 5

32. Which of the following statements about the relationship between statement

coverage and decision coverage is correct ? a. 100 % decision coverage is achieved if statement coverage is greater than

90%. b. 100 % statement coverage is achieved if decision coverage is greater than

90%. c. 100 % decision coverage always means 100 % statement coverage. d. 100 % statement coverage always means 100 % decision coverage.

33. If you are flying with an economy ticket, there is a possibility that you may get

upgraded to business class, especially if you hold a gold card in the airline’s frequent flier program. If you don’t hold a gold card, there is a possibility that you will get ‘bumped’ off the flight if it is full and you check in late. This is shown in figure with numbered.

Page 15: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 15

Three tests have been run: Test 1: Gold card holder who gets upgraded to business class. Test 2: Non-gold card holder who stays in economy. Test 3 : A person who is bumped from the flight What is the statement coverage of these tests?

a. 60 % b. 70% c. 80% d. 90 %

34. Which of the following is a typical defect that classification tree testing would

identify? a. Improper handling of sequences of events. b. Improper handling of combinations of conditions. c. Improper handling of large and small values. d. Improper handling of classes of inputs.

35. Which of the following is a typical defect that use case would identify?

a. Improper handling of large and small values. b. Improper handling of combinations of conditions. c. Improper handling of typical workflow. d. Improper handling of classes of inputs.

36. Which of the following is a typical defect that pairwise testing would identify?

a. Improper handling of sequences of events. b. Improper handling of typical workflows. c. Improper handling of configuration combinations. d. Improper handling of classes of inputs.

Page 16: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 16

37. Which of the following statements captures a key difference between

specification-based and defect-based test design techniques? a. Specification-based techniques derive tests from the structure of the

system, while defect-based techniques derive tests from what is known about defects.

b. Defect-based techniques derive tests from the structure of the system, while specification-based techniques derive tests from the behavior of the system.

c. Defect-based techniques derive tests from the structure of the system, while specification-based techniques derive tests from an analysis of the test basis.

d. Defect-based techniques derive tests from what is known about defects, while specification-based techniques derive tests from an analysis of the test basis.

38. If we say that a set of tests has achieved 100 % structural decision coverage on a

particular module in a program. What does that mean? a. That all bugs present in that module were necessarily revealed by those

tests. b. That every control flow branch had been executed at least once by those

tests. c. That every dataflow in that module was exercised at least once by those

tests. d. That every path through that module was exercised at least once by those

tests.

39. Set-use pairs are identified during which of the following static analysis activities? a. Control flow analysis. b. Data flow analysis. c. Coding standards analysis. d. Cyclomatic complexity analysis.

40. The only drawback of doing boundary value analysis is the risk of putting too

much emphasis on the _________ and not enough on the rest of the functionality. a. edges b. partitions c. class d. region

Fill in the blanks

1. __________in decision table testing is determined by the number of combinations of

conditions covered divided by the maximum number of condition combinations. 2. _______________are good for taking complicated business rules and sorting out the

conditions we need to create to verify all the testable results. 3. ___________are easier to build if you have well-defined business rules and

requirements.

Page 17: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 17

4. ______________are sometimes shown as models or diagrams that can be documented

using state transition tables. 5. ________________is primarily used for embedded software but it certainly can be

used for application software. 6. To minimize risk with the ____________techniques, it’s important to review the

selected combinations and augment as needed with knowledge of customer preferences, previous failure information, and known common configurations.

7. The use of classification trees has one big advantage over combinatorial techniques such as all-pair is __________________.

8. ____________are scenarios that depict actual usage of the software in the customer environment.

9. One of the big advantages of ______________techniques is their ability to supplement the tests designed using black-box techniques to increase levels of coverage and increase testing effectiveness.

10. ________result from decision points in the code, where each decision point can have a true or false outcome.

11. _____________in decision testing is determined by the number of decision outcomes executed as a percentage of the total number of decision outcomes.

12. In condition testing, two conditions are combined with a ____________operators. 13. The objective of ___________________testing is to only consider the condition

combinations if each of the conditions has an impact on the result. 14. __________________testing relies on the documentation. 15. ___________are not limited to ranges. 16. Collapsed _________________are a risk-based technique by which we reduce the full

decision table that has recorded all possible combinations and concentrate on the most likely and highest-risk conditions and outcomes and remove combinations that are simply not possible.

17. Coverage for _____________testing is usually determined based on coverage of the requirements.

18. A good ____________is an easy way to determine all the possible conditions to be tested and make a more accurate assessment of coverage.

