Top 100 Software Testing MCQs with answers

Top 100 Software Testing MCQs with answers

Top 100 Software Testing objective type questions with answers (MCQs) for interview and placement Manual testing – Software Testing (MCQ)

Top 100 Software Testing MCQs with answers

1) Which of the following is a correct definition of risk in software testing?
a. None of the listed options
b. Risk is something capable of exploiting vulnerability in the security of a computer system or application. Risks include both hazards and events that can trigger flaws.
c. Risk is an analysis of an organization’s information resources, its existing controls, and its remaining organization and computer system vulnerabilities. It combines the loss potential for each resource or combination of resources with an estimated rate of occurrence to establish a potential level of damage in dollars or other assets.
d. Risk is the potential loss to an organization, as for example, the risk resulting from the misuse of its computer. This may involve unauthorized disclosure, unauthorized modification, and/or loss of information resources, as well as the authorized but incorrect use of a computer. Risk can be measured by performing risk analysis.

Ans : D

2) Following are important to perform the analysis of the test process EXCEPT:
a. Effectiveness and efficiency of the test process
b. Test program meets the test objective
c. Maturity of the test processes
d. test methodology is used correctly

Ans :C

3) Decision rules used to determine whether a software item or feature passes or fails a test is Pass/Fail criteria. State True or False. True

Ans : TRUE

4) Which among the following is a parse program looking for violations of company standards in software testing?
a. compliance checkers
b. Affinity diagram
c. Checkpoint review
d. Benchmarking

Ans : A

5) Which among the following is a way to leverage a dynamic analyzer during system testing?
a. Determine testing levels
b. All of the listed options
c. Spend time to do a complete test plan
d. Generate test cases based on black box test techniques

Ans : D

6) __________ testing involves continuous testing of the solution even after software plans are complete and the tested system is implemented.

a. Life Cycle Testing
b. System Testing
c. Maintenance Testing
d. End-to-End Testing

Ans :B

7) Which of the following testing techniques are used in the Acceptance Testing stage?
a. Thread Testing
b. Black Box Testing
c. Both White box and Black box testing
d. Incremental Testing
e. White Box Testing

Ans : B

8) ………………………………. is an independent appraisal activity within an organization for the review of operations, and is a service to management in software testing.
a. Regression Testing
b. Quality Assurance
c. All of the listed options
d. Internal Auditing
e. Adhoc Testing

Ans : D

9) The process of generating test sets for structural testing based on use of complexity or coverage metrics is called _________________.
a. Metric based test data generation
b. Quality function deployment
c. Cyclomatic complexity
d. Regression testing

Ans : A

10) Testers insert additional code into a program to collect information about program behavior during program execution. This is called as ____________.
a. Instrumentation
b. Integration Testing
c. Dynamic assertion
d. Inspection

Ans : A

11) Activities associated with risk management are ___________.
a. Risk Mitigation
b. Risk Reduction Methods
c. Risk Analysis
d. Risk elimination
e. Contingency planning

Ans : B,E

12) Defects generally occur due to following EXCEPT:
a. Unspecified requirement
b. Immature process
c. Incorrectly implemented specification
d. Specified requirement not built
e. None of the listed options

Ans : E

13) Attitude that has shaped a negative view of testing and testers is that ______________.
a. letting testers find the problems is not the only way to debug
b. testers should not be blamed for the defects found in production
c. giving testers less time to test will reduce the chance that they will find defects
d. testers need training
1. Testers hold up implementation.
2. Giving testers less time to test will reduce the chance that they will find defects.
3. Letting the testers find problems is an appropriate way to debug.
4. Defects found in production are the fault of the testers.
5. Testers do not need training; only programmers need training.

Ans : C

14) _________________ permits the testing of programs without data .
a. Flow chart
b. Training
c. Symbolic Execution
d. Checklist

Ans : C

15) Which of the following strategic issues needs to be addressed in successful software testing process?
a. Specify requirements in a quantifiable manner

b. Consider using independent test terms
c. All of the listed options
d. Conduct formal technical review prior to testing

Ans :C

16) Amount of resources allocated to each test condition is determined by ______________ in software testing.
a. Ranking
b. Global data coverage
c. Both global data coverage and ranking
d. Battlemap

Ans :A

17) Testers get involved with the project only when testing steps are about to begin. State True or False.

