A ______ is the basic unit of development in Scrum.
1.Class
2.Manifesto
3. Slice
4. Sprint
Posted Date:-2022-01-08 12:27:36
The discipline of AUP which deals with managing access to project artefacts is called ______
1. Model
2.Deployment
3. Project Management
4. Configuration Management
Posted Date:-2022-01-08 12:34:01
The Sprint is a/an ___________ effort.
1.Timeboxed
2.Closed
3.Sandboxed
4. Open
Posted Date:-2022-01-08 12:28:36
The ______ is the sum of all the Product Backlog Items completed during a Sprint.
1. Sprint burn-down char
2.Release burn-up chart
3. Potentially shippable increment
4. Scrumban
Posted Date:-2022-01-08 12:31:19
Which tools is involved in the automation of regression test?
1.Data tester
2.Boundary tester
3.Capture/Playback
4.Output comparator.
Posted Date:-2022-01-08 12:54:47
White box testing is also known as ______
1.Structure-based testing
2. Black box testing
3.Free testing
4.Closed testing
Posted Date:-2022-01-08 12:52:57
A key principle of Scrum is ______
1. Strict requirements
2.Requirements volatility
3.Fixed scale development
4.Cross-functional development
Posted Date:-2022-01-08 12:23:17
A major benefit of exploratory testing is that testers can use ____based on the results of previous results.
1.Deductive Reasoning
2. Object Creation
3.Garbage Collection
4.Modularity
Posted Date:-2022-01-08 12:45:02
A Use-case realization describes how a particular __________ is realized within the design model.
1.Class
2. Object
3.Use case
4.Function
Posted Date:-2022-01-08 12:42:55
A _______ test is when an invalid input is put and errors are received.
1.Positive
2.Regression
3.Negative
4. Neutral
Posted Date:-2022-01-08 12:53:56
A ____________ test is when a valid input is put and some action to be completed in accordance with the specification is expected.
1.Positive
2. Regression
3.Negative
4.Neutral
Posted Date:-2022-01-08 12:54:19
An input field takes the year as input between 1800 and 2016, the boundary values for testing this field are _____
1. 1899,1900,2004,2005
2.1799,1900,2004,2005
3. 1799,1800,2016,2017
4.1600,1700,1800,1900
Posted Date:-2022-01-08 12:55:17
At the ______ the team reflects on the past Sprint.
1.Sprint Review
2. Daily Scrum
3.Sprint Retrospective
4.Sprint Reflection
Posted Date:-2022-01-08 12:29:35
Configuration management procedures be implemented during ______
1.Test Execution
2. Test Planning
3. Test Planning
4.Test Success
Posted Date:-2022-01-08 12:49:07
Each day during a Sprint, the team holds a ______ with specific guidelines.
1. Impediment
2. Daily Scrum
3.Backlog refinement
4. Scrum of Scrums
Posted Date:-2022-01-08 12:29:07
Equivalence Partitioning, Use Case Testing and Decision Testing are _______ techniques.
1. Static
2.Dynamic
3.Outdated
4.Infeasible
Posted Date:-2022-01-08 12:48:06
Exploratory testing is often thought of as a _______ technique.
1.White box testing
2.Functional testing
3.Non-functional testing
4.Black box testing
Posted Date:-2022-01-08 12:43:55
Exploratory testing is particularly suitable if ______ and specifications are incomplete.
1. Investment
2.Time
3.Requirements
4.Deadlines
Posted Date:-2022-01-08 12:45:29
Monkey testing is also different from _____________ testing in that ad-hoc testing is performed without planning and documentation.
1. Fuzz
2.Functional
3. Ad-hoc
4.Random
Posted Date:-2022-01-08 12:36:18
Monkey Testing is also included in Android Studio as part of the standard testing tools for _______
1.Unit Testing
2.Stress Testing
3.Functional Testing
4.Integration Testing
Posted Date:-2022-01-08 12:34:52
Monkey testing is more about random actions while __________ testing is more about random data input.
1.Fuzz
2.Functional
3.Ad-hoc
4.Random
Posted Date:-2022-01-08 12:35:52
Random testing often known as __________ testing
1. Monkey
2.Amorous
3.Sporadic
4.Unknown
Posted Date:-2022-01-08 12:34:26
Static analysis cannot ______
1.Enforce coding standards
2.Help in code understanding
3.Identify anomalies or defects in the code
4. Detect memory leaks
Posted Date:-2022-01-08 12:55:48
The main advantage of exploratory testing is that less _____ is needed.
1.Investment
2. Preparation
3. Knowledge
4.Accuracy
Posted Date:-2022-01-08 12:44:35
The review process for a particular review begins with a _____________ by the author to the moderator in formal review.
1.Request For Review
2. Requirement Analysis
3.Notice For Review
4.Goal Design
Posted Date:-2022-01-08 12:48:40
The _____ is the list of work the Development Team must address during the next Sprint.
1. Sprint Review
2. Sprint Backlog
3. Product Increment
4.Product backlog
Posted Date:-2022-01-08 12:30:30
The _______ comprises an ordered list of requirements that a Scrum Team maintains for a product.