19. Coverage in _______________is determined by the percentage of all valid transitions exercised during the test.

20. In state transition testing, if there are single transitions, this is also known as ________coverage.

Experience-Based Testing, Analysis Techniques, Testing Software Characteristics Unit – 3

Short Questions

1. List out the major experience based testing techniques. 2. How experience based testing differ from defect based testing? 3. Define error guessing. 4. What is the basic purpose of error guessing testing? 5. Which items are included in checklist?

Page 18: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 18

6. How check list are prepared? 7. What are the advantages of check list based testing? 8. When exploratory testing is performed? 9. Under which situation exploratory tester performs testing? 10. 'Exploratory testing is interactive and creative' justify the statement. 11. Which areas of software testing are covered in attack testing? 12. What are the advantages of software analysis? 13. Write two main analysis techniques. 14. Define static analysis. 15. Which analysis technique is used to test the code or procedure which is not executed? 16. Which kind of analysis technique is required for testing code which is execution? 17. List out the main static analysis techniques. 18. Define dead code. 19. What kind of defects can be found through control flow analysis? 20. Which anomalies are detected by data flow analysis technique? 21. What is fan-in and fan-out? 22. When dynamic analysis is performed? 23. What types of defect can be found by dynamic analysis? 24. What is pointer? 25. What is the use of malloc?

Long Questions

1. Explain Error guessing technique in detail. 2. Explain exploratory testing with example. 3. Describe the experience based testing technique? State its strength and weaknesses. 4. Discuss the strength and weakness of experience based testing. 5. Narrate major benefits of static analysis. 6. Discuss the limitations of static analysis. 7. Explain Control flow analysis with example. 8. Explain data flow analysis with example. 9. Write a short note on code metrics. 10. What are the benefits of call graph? 11. Discuss the benefits and limitations of dynamic analysis. 12. What do you mean by memory leaks? How leaks are found? 13. Explain the states of the memory with diagram. 14. What are the problems related to pointers? 15. Compare static and dynamic call graph using diagram. 16. List out the software quality attributes for test analyst. 17. Which ISO standard describes the quality attributes? 18. List out the software quality attributes for technical test analyst. 19. Describe checklist-based Testing. 20. Explain Software Quality Attributes for test analyst and technical test analyst.

Multiple Choice Questions

Page 19: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 19

1. Error guessing technique based on ____ testing.

a. Structure based b. Specification based c. Experience based d. None

2. Which of the following is not a static testing technique? a. Error guessing b. Walkthrough c. Data flow analysis d. Inspections

3. Cyclomatic Complexity is based on _______________ paths. a. Dependent b. Independent c. Both a and b d. None

4. _____ focus on the data variable of the code a. Data flow analysis b. Control flow analysis c. Dynamic Analysis d. All

5. ____ can show the interfaces of complete system architecture a. GUI interface b. Call Graphs c. Data Flow analysis d. Control flow analysis

6. Why error guessing and exploratory testing good to do? a. They can find defects missed by specification-based and structure-based techniques. b. They don’t require any training to be as effective as formal techniques. c. They can be used most effectively when there are good specifications. d. They will ensure that all of the code or system is tested.

7. How do experience-based techniques differ from specification-based techniques?

a. They depend on the tester’s understanding of the way the system in structured rather than on a documented record of what the system should do.

b. They depend on having older testers rather than younger testers. c. They depend on a documented record of what the system should do rather than on

an individual’s personal view. d. They depend on an individual’s personal view rather than o n a documented record

of what the system should do.

8. _____ can be improved by enabling better modularization of the design. a. Portability b. Usability

Page 20: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 20

c. Accuracy d. Maintainability

9. Given the state diagram in figure, which test case is the minimum series of valid transaction to cover every state?

a. SS-S1-S2-S4-S1-S3-ES b. SS-S1-S2-S3-S4-ES c. SS-S1-S2-S4-S1-S3-S4-S1-S3-ES d. SS-S1-S4-S2-S1-S3-ES

10. Performing ____ analysis requires that the software program is executed

a. Static b. Dynamic c. Technical d. All

11. Dynamic analysis tools can detect the following principal types of defects. a. Memory leak only b. Resource leak and pointer problems only c. Both a and b d. None

12. Error guessing coverage is usually determined based on the types of____ a. Defects b. Tools c. Software d. None

13. Checklist based testing is used by ___ testers who are using checklists to guide they’re testing. a. Technical b. Domain c. Experienced d. None

14. Coverage for exploratory testing can be very a. Difficult

Page 21: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 21

b. Easy c. Useful d. None

15. Crashing of operating system through malicious input code may expose sensitive information held in memory. This is an example for a software____. a. Bug b. Attack c. Complexity d. Performance

16. Which item is not covered in the scope of a static analysis? a. Procedures b. UML c. Memory leaks d. Architectural design

17. Static analysis only___ us of “suspicious” areas in our code.

a. Warns b. Solves c. Both a and b d. None

18. Control flow highlights___ complexity

a. Structural b. Architectural c. Cyclomatic d. All

19. Exploratory testing is used____ a. When we know every requirement b. There are little or no specifications and / or requirements. c. When you have all domain knowledge d. You have time to specify, script and test.