Ans :FALSE

18) Techniques for Reporting a defect may include _______________.
a. All of the listed options
b. Computer forums, Electronic mails, help desk
c. Static
d. Operational

Ans :B

19) Which among the following are the key elements in the defect management process?
a. Management Reporting
b. Defect Prevention
c. Deliverable base lining
d. All of the listed options
e. Process Improvement

Ans : D

20) Which among the following is the quantitative measure of the current level of performance in software testing?
a. Benchmarking
b. Pareto analysis
c. Affinity diagram
d. Baseline

Ans 😀

21) The test technique to enter erroneous data to determine it cannot affect the integrity of the files is called _____________.
a. Error handling
b. File integrity
c. Functional
d. Security

Ans :B

22) Risk analysis is a process which includes evaluating the following EXCEPT:
a. Complexity
b. control
c. threat
d. Risk

Ans :A

23) Regression testing mainly helps in ___________.
a. checking for side-effects of fixes
b. ensuring high level sanity
c. retesting fixed defects
d. checking the core gaps

Ans :A

24) Process Engineering Manager includes the following EXCEPT:
a. Ensure involved parties are adequately trained
b. Promote the concept of Process engineering
c. Be the driving force behind the process
d. Be highly certified and qualified in process areas

Ans : D

25) To define test objectives testers need not to do following EXCEPT:
a. Validation process for incoming external data
b. Data bridges and filters
c. Define each objective so that you can reference it by a number.
d. Development of a model showing the internal and external dependency links among core business areas, processes, and information systems

Ans : D

26) Review falls under which category of Cost of Quality?
a. Preventive Costs
b. Failure Costs
c. None of the listed options
d. Appraisal Costs

Ans : D

27) Purpose of software reviews is to uncover errors and defects in work products so they can be removed before moving on to the next phase. State True or False. True

Ans : TRUE

28) Testing that simulates problem in original environment so that an alternative processing environment can be tested is _____________.
a. Recovery testing
b. Disaster testing
c. Performance testing
d. Compliance testing

Ans :A

29) Objective of integration testing is to _________________.
a. validate the application design and phase and prove application components can be successfully integrated
b. integrate all components
c. application integrated correctly into its environment
d. All of the listed options

Ans : D

30) A defect can be defined in ____________.
a. Producer’s viewpoint and tester’s viewpoint
b. All of the listed options
c. Producer’s viewpoint and customer’s viewpoint
d. Customer’s viewpoint

Ans :C

31) ___________ is identifying defects in the stage in which they were created, rather than in later testing stages.
a. Defect Validation
b. Down stream
c. Stage Containment
d. Risk Strategy

Ans :C

32) QAI has identified the following six tests that each measure and metric should be subjected to, EXCEPT:
a. Consistency
b. Validity
c. Reliability
d. Calibration
e. Ease of Use and Simplicity
f. Timeliness

Ans :A

33) Following are the main advantages of using work processes EXCEPT:
a. Improves communication
b. Enable knowledge transfer
c. Improves interpersonal skills
d. Improves Productivity

Ans : C

34) When conducting risk analysis, the following major components are taken into consideration EXCEPT:
a. The probability of losing a customer.
b. The probability that the negative event will occur.
c. The potential loss or impact associated with the event.

Ans :A

35) Testing on, above and below the edges of classes is called _____________.
a. Boundary Value Analysis
b. Equivalence Class Partitioning
c. Test Combinations
d. Cause Effect Diagram

Ans :A

36) The development of an effective test plan involves the following tasks EXCEPT:
a. Develop the test matrix
b. Define test administration
c. Collect test metrics
d. Set test objectives

Ans :C

37) The risk team can use which one of the following methods of risk identification in software testing?
a. Risk Template
b. Risk Control chart
c. Risk analysis plan
d. Risk analysis scenario and risk checklist

Ans : D

38) At a minimum, the developer should always execute Unit Regression testing when a change is made. True

Ans :TRUE

39) Unit testing is conducted in the development environment in software testing. (T/F)

Ans :TRUE

40) Following are examples of Intentional act EXCEPT:
a. Communication protocol may fail to positively identify the transmitter or receiver of a message.
b. Messages may be recorded and replayed into the system.
c. If encryption (i.e., use of codes) is used, keys may be stolen.
d. False messages may be inserted into the system.

