Question 31
A web-based system is being developed to support the administration of tennis tournaments.
The system provides advice on how much money to offer each player as their individual attendance fee.
The amount depends on a combination of the following factors:
* Overall attendance fund (divided into five numeric ranges)
* Player's current world ranking (divided into ten numeric ranges)
* Whether it is a local tournament for the player (YES or NO)
* Their relationship with the tournament sponsors (clothing, equipment, or endorsement)
* Their previous attendance history at this event (finalist, played, withdrew before event, or withdrew during event) It has been noted that the attendance fee calculation does not take account of 'last minute' invitations that are made to replace a player who withdraws close to the tournament start date. In this case, enhanced attendance fees are offered depending on whether the invitation is made within a week, a fortnight, or a month of the tournament start date.
Which of the following specification-based techniques would be the BEST choice for testing the 'last minute' scenario where players are replaced close to the tournament start, and what type of defect is being targeted by the testing?
SELECT ONE OPTION:
The system provides advice on how much money to offer each player as their individual attendance fee.
The amount depends on a combination of the following factors:
* Overall attendance fund (divided into five numeric ranges)
* Player's current world ranking (divided into ten numeric ranges)
* Whether it is a local tournament for the player (YES or NO)
* Their relationship with the tournament sponsors (clothing, equipment, or endorsement)
* Their previous attendance history at this event (finalist, played, withdrew before event, or withdrew during event) It has been noted that the attendance fee calculation does not take account of 'last minute' invitations that are made to replace a player who withdraws close to the tournament start date. In this case, enhanced attendance fees are offered depending on whether the invitation is made within a week, a fortnight, or a month of the tournament start date.
Which of the following specification-based techniques would be the BEST choice for testing the 'last minute' scenario where players are replaced close to the tournament start, and what type of defect is being targeted by the testing?
SELECT ONE OPTION:
Question 32
Consider the following requirement:
The system shall allow cash advances of at least 200 Euros for all supported credit cards The following credit cards are supported- American Express, Diners, VISA, Mastercard and Eurocard.
The requirement has been identified as business critical.
The following test conditions have been derived:
1. The system shall allow cash advances of at least 200 Euros
2. It shall support American Express, Diners, VISA, Mastercard and Eurocard.
Assume you are following a risk-based testing strategy, where likelihood and impact are both assessed on a five-point scale ranging from very low to very high The requirement R1 was identified as a risk item during the quality risk analysis process. In total 20 risk items were identified during this process Assume that technical project stakeholders have assessed the likelihood of the requirement R1 risk item at a medium level Given only the information above, which of the following statements is true?
The system shall allow cash advances of at least 200 Euros for all supported credit cards The following credit cards are supported- American Express, Diners, VISA, Mastercard and Eurocard.
The requirement has been identified as business critical.
The following test conditions have been derived:
1. The system shall allow cash advances of at least 200 Euros
2. It shall support American Express, Diners, VISA, Mastercard and Eurocard.
Assume you are following a risk-based testing strategy, where likelihood and impact are both assessed on a five-point scale ranging from very low to very high The requirement R1 was identified as a risk item during the quality risk analysis process. In total 20 risk items were identified during this process Assume that technical project stakeholders have assessed the likelihood of the requirement R1 risk item at a medium level Given only the information above, which of the following statements is true?
Question 33
Which of the following appropriate tasks for the Test Analyst is performed during the test analysis phase?
Question 34
You work for a software testing consultancy firm,SOFTEST, that specializes in the travel industry. It has built up a portfolio of clients across two main travel sectors: thecruiseandrailsectors. SOFTEST has an established test process, an experienced team of testers, and maintains comprehensive organizational defect taxonomies for both sectors.
A project has started for a new cruise sector client. It will deliver a newuser interfaceallowing customers to search for cruises using several drop-down fields, each with many values, providing a much greater range of combinations than customers previously had. The project is using aSCRUM methodologywith 2-week sprints and well-specified user stories.
Which option below describes the BEST test techniques to apply for each project?
SELECT ONE OPTION:
A project has started for a new cruise sector client. It will deliver a newuser interfaceallowing customers to search for cruises using several drop-down fields, each with many values, providing a much greater range of combinations than customers previously had. The project is using aSCRUM methodologywith 2-week sprints and well-specified user stories.
Which option below describes the BEST test techniques to apply for each project?
SELECT ONE OPTION:
Question 35
For an ATM banking project the following applies: "When the user first inserts a valid credit card, the system considers the user to be in an unauthenticated state. When requesting a cash advance, the user must be in an authenticated state. The user authenticates by entering the correct PIN code for the card they have used.
During the user authentication, the system shall allow the user to enter their PIN codeup to three times before failing the authentication and rejecting the card. On the first and second try, the system shall prompt the user to re-enter the PIN code " Suppose you are concerned that, depending on the number of invalid PIN codes entered, the system may behave incorrectly. Which of the following test design techniques is specifically targeted at finding such failures?
During the user authentication, the system shall allow the user to enter their PIN codeup to three times before failing the authentication and rejecting the card. On the first and second try, the system shall prompt the user to re-enter the PIN code " Suppose you are concerned that, depending on the number of invalid PIN codes entered, the system may behave incorrectly. Which of the following test design techniques is specifically targeted at finding such failures?