20. Common goal of exploration is

a. Probe for weak areas of the program b. Probe for all areas of program. c. Probe for structure of program d. Check the program.

21. What do you do in Charter? a. Define your mission b. Define notes c. Define testing steps d. Define test cases

22. Which of this is not a style of exploration?

Page 22: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 22

a. Hunches b. Interference c. Model d. Explore

23. A pointer is an address in _______memory that refers to the storage location of instructions, data and objects the program uses. a. ROM b. RAM c. Cache Memory d. Dynamic Memory

24. There are call graphs with two types of information. a. Virtual and Dynamic b. Static and Dynamic c. Virtual and Static d. All

25. Which of the following is NOT a white box technique? a. State transition testing b. Path testing c. Data flow testing d. Statement testing

26. What can static analysis NOT find? a. Memory leaks b. Unreachable (“dead”) code c. The use of variable before it has define d. Array bound violations

27. Defects in software can arise due to: a. Correct input not accepted b. Wrong input accepted c. Description incorrect & Parameters incomplete d. All of the above

28. Under the system and software architecture of defect____ are covered

a. Operating System calls b. Recovery c. Partitions d. All

29. Which of the following requirements is testable? a. The system shall be user friendly. b. The safety-critical parts of the system shall contain 0 faults. c. The response time shall be less than one second for the specified design load. d. The system shall be built to be portable.

Page 23: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 23

30. We split testing into distinct stages primarily because:

a. Each test stage has a different purpose. b. It is easier to manage testing in stages. c. We can run different tests in different environments. d. The more stages we have, the better the testing.

31. Which of the following is likely to benefit most from the use of test tools providing test Capture and replay facilities? a. Regression testing b. Integration testing c. System testing d. User acceptance testing

32. Error guessing:

a. Supplements formal test design techniques. b. Can only be used in component, integration and system testing. c. Is only performed in user acceptance testing. d. Is not repeatable and should not be used.

33. Which of the following is NOT true of test coverage criteria? a. Test coverage criteria can be measured in terms of items exercised by a test suite. b. A measure of test coverage criteria is the percentage of user requirements covered. c. A measure of test coverage criteria is the percentage of faults found. d. Test coverage criteria are often used when specifying test completion criteria.

34. What statement about static analysis is true ? a. With Static analysis, defects can be found that are difficult to find with dynamic testing. b. Compiling is not a form of static analysis. c. When properly performed, static analysis makes functional testing redundant. d. Static analysis finds all faults.

35. In prioritizing what to test, the most important objective is to:

a. Find as many faults as possible. b. Test high-risk areas. c. Obtain good test coverage. d. Test whatever is easiest to test.

True OR False

1. Exploratory testing involves simultaneously learning, planning, running tests, and

reporting. 2. A common goal of exploration is used to find out weak areas of the program. 3. We do exploratory testing when there are little or no specifications of requirements. 4. Executing and evaluating the tests are concurrent tasks. 5. Control flow that enters a loop but can never exit is known as jump in the loop. 6. C and C++ languages are more prone to the defects as compared to Java. 7. Pointers that point out memory usage problems are sometimes referred as wild pointers.

Page 24: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 24

8. Overwriting memory initially does not affect the program’s functioning but it affect at time of modification.

9. The test analyst expects accuracy and suitability of memory. 10. The architecture of defective system covered system call. 11. Static analysis can be used as a preventive measure with appropriate process in place. 12. Absence of comments, before coding elements such as loops and decision points is a type of

good coding. 13. Coding standards may also include standard software libraries instead of new

developments. 14. Programming language-specific issues, such as failing to release (“delete”) main memory

dynamically reserved (with “new”) in C++ is not a matter of issue as per coding standards.

Fill in the blanks

1. Error guessing is commonly used in risk analysis to ________ where errors are likely to occur

and to assign a higher risk to the error-prone areas. 2. ____________as a testing technique is employed by the tester to determine the potential errors

that might have been introduced during the software development and to devise methods to detect those errors as they manifest into defects and failures.

3. Checklist based testing is used by experienced testers who are using _________to guide their testing.

4. Explanatory tests are planned and usually guided by a __________ that provides a general description of the goal of the test.

