A ______ is the basic unit of development in Scrum.
1.Class
2.Manifesto
3. Slice
4. Sprint
The discipline of AUP which deals with managing access to project artefacts is called ______
1. Model
2.Deployment
3. Project Management
4. Configuration Management
The Sprint is a/an ___________ effort.
1.Timeboxed
2.Closed
3.Sandboxed
4. Open
The ______ is the sum of all the Product Backlog Items completed during a Sprint.
1. Sprint burn-down char
2.Release burn-up chart
3. Potentially shippable increment
4. Scrumban
Which tools is involved in the automation of regression test?
1.Data tester
2.Boundary tester
3.Capture/Playback
4.Output comparator.
White box testing is also known as ______
1.Structure-based testing
2. Black box testing
3.Free testing
4.Closed testing
A key principle of Scrum is ______
1. Strict requirements
2.Requirements volatility
3.Fixed scale development
4.Cross-functional development
A major benefit of exploratory testing is that testers can use ____based on the results of previous results.
1.Deductive Reasoning
2. Object Creation
3.Garbage Collection
4.Modularity
A Use-case realization describes how a particular __________ is realized within the design model.
1.Class
2. Object
3.Use case
4.Function
A _______ test is when an invalid input is put and errors are received.
1.Positive
2.Regression
3.Negative
4. Neutral
A ____________ test is when a valid input is put and some action to be completed in accordance with the specification is expected.
1.Positive
2. Regression
3.Negative
4.Neutral
An input field takes the year as input between 1800 and 2016, the boundary values for testing this field are _____
1. 1899,1900,2004,2005
2.1799,1900,2004,2005
3. 1799,1800,2016,2017
4.1600,1700,1800,1900
At the ______ the team reflects on the past Sprint.
1.Sprint Review
2. Daily Scrum
3.Sprint Retrospective
4.Sprint Reflection
Configuration management procedures be implemented during ______
1.Test Execution
2. Test Planning
3. Test Planning
4.Test Success
Each day during a Sprint, the team holds a ______ with specific guidelines.
1. Impediment
2. Daily Scrum
3.Backlog refinement
4. Scrum of Scrums
Equivalence Partitioning, Use Case Testing and Decision Testing are _______ techniques.
1. Static
2.Dynamic
3.Outdated
4.Infeasible
Exploratory testing is often thought of as a _______ technique.
1.White box testing
2.Functional testing
3.Non-functional testing
4.Black box testing
Exploratory testing is particularly suitable if ______ and specifications are incomplete.
1. Investment
2.Time
3.Requirements
4.Deadlines
Monkey testing is also different from _____________ testing in that ad-hoc testing is performed without planning and documentation.
1. Fuzz
2.Functional
3. Ad-hoc
4.Random
Monkey Testing is also included in Android Studio as part of the standard testing tools for _______
1.Unit Testing
2.Stress Testing
3.Functional Testing
4.Integration Testing
Monkey testing is more about random actions while __________ testing is more about random data input.
1.Fuzz
2.Functional
3.Ad-hoc
4.Random
Random testing often known as __________ testing
1. Monkey
2.Amorous
3.Sporadic
4.Unknown
Static analysis cannot ______
1.Enforce coding standards
2.Help in code understanding
3.Identify anomalies or defects in the code
4. Detect memory leaks
The main advantage of exploratory testing is that less _____ is needed.
1.Investment
2. Preparation
3. Knowledge
4.Accuracy
The review process for a particular review begins with a _____________ by the author to the moderator in formal review.
1.Request For Review
2. Requirement Analysis
3.Notice For Review
4.Goal Design
The _____ is the list of work the Development Team must address during the next Sprint.
1. Sprint Review
2. Sprint Backlog
3. Product Increment
4.Product backlog
The _______ comprises an ordered list of requirements that a Scrum Team maintains for a product.
1.Sprint Review
2. Sprint Backlog
3. Product Increment
4.Product backlog
The _________ represents the product’s stakeholders and the voice of the customer
1.Development Team
2.Scrum Master
3.Product Owner
4. Servant-leader
UML stands for _______
1.Unknown Markup Language
2. Unified Modelling Language
3.Universal Markup Language
4.Universal Modelling Language
White box testing is ______
1.Static
2.Dynamic
3. Infeasible
4.Time-consuming
_____ defines “a flexible, holistic product development strategy where a development team works as a unit to reach a common goalâ€.
1.Scrum
2.FDD
3.DevOps
4.MDD
_____ have no knowledge about the application or system in monkey testing.
1.Cloned Objects
2. Smart Monkey tests
3.Dumb Monkey tests
4.Fuzz tests
_____ is driven by an Audit or a Risk function to look at a specific control or compliance issue.
1.Security Audit
2.Vulnerability Scan
3. Vulnerability Assessment
4.Penetration Test
_____ uses discovery and vulnerability scanning to identify security vulnerabilities
1. Discovery
2.Vulnerability Scan
3.Vulnerability Assessment
4.Penetration Test
______ builds upon Vulnerability Assessment by adding manual verification to confirm exposure.
1.Security Audit
2. Security Assessment
3.Vulnerability Assessment
4.Penetration Test
______ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended.
1.Integrity Testing
2. Unit Testing
3.Security Testing
4.Stress testing
______ is a technique for gathering information about the possible set of values calculated at various points in a computer program.
1.Data flow analysis
2.Equivalence partitioning
3.Inspections
4.Decision testing
______ is an approach to software testing that is concisely described as simultaneous learning, test design and test execution.
1.Data flow analysis
2.Decision testing
3. Exploratory testing
4.None of the mentioned
______ is normally used to evaluate a product to determine its suitability for intended use and to identify discrepancies.
1.Supervisor Review
2. Technical Review
3.Decision Review
4.Design Review
______ of information refers to protecting information from being modified by unauthorized parties.
1.Confidentiality
2.Authentication
3.Authorization
4. all of the mentioned
______ test cases are when random test cases are performed and equivalence partitioning is applied to those test cases.
1.Random
2.Static
3.Semi-random
4.Equivalent-random
_______ describes a simple and easy to understand approach to developing business application software using agile techniques and concepts while still remaining true to the RUP.
1.RUPP
2. Scrum
3.AUP
4.EUP
_______ ensures the original fault has been removed.
1.Regression testing
2.Re-testing
3.Negative testing
4.Positive testing
_______ helps visualizing both the processes and the data of a method.
1.Configuration Management.
2.Domain Object Modelling
3.MetaModeling
4.Inspections
_______ is a methodology for modelling and documenting software systems based on best practices.
1.TDD
2. FDD
3.Scrum
4.AM
_______ is a software testing technique that divides the input data of a software unit into partitions of equivalent data from which test cases can be derived.
1. Data flow analysis
2.Equivalence partitioning
3.Inspections
4.Decision testing
_______ looks for known security issues by using automated tools to match conditions with known vulnerabilities.
1.Discovery
2.Vulnerability Scan
3.Security Assessment
4.Penetration Test
________ is a technique used to identify the requirements of a system (usually associated with software/process design) and the information used to both define both processes used and classes (a collection of actors and processes).
1.Data flow analysis
2.Use Case analysis
3.Exploratory testing
4. Decision testing
________ is an adaptable process framework, intended to be tailored by the development organizations that will select the elements of the process that are appropriate for their needs.
1.RUP
2.AOP
3. FDD
4.XP
________ simulates an attack by a malicious party.
1.Security Audit
2.Vulnerability Scan
3.Vulnerability Assessment
4. Penetration Test