Ans :A

41) One of the most effective methods for estimating expected impact of risk is _____________ in software testing.
a. Annual loss Expectation formula
b. None of the listed options
c. Pareto Analysis
d. Risk analysis

Ans :A

42) Defect Density is calculated by ______________.
a. Total no. of Defects/ Effort
b. Valid Defects/ Total no. of Defect
c. Invalid Defects/ Valid Defects
d. Valid Defects/ Effort

Ans :A

43) Following are the valid Defect Severity EXCEPT:
a. Major
b. Showstopper
c. Minor
d. Critical

Ans :B

44) The best reason for using Independent software testing teams is that ___________________.
a. testers do not get involved with the project until testing begins
b. strangers will test the software mercilessly
c. quality of software is given as much consideration as the project budget and timeline
d. software developers do not need to do any testing

Ans :C

45) Which one of the following statements is correct in software testing?
a. Policies are set by Test managers
b. Policies are guidelines
c. Policies help in defining products
d. Policies are set by senior management

Ans : D

46) Which one of the following is NOT the part of the test process improvement model in software testing?
a. Analyze assessment output
b. Conduct Assessment
c. Derive new processes
d. Initiate process improvement

Ans :C

47) Test steps are grouped into manageable and scheduled units called ________________.
a. Structural Testing
b. Test Scenario
c. Test design specification
d. Test procedure specification: (specifying a sequence of actions for the execution of a test)

Ans :B

48) The purpose of software testing is to ___________.
a. validate the logical design
b. demonstrate that the application works properly
c. All of the listed options
d. detect the existence of defects

Ans :C

49) Test planning should begin _______________.
a. after Design
b. before Requirement collection
c. at the time of Requirement definition
d. after Requirement collection

Ans : D

50) Infeasible path is a sequence of program statements that can be executed. False

Ans :FALSE

51) The objective of _________________ is to assure that the requirements are covered for application in test design document.
a. Operation and maintenance
b. Test Coverage
c. Management Directive
d. None of the listed options

Ans :B

52) ________________ is a record of relevant details about execution of tests.
a. None of the listed options
b. Test log
c. Defect tracking sheet (incidence)
d. Test data

Ans :B

53) _________________ is responsible for conducting Test Readiness Review prior to start of testing.
a. Developer
b. Test Manager
c. None of the listed options
d. Development Manager

Ans :B

54) Requirement Checklist is an example for which of the following testing technique?
a. White Box testing
b. Black Box Testing
c. Requirement Study
d. Static Analysis

Ans : D

55) Integration testing should begin once unit testing for the components to be integrated is complete. State True

Ans : TRUE

56) Minimizing expected impact of defect involves _______________.
a. reducing probability of risk becoming a problem
b. All of the listed options
c. eliminating the risk
d. reduce impact if there is a problem

Ans :B

57) The inability of a system or component to perform its required functions within specified requirements is called _______________.
a. error
b. Failure
c. defect
d. bug

Ans :C

58) A catchall term for all software defects or errors __________________ in software testing.
a. Bug
b. Fault
c. Error

Ans :A

59) The types of conditions that cause erroneous or falsified input data include _____________.
a. Records in one format may be interpreted according to a different format
b. The evidence from intermediate processing is not retained

c. Early use of new software technology
d. Detailed analysis of the technology

Ans :A

60) Following are important factors in selecting the members of Process engineering committee EXCEPT:
a. Make long term assignment to Process engineering committee
b. Ensure that appropriate areas of interest are involved
c. Select the highest level manager who accepts the position
d. Select a tester who lot of experience in audits

Ans : D

61) _____________ testing verifies all the performance criteria have been achieved when the system is placed into production.
a. Security testing
b. Compliance testing
c. System testing
d. User acceptance testing

Ans : D

62) One of the most commonly identified weaknesses in software testing is ________________.
a. lack of metrics
b. lack of skilled resources
c. lack of defects count
d. lack of time

Ans :A

63) Regression testing is _________________.
a. verify authorization rules have been properly implemented
b. ensuring functions are performed correctly
c. verification of changes to make sure older programs still works with new changes

Ans :C

64) The tool used to verify the operational system results are in compliance with organizations policies and procedure is called _________________.
a. Tracing
b. Confirmation or Examination
c. Fact finding
d. Checklists and inspections

Ans : D

65) Run chart doesn’t help to ___________.
a. monitor a process
b. Track changes or trends
c. tracking observations in sequence or time order
d. find the problem areas

Ans : D

66) A set of Boolean conditions such that complete test sets for the conditions uncover the same errors is ___________.
a. Consistency
b. Consistent condition set
c. Complete test set: A test set containing data that causes each element of pre-specified set of Boolean conditions to be true. In addition, each element of the test set causes at least one condition to be true.
d. Correctness