5. Coverage for ______________is usually measured by determining if all the potentially vulnerable interfaces have been tested.

6. ______________testing techniques require good knowledge of the software being tested. 7. Risk analysis is supported by ______________primarily by the metrics that static analysis can

provide. 8. The biggest limitation of ____________is its ability to find actual defects. 9. _____________examines structure of the software to be tested. 10. Data flow analysis focuses on the _____________in code. 11. _____________help us see the big picture of our programs architecture. 12. Performing __________________requires that the software program is executed. 13. The big advantage with _____________is its ability to find defects that would otherwise be very

difficult and expensive to find with other forms of testing. 14. Tool based ________________can be highly cost effective. 15. Dynamic analysis tools are dependent upon the ________________language used for your

application’s implementation.

Functional, Usability and Accessibility, Efficiency Testing Unit – 4

Short Questions

1. State the term “efficiency testing”. 2. Enlist all characteristics of efficiency testing according to ISO 9126 quality model? 3. What is operational profile? 4. List out different types of test that are applied in efficiency testing.

Page 25: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 25

5. Define: performance testing. Give an example. 6. What is load testing? 7. What are the purposes of load testing? 8. List out principal sources of load that software receives during test. 9. Write objectives of load testing. 10. Define: stress testing. 11. Write examples of stress testing. 12. List out objectives of stress testing. 13. Define the given terms :

a. Spike testing b. Bounce testing

14. What is scalability testing? 15. Give examples of scalability testing. 16. Write primary objective of resource utilization testing. 17. Give examples for measuring efficiency. 18. What is Usability Testing? 19. Express the Accessibility Testing. 20. Write all goals of Usability Testing. 21. List out the Test Process for Usability and Accessibility Testing. 22. Write types of defects that occur during performing efficiency testing. 23. From where we can get the requirements of efficiency testing? 24. When SUMMI report will be generated? 25. What is WAAMI? 26. State the “penetration testing.” 27. Who does perform technical security testing? 28. Enlist out any two typical security threats. 29. What is SQL injection? 30. When we can say that XSS (Cross Site Scripting) perform in software. 31. SQL-injection has similarities with the input buffer overflow threat. Justify it. 32. List out sources of security threats. 33. Give any one point of Functional Security testing and Technical security testing 34. Write any two key differences between HTTP protocol and HTTPS protocol in Web

communication threat? Which one best for Web communication? 35. List out the Different static and dynamic testing elements in security testing? 36. Give one main feature of static analysis tools. 37. Which three principal steps are identified by development of security attacks? 38. What is Security Threats (Risk)? 39. List out any four fundamental security problem in the document technical reviews of

document.

Long Questions

Page 26: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 26

1. Discuss points which are considered to use efficiency testing tool. 2. Explain Accuracy testing with example. 3. Write a short note on Suitability testing. 4. “Functional testing is the corner stone of testing”. Give your comments for this statement. 5. Explain interoperability testing with example. 6. Discuss functional security testing with example. 7. Write a note on usability testing. 8. How accessibility testing perform? Explain it using example. 9. Describe the test process for Usability and Accessibility testing. 10. Discuss performance testing. 11. Express Load testing and its objective with example. 12. Discuss the main essential of Stress testing. Also write it objectives with example. 13. Explain scalability testing with example. 14. Clarify typical efficiency risks and types of defects occur during perform efficiency testing. 15. List all tools of efficiency testing and explain any two from it. 16. Explain activities that are performed during execution of efficiency tests. 17. Discuss Security analysis and design, execution, reporting and tools phase for security

testing.

Multiple Choice Questions

1. The primary aspects that sets load testing apart from other efficiency test types is

focus on a. Anticipated loads the system or s/w is required to handle. b. Explores areas beyond this anticipated range c. Providing sudden extreme loads on the system. d. None

2. It is the job of whom to ensure that scalability requirements are captured and

agreed on and that appropriate testing measures are defined a. Domain test analyst b. Functional test analyst c. Technical test analyst together with test manager d. Domain test analyst together with test manager

3. The technical test analyst will need to consider the objectives while measuring

efficiency is: a. Functioning of the module b. The required precision levels c. Ability of the system components d. The user who interact with the system

4. The cost associated with taking measurements:-

a. The costs of resources

Page 27: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 27

b. The costs of test manager c. None d. The costs of storing the results

5. The issue for planning efficiency testing a. Evaluation b. Test log identifiers c. Organizational issues d. Impact

6. Tools for efficiency testing a. Simulation needs b. Portable devices c. Financial consideration d. None

7. Step after planning for efficiency testing is done following activity occurs

a. Planning the load test criteria b. Executing efficiency testing c. Reporting the test d. None