1.Sprint Review
2. Sprint Backlog
3. Product Increment
4.Product backlog
Posted Date:-2022-01-08 12:30:01
The _________ represents the product’s stakeholders and the voice of the customer
1.Development Team
2.Scrum Master
3.Product Owner
4. Servant-leader
Posted Date:-2022-01-08 12:23:56
UML stands for _______
1.Unknown Markup Language
2. Unified Modelling Language
3.Universal Markup Language
4.Universal Modelling Language
Posted Date:-2022-01-08 12:32:28
White box testing is ______
1.Static
2.Dynamic
3. Infeasible
4.Time-consuming
Posted Date:-2022-01-08 12:53:30
_____ defines “a flexible, holistic product development strategy where a development team works as a unit to reach a common goalâ€.
1.Scrum
2.FDD
3.DevOps
4.MDD
Posted Date:-2022-01-08 12:22:47
_____ have no knowledge about the application or system in monkey testing.
1.Cloned Objects
2. Smart Monkey tests
3.Dumb Monkey tests
4.Fuzz tests
Posted Date:-2022-01-08 12:35:17
_____ is driven by an Audit or a Risk function to look at a specific control or compliance issue.
1.Security Audit
2.Vulnerability Scan
3. Vulnerability Assessment
4.Penetration Test
Posted Date:-2022-01-08 12:58:44
_____ uses discovery and vulnerability scanning to identify security vulnerabilities
1. Discovery
2.Vulnerability Scan
3.Vulnerability Assessment
4.Penetration Test
Posted Date:-2022-01-08 12:58:19
______ builds upon Vulnerability Assessment by adding manual verification to confirm exposure.
1.Security Audit
2. Security Assessment
3.Vulnerability Assessment
4.Penetration Test
Posted Date:-2022-01-08 12:59:35
______ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended.
1.Integrity Testing
2. Unit Testing
3.Security Testing
4.Stress testing
Posted Date:-2022-01-08 12:49:33
______ is a technique for gathering information about the possible set of values calculated at various points in a computer program.
1.Data flow analysis
2.Equivalence partitioning
3.Inspections
4.Decision testing
Posted Date:-2022-01-08 12:41:51
______ is an approach to software testing that is concisely described as simultaneous learning, test design and test execution.
1.Data flow analysis
2.Decision testing
3. Exploratory testing
4.None of the mentioned
Posted Date:-2022-01-08 12:43:19
______ is normally used to evaluate a product to determine its suitability for intended use and to identify discrepancies.
1.Supervisor Review
2. Technical Review
3.Decision Review
4.Design Review
Posted Date:-2022-01-08 12:57:08
______ of information refers to protecting information from being modified by unauthorized parties.
1.Confidentiality
2.Authentication
3.Authorization
4. all of the mentioned
Posted Date:-2022-01-08 12:50:14
______ test cases are when random test cases are performed and equivalence partitioning is applied to those test cases.
1.Random
2.Static
3.Semi-random
4.Equivalent-random
Posted Date:-2022-01-08 12:56:39
_______ describes a simple and easy to understand approach to developing business application software using agile techniques and concepts while still remaining true to the RUP.
1.RUPP
2. Scrum
3.AUP
4.EUP
Posted Date:-2022-01-08 12:32:55
_______ ensures the original fault has been removed.
1.Regression testing
2.Re-testing
3.Negative testing
4.Positive testing
Posted Date:-2022-01-08 12:56:14
_______ helps visualizing both the processes and the data of a method.
1.Configuration Management.
2.Domain Object Modelling
3.MetaModeling
4.Inspections
Posted Date:-2022-01-08 12:20:32
_______ is a methodology for modelling and documenting software systems based on best practices.
1.TDD
2. FDD
3.Scrum
4.AM
Posted Date:-2022-01-08 12:33:35
_______ is a software testing technique that divides the input data of a software unit into partitions of equivalent data from which test cases can be derived.
1. Data flow analysis
2.Equivalence partitioning
3.Inspections
4.Decision testing
Posted Date:-2022-01-08 12:47:29
_______ looks for known security issues by using automated tools to match conditions with known vulnerabilities.
1.Discovery
2.Vulnerability Scan
3.Security Assessment
4.Penetration Test
Posted Date:-2022-01-08 12:57:51
________ is a technique used to identify the requirements of a system (usually associated with software/process design) and the information used to both define both processes used and classes (a collection of actors and processes).
1.Data flow analysis
2.Use Case analysis
3.Exploratory testing
4. Decision testing
Posted Date:-2022-01-08 12:42:20
________ is an adaptable process framework, intended to be tailored by the development organizations that will select the elements of the process that are appropriate for their needs.
1.RUP
2.AOP
3. FDD
4.XP
Posted Date:-2022-01-08 12:31:59
________ simulates an attack by a malicious party.
1.Security Audit
2.Vulnerability Scan
3.Vulnerability Assessment
4. Penetration Test
Posted Date:-2022-01-08 12:59:08