1.
Consider an information system of a Pay-Tv company based on a SOA architecture.
The integrated system currently consists of three core systems:
- a CRM (Customer Relationship Management) system
- a BRM (Billing and Revenue Management) system
- a CAS (Conditional Access System) system all of them communicating with SOA Middleware.
You have been asked to manage the testing activities for the integration of two additional off-the-shelf systems from two different vendors: a SMS (Short Message Service) server and an IVR (Interactive Voice Response) system.
Assume that there is a high likelihood that the two off-the-shelf systems will be low-quality and that you have a clear proof that the testing performed by the two vendors on their systems has been unsystematic and unprofessional. This obviously leads to higher quality risk for the overall integrated system.
You are the Test Manager of this project. Your main goal is to plan for testing activities to mitigate this risk.
Which of the following answers best describes the test activities (assuming it is possible to perform all of them) you should plan for?
2.
The following are the requirements identified as "critical":
REQ-SEL-001. The user shall be able to combine all the three products with all the four durations to define an item to purchase
REQ-SEL-002. The user shall be able to add a maximum of six different items to the shopping cart
REQ-PUR-001. The user shall be able to purchase all the items in the shopping cart using a credit voucher
REQ-PUR-002. The user shall be able to purchase all the items in the shopping cart using the available credit already charged on the smartcard
REQ-PUR-003. The user shall be able to purchase all the items in the shopping cart using all the accepted credit cards (Visa, MasterCard and Great Wall Card)
REG-LOGO-001. The user shall be able to logout (by clicking the logout button) from both the "select" and "purchase" pages going back to the "browse" page (anonymous navigation)
Moreover the following quality risk item has been identified as "critical":
QR-P1. The web customer portal might not be able to provide the expected response time (less than 10 sec) for the purchase transactions under a load of up-to 1000 concurrent users
Test analysis for system testing has just begun and the following test conditions have been identified:
TC-SEL-01. Test the combinations of products and durations to define an item to purchase
TC-SEL-02. Test the maximum number of items, which can be added to the shopping cart
TC-PUR-01. Test the purchase of an item
TC-PUR-02. Test the purchase of an item with the credit charged on the smartcard
Assume that you have used traceability to determine the logical test cases that cover all the requirements and the single risk item identified in that scenario.
Which of the following is a positive logical test that is complete, is correct, and covers the REG-LOGO-001 requirement?
3.
Assume that the following test cases have been executed at the end of the first week of test execution: TC-001, TC-002 and TC-007. All these tests are 'passes'.
What is the MINIMUM number of the remaining test cases that must be successfully executed to fulfill the EX1 exit criteria?
4.
Which of the following is an example of the test closure activity indicated as "lessons learned"?
5.
You can count on well-written requirements, but you can't count on an adequate contribution of the stakeholders to the quality risk analysis. You have to mitigate the insufficient contribution of the stakeholders because the risk-based testing approach shall minimize the product risks. Your test team has one expert tester in security testing.
Which of the following test activities would you expect to be the less important in this context?
6.
Which of the following statements, about the test reporting activities for a project adopting an iterative lifecycle model with very short iterations (e.g. two weeks iterations), is correct?
7.
Which of the following statements best describes an appropriate approach for managing exploratory testing?
8.
You are performing a quality risk analysis for a CSCI (Computer Software Configuration Item) used to implement a CBIT (Continuous Built-In Test) module of a safety-critical system.
During the quality risk analysis you are trying to identify the ways in which failures of the CBIT module can occur, for each of them trying to determine the potential causes and likely effects, and the risk level (calculated as the product of three factors: severity, occurrence and detection).
Which of the following risk analysis techniques are you working with?
9.
Which of the following statements represents the most effective contribution of the stakeholders to the completion of the failure mode analysis table?
10.
You are working on a project to develop an authentication system for an e-commerce website. This system provides two features: Registration and authentication.
Two different development teams develop these two features.
There is a high likelihood that the delivery of the authentication feature to the test team will be three weeks later. To complete the registration the user must provide the following registration inputs: Name, surname, birthdate, fiscal code and he/she can select a username and a password.
A registered user can be a special user or a normal user. To be identified as a special user, he/she must also provide, during the registration process, a voucher
possibly received from the IT department.
Access is granted only if a user is registered and the password is correct: In all other cases access is denied. If the registered user is a special user and the password is wrong, a special warning is shown on the system console.
You are currently performing a quality risk analysis using FMEA.
Based only on the given information, which of the following is NOT a product risk that could be identified during the quality risk analysis?