8. The types of test applied at efficiency testing are a. Functional testing b. Structural testing c. Coverage testing d. Resources utilization

9. The objective of the load testing is

a. Measure response time to user input b. Ability of system components to handle multiple user acting in parallel c. Measurements to be taken d. The cost of taking those measure

10. Efficiency testing requirements are not often

a. Complete b. Untestable c. Totally absent d. None

11. The cost of testing organization of not owning testing infrastructure could start to outweigh

the benefits at ______ stage a. Production stage b. Pre-production stage c. Post production stage d. Reporting stage

12. A Type of functional Testing, which investigates the functions relating to detection

Page 28: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 28

of threats, such as virus from malicious outsiders. a. Security Testing b. Recovery Testing c. Performance Testing d. Functionality Testing

13. What is the motto of the security tester?

a. Identify the Risk b. Classify an Unauthorized work c. Know your enemy d. Both (b) and (c)

14. CVE stand for? a. Classify Value and Expose b. Common Value and Exposures c. Classify Vulnerabilities and Expose d. Common Vulnerabilities and Exposures

15. With which threat the user input is crafted is that the system performs database

manipulations not thought about by the system designer or programmer? a. Input Buffer Overflow b. SQL-Injection c. Both (A) and (B) d. Malicious Inputs

16. With which threat unconstrained user inputs that have been crafted by a malevolent user to exploit particular security vulnerabilities?

a. Input Buffer Overflow b. SQL-Injection c. Both (A) and (B) d. Malicious Inputs

17. In which testing will be aimed at finding defects in the system for allocating user

access right and seeking out incorrect implementation of rights in the application? a. Functional Security Testing b. Technical Security Testing c. Penetration Testing d. Exploratory testing

18. Blocking the application to permitted users threat are commonly used term is _______and by who can perform? a. Phishing , Technical test Analyst b. Cracking , Test analyst c. Denial of Service , Technical test d. Phishing , Test Analyst

Page 29: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 29

19. Security attacks may utilize a number of _________ and __________ testing techniques to

achieve their overall objectives? a. Symmetric and Nonsymmetrical b. System and Non System c. Systematic and Nonsystematic d. Both (a) and (c)

20. Which is not Source of typical threats can be detect from it? a. User Input b. Configuration System c. Operating System d. External Software

21. Which Specification-Based techniques may be useful in Systematic technique to

apply when designing tests for input buffer overflow? a. Boundary Value Analysis (BVA) b. Use Case Testing c. Equivalence Partitioning d. Both (a) and (b)

True OR False

1. Performance testing does not measure response times to user inputs. 2. Suitability testing doesn’t require knowledge of intend use. 3. The validity of accuracy testing depends on the correctness and detail of the specifications. 4. Functional testing focuses on identifying that the software does what it’s supposed to do. 5. The scope of the functional testing changes based on the level of the development cycle. 6. Interoperability testing is performing to verify that the software under test will function

correctly in all target environments. 7. Suitability testing is not used to verify that Set of functions is appropriate for their intended

specified tasks. 8. Security testing can be divided into functional and technical security testing. 9. Usability testing measures the suitability of the software to meet the needs of its users. 10. Efficiency testing looks at the ability of the software to accurately assist the user in

achieving specified goals within specified contexts of use. 11. Accessibility testing is done to determine the accessibility of the software to those with

particular requirements or restrictions in its use. 12. Accessibility testing considers local, national and industry-specific standards. 13. Satisfaction testing determines the software’s ability to satisfy the user in a particular

context of use. 14. Security testing requires knowledge and creativity. 15. Security specific risks do not need to be addressed at the planning stage. 16. OWASP stand for Open Applicable Security Project. 17. Buffer Overflow is the one of the worst Security violations recorded. 18. Many Security violations are only result from design.

Page 30: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 30

19. SQL- injection and buffer overflow has not any similarity between both or they are the different terminology.

20. Functional security testing focuses on finding exploitable vulnerabilities that would give malicious persons rights other than those allocated.

21. HTTPS protocol can be transfer information over the internet in text form. 22. Homegrown encryptions are not easily cracked. 23. Malicious code is receive from external source an as well as from input buffer overflow and

SQL-Injection. 24. Malicious person controlling that site to gain access to their personal information is known

as Hacking. 25. Security testing is not hacking. 26. Boundary Value Analysis technique is may be useful systematic to apply when designing

tests for input buffer overflow. 27. Combination of symmetric and non- symmetric techniques used to design good dynamic

security tests. 28. Fortify Source Code Analysis tool is consider as the Static analysis tool. 29. Security testing is not applies throughout the life cycle.

Fill in the blanks

1. _________________requires that we know how the software should behave in any situation and

that the response is correct. 2. Testing for __________is often considered testing for correctness. 3. Suitability testing is oriented toward the ability of the ______to work as is needed by the end

user, use cases and user scenarios are usually used to guide the testing. 4. ___________testing requires understanding the user’s situation, environment, and skill level. 5. ______________testing is done to verify if the software under test will function correctly in all

the intended target environment. 6. The degree of _____________is frequently determined by the use of industry standards for

communicating information like XML or the ability of the software to automatically reconfigure itself when it detects that it is running on a system that requires different parameters.

7. ________________covers a large range of areas and is designed to measure the effectiveness, efficiency, and satisfaction that will be recognized by the user when using the software.

8. Efficiency testing looks at how much effort and resources are required to achieve a ______. 9. Effectiveness testing looks at the ability of the software to __________and completely assist the

user in achieving specified goals within specified contexts of use. 10. Accessibility testing is done to determine the __________of the software to those with

particular requirements or restrictions in its use. 11. Satisfaction testing determines the software’s ________to satisfy the user in a particular

context of use. 12. Performance testing measures _______________to user inputs or other system inputs 13. The load we apply to a system or _________becomes stress when the load applied exceeds the

specified limits. 14. __________testing is a special sort of stress testing in which a sudden extreme load is placed

on the system. 15. Sudden load spikes can also occur on recovery from a ________________.

Page 31: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 31

16. _____________testing is performed when particular stakeholders such as business owners and operations departments need to know whether a system not only meets its efficiency requirements now but will continue to do so in future.

17. Resource utilization testing is typically conducted at the same time as load, stress, and _________testing.

Security and Reliability Testing Unit – 5

Short Questions

1. Define attack plan. 2. What is software attack? 3. What is buffer overflow attack? 4. What is reliability testing? 5. Define security. 6. How security test is planned? 7. What are the sources for gathering security issues? 8. Enlist the main security threats. 9. List out the Approaches to reliability testing? 10. List principle steps of reliability test specification? 11. What is maintenance testing? 12. List the principal activities performed in maintenance testing? 13. What is maintainability? 14. List out principle planning issues in maintenance? 15. What is adaptability? 16. State replacebility with respect to software testing. 17. What is installability? 18. Define: co-existence testing. 19. How failover handle in software testing? 20. What is backup and restore?

Long Questions

1. Explain in details approaches to establish fault tolerance? 2. Describe failover testing? 3. Demonstrate how backup and restore testing execute in System. 4. List all principal steps of reliability test specification? Explain it in brief. 5. Explain reliability growth model in brief. 6. Describe the tools which are used in security testing. 7. Explain the tools for security testing. 8. Demonstrate reliability testing tool with examples. 9. Write a short note on Reliability test execution. 10. Discuss the reliability test execution. 11. Explain security threats in brief. 12. What is reliability testing? Give example and discuss it. 13. Explain buffer overflow attack in brief. 14. List and explain the primary activities performed during reliability test planning?

Page 32: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 32

15. Explain the approaches to reliability testing?

Multiple Choice Questions

1. ____________describes the ability of the software product to perform its required

function understated conditions for a specified period time. a. Maintainability b. Reliability c. Portability d. Scalability

2. If recoverability tests are included in our approaches to reliability testing then

which of these testing objectives are follow? a. failover b. backup c. restore d. All of the above

3. Internal reliability is:

a. about how a single individual's scores remain identical. b. about the increase or decrease in scores over time. c. about the consistency of a measure taken at two different points in time. d. about how consistently all of the items in a scale measure the concept in

question.

4. Which one of these characteristics would you expect not to give high test-retest reliability?

a. Intelligence. b. Dyslexia. c. Religious beliefs. d. Attention.

5. Cronbach's alpha reliability is:

a. The correlation of half of the items with the total participants. b. The correlation of each item with the sum of the items. c. An average of all possible split-half reliabilities. d. None of these.

6. Complete the following statement. The better the internal reliability then:

a. The lower the maximum correlation of that test with any other variable. b. The higher the correlation between that measure and other variables. c. The more likely the test is measuring what it is intended to measure. d. None of these.

Page 33: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 33

7. COTS stands for. a. Commercial on-the-shelf software. b. Commercial on-the-shelf system. c. Commercial of-the-shelf software. d. Commercial of-the-shelf system.

8. SOA stands for.

a. Service-oriented architecture. b. Service-of architecture. c. Service-oriented application. d. Service-of application.

9. The design of our application’s architecture is a principal factor in determining.

a. Replaceability b. adaptability c. portability d. Security

10. Correlating between different versions of a test is known as what?

a. Test-retest reliability. b. Split-half reliability. c. Objectivity. d. Alternate forms reliability.

11. ______________and____________are closely related but subtly different.

a. Interoperability, adaptability. b. Interoperability, portability. c. Interoperability, maintainability d. Interoperability, security.

12. Which one is invalid statement?

a. Reliability and validity are not inherent characteristics of measures. b. Creating a new measure using item-analysis procedures would usually be

followed by assessing the reliability and validity of the measure. c. Reliability and validity should not be affected by the context and purpose of

the measure. d. A measure that is valid for one purpose may not be valid for another purpose.

13. __________can be applied to detect coding practices that are detrimental to

adaptability. a. Static analysis b. Dynamic analysis c. Simple search routines. d. Adapting

Page 34: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 34

14. __________Describes the ability of software system to function correctly with different alternatives software components.

a. Replaceability b. adaptability c. portability d. Security

15. The Motivation for requiring good software replacebility characteristics is similar to

those discussed earlier when considering__________. a. Replaceability b. adaptability c. portability d. Security

16. From the given category which of the category is useful to reliability growth models

a. Static growth models. b. Basic growth models. c. Logarithmic Poisson models. d. All of the above

17. Which of the principle activities performed in maintenance testing in SMLC?

a. Dynamic maintenance. b. Corrective maintenance. c. Adaptive maintenance. d. All of the above.

18. Which of the following is the sub attribute of maintenance testing?

a. Analyzability. b. Stability. c. Replacebility. d. Both a and b.

19. Which of the given option describes the ability of the software to be made ready for

use in its intended target environment a. Installability

b. Adaptability. c. Replacebility. d. None of these.

20. What can lead to poor analyzability?

a. Business logic that is not implemented. b. Software that is not in module style. c. Both a & b. d. None of these

Page 35: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 35

True OR False

1. Software that fails on average once a week is considered less reliable than software

that fails once month. 2. A reliability growth model is effectively nothing more than a prediction of failures to

be expected over time. 3. We could easily use a different software component without first ensuring that it

“understood” The meanings of all the control parameter passed to it. 4. Tests are executed when specific events occur, such as major software release the

completion of a time-box. 5. Result reliability tests are best compared graphically with the reliability growth

model in use. 6. Technical test analysts should have an awareness of some of the issues that affected

on replacebility. 7. If the code or architecture has been designed or implemented from the outsets with

only the initial operational environment in mind, it will be easy to adapt to new one. 8. Many projects spend most of their time in a post- delivery SMLC rather than the pre-

delivery SDLC. 9. Stability relates to the effort required to perform improvements or to fix defects. 10. High level of semantic or structural software complexity can decrease the effort

require to make changes.

Fill in the blanks

1. The__________word of our software can be considered under the two aspects, which are

“Failover capability and Restore capability. 2. MTBF stands for___________ 3. MTTR stands for___________ 4. OAT stands for___________ 5. Achieved levels of reliability are reported after___________. 6. We need to identify combination of the different_____________and____________systems

configuration that represent potential target environment for the software applications. 7. When we talk about reliability, we therefore always need to think of the two factors

___________and____________ 8. ___________testing is about testing the changes to an operational system of the impact of

change environment to an operational system.

9. _____________relates to the effort require to diagnose defects or to identify parts of the software system requiring change.

10. ____________ is a likelihood that unexpected side effects occur as a result of making changes to the software.

Maintainability and Portability Unit – 6

Short Questions

Page 36: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 36

1. Which test approach is used to maintenance testing? 2. Define: analyzability. 3. Enlist out sub attributes of maintainability? 4. What is changeability? 5. State the term “stability” with respect to Software Testing. 6. What is testability? 7. Enlist all poor reason of maintainability. 8. Write individualities of portability. 9. What is software development environment? 10. Give main objective of adaptability testing. 11. What are the replacebility risks for marathon example? 12. Justify your answer for the given statement “tight coupling occurred after interface”. 13. Give a single reason for the statement “Installability has given a low risk issue rate”. 14. Why installation is procedurally complex? 15. Write down installation test mechanism. 16. What is procedure testing? 17. Why software reinstallation is requiring? 18. What is usability test? 19. Who will impose new version of software? 20. What is security test? 21. Define: functionality test. 22. What do you mean by co-existence? 23. When co-existence test normally performed? 24. What are the adaptability risks for marathon example? 25. How we can assess replacebility? 26. What are the installability risks for marathon example?

Long Questions

1. Why maintenance testing is required? Explain in details. 2. What is maintainability? Why it is required? 3. Explain problem areas that affecting software analyzability. 4. What is replacebility? Explain in brief with example. 5. Discuss all approaches for maintenance testing as an activity 6. Which are the problem areas affecting software changeability, stability and testability? 7. What is adaptability? Explain in brief with example. 8. Define: co-existence with suitable example. 9. List all reason for poor adaptability. Explain any three from it with example. 10. Explain adaptability testing in brief. 11. What are the considerations in replacebility? 12. Write a short note on replacebility testing. 13. Which are risk factors for installability? Explain any two from it. 14. What is installability? Explain in brief with example. 15. Explain installability testing in brief. 16. Describe briefly Co-Existence testing. 17. How errors are handle in software testing. Explain using example. 18. What are the other tests combined with installation testing?

Page 37: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 37

19. Express adaptability and replacebility for marathon race. 20. Explain installability and co-existence for marathon example.

Multiple Choice Questions

1. ____________testing is about testing the changes to an operational system or the

impact of a changed environment to an operational system. a. Replaceability b. Maintenance c. Installability d. Adaptability

2. ____________relates to the effort required to diagnose defects or to identify parts of

the software system requiring change. a. Analyzability b. Changeability c. Installability d. Adaptability

3. _______________relates to the effort required to actually fix defects or make

improvements. a. Analyzability

b. Changeability c. Stability d. Testability

4. ______________is the likelihood that unexpected side effects occur as a result of making

changes to the software. a. Analyzability b. Changeability c. Stability d. Testability

5. ____________describes the effort required for testing changed software.

a. Analyzability b. Changeability c. Stability d. Testability

Page 38: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 38

6. The ____________in which a software application operates can be made up of the

hardware platform and a variety of different types of software. a. environment b. region c. surface d. area

7. ______________ describes the ability of software systems to function correctly with

different alternatives software components. a. Replaceability b. Maintenance c. Installability d. Adaptability

8. The design of our application’s architecture is a principal factor in determining

__________. a. Replaceability b. Maintenance c. Installability d. Adaptability

9. ____________describes the ability of the software to be made ready for use in its

intended target environment. a. Replaceability b. Maintenance c. Installability d. Adaptability

10. In risk based approaches to testing, we consider the risk factors and apply testing

measures to mitigate the ______. a. process b. effort c. procedure d. risk

11. ____________can be prone to a range of specific error conditions.

a. Replacement b. Maintenance c. Installations d. Adaption

12. The quality of _________procedures is decisive for ensuring successful installations.

a. Replacement b. Maintenance

Page 39: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 39

c. Installation d. Adaption

13. _________routines can present security vulnerability, especially if administrator rights

are allocated as part of the installations. a. Replacement b. Maintenance c. Installation d. Adaption

14. Basic ________tests may be carried out directly after the installations or de-

installation to check for incorrect or incomplete installations. a. structural b. coverage c. resources utilization d. functional

15. ______________describes the ability of an application to share an environment with

other applications without experiencing or causing negative effects. a. Coverage b. Co-existence c. Functions d. Structures

16. ________________testing is normally performed when user acceptance tests have

successfully completed a. Co-existence b. Functions c. Structures d. Coverage

17. For __________systems, the physical environment into which the software will be installed may play a significant role in the testing strategy.

a. Complete b. embedded c. structured d. partial

Fill in the blanks

1. _____________ defines as the ease with which a software product can be modified to correct defects, modified to meet new requirements, modified to make future maintenance easier or adapted to a changed environment.

2. Good software _____________is the product of a mature software development process. 3. There are a number of interrelated factors working against a better representation of

Page 40: 060010711/040250111-Software Testing 2017utu.ac.in/bmiit/StudentCorner/2017-18/Sem7/060010711_040250111_QB.pdf · 060010711/040250111-Software Testing 2017 Ms. Abha Damani Page 5

060010711/040250111-Software Testing 2017

Ms. Abha Damani Page 40

software ____________ in our software development and testing. 4. If our software application is in a _______________stage of its life cycle, the results of these

planning activities may be documented in a master test plan. 5. In a _____________stage, however, the documentation may take another form, such as a release

test plan or even a collection of less formal documents. 6. _____________relates to the effort required to perform improvements or to fix defects. 7. A ____________variable is one that is shared between more than one module. 8. Global variables create strong ___________ between the modules that share them and can

result in the maintainability problems. 9. ___________between software modules results when they have some form of mutual

dependency. 10. Software _________ is a desirable design attribute relating to the principle that a given module

should implement one piece of functionality. 11. If _____________was not on the agenda during development, we may need so much effort to

replace software components later on that the twin benefits of flexibility and responsiveness to market needs may be completely eroded.

12. The ________and flexibility of procedures and any software applications used to support the installation will be evaluated.