Ans :B

67) Deliverable base lining involves _____________.
a. risks and identify key deliverables
b. identify key deliverables and define standards for each deliverable
c. All of the listed options
d. risks and define standards for each deliverable

Ans :C

68) Performing risk analysis during test planning includes all EXCEPT:
a. Select testing priorities
b. Evaluate risks
c. Form the risk analysis team
d. Identify risks

Ans :B

69) Effectiveness is doing things right and efficiency is doing the right things. (T/F)

Ans :FALSE

70) Defects are measured in relation to ___________ in software testing.
a. lines of code
b. total number of defects
c. development team size
d. project efforts

Ans : D

71) A white box testing technique that measures the number of or percentage of decision outcomes covered by the test cases designed is called ______________.
a. Decision Coverage
b. Basis path coverage
c. Modified decision coverage
d. condition coverage

Ans :A,D 

72) The objective in Test design is to _____________.
a. minimize test maintenance costs
b. detect as many defects as possible
c. All of the listed options
d. minimize test execution cost

Ans :C

73) Testing for the existence or effectiveness of programmed controls requires using ___________.
a. Complex data
b. Valid data
c. Redundant data
d. Invalid data

Ans : D

74) Work Processes constitute the following EXCEPT:
a. Standard
b. Process
c. Procedure
d. Policy

Ans :B

75) Guidelines to Writing the Test Plans are EXCEPT:
a. Finish early
b. Calculate the planning effort
c. Start Early

Ans :A

76) Which of the following statement is NOT correct in software testing?
a. 90 percent of all defects are caused by process problems
b. Reviews are generally greater than 65 percent efficient in finding defects
c. 60 percent of software defects originate in the requirements phase of the project
d. Over 50 percent of life cycle of software system is spent on requirements
e. Over 50% of the life cycle costs of a software system are spent on maintenance

Ans : D

77) Which among the following is an important attribute for test case?
a. Test Description & Expected Result
b. Test Description & Actual Result
c. Test Case ID & Expected Result
d. Expected Result and Actual Result

Ans :A

78) ______________ is the method of testing the maintainability of the application system.
a. Inspections
b. Code Walkthroughs
c. Reviews
d. Functional testing
e.Compliance testing

Ans :B,E

79) Which among the following is a technique designed to ensure the process employed are adequate to produce the desired result and process is being followed?
a. Quality Control
b. Testing Methodology
c. Quality Assurance
d. Testing Strategy

Ans :C

80) The effective Control environment strives for everything EXCEPT:
a. Attitude of integrity
b. Control consciousness and positive “tone at the top”
c. Competent people
d. Defect free product

Ans : D

81) Following are the guidelines to establish an organizational structure EXCEPT:
a. Establish a Process engineering committee
b. Let the standard Ad Hoc committees develop the technical standard
c. Process engineering committee
d. Process reengineering committee

Ans : D

82) Which of the following Software quality Factors correctly reflects – “Employee gross pay can be substantiated by supporting documentation. Sales tax paid to a specific state can be substantiated by the supporting invoices. Payments made to vendors can be substantiated should the vendor disavow receiving the payment.”
a. File Integrity
b. Audit Trail
c. Authorization
d. Continuity of Process
e. Service Levels

Ans :B

83) Removing or reducing which of the following can help in diminishing the undesirable behavior in software testing?
a. Promotion & Training
b. Incentive & Temptations
c. Training & Promotion
d. Incentive & Promotion

Ans :B

84) Which of the following is a correct definition of risk analysis?
a. Risk analysis is something capable of exploiting vulnerability in the security of a computer system or application. Risk analysis includes both hazards and events that can trigger flaws.
b. Risk analysis is an analysis of an organization’s information resources, its existing controls, and its remaining organization and computer system vulnerabilities. It combines the loss potential for each resource or combination of resources with an estimated rate of occurrence to establish a potential level of damage in dollars or other assets.
c. Risk analysis is the potential loss to an organization, as for example, the risk resulting from the misuse of its computer. This may involve unauthorized disclosure, unauthorized modification, and/or loss of information resources, as well as the authorized but incorrect use of a computer. Risk can be measured by performing risk analysis.
d. None of the listed options

Ans :B

85) Some organizations divide people into four categories when attempting to identify issues EXCEPT:
a. People who will help the software system happen
b. People who will attempt to make the software system not happen
c. People who will hope the software system happens
d. People who will make the software system happen
e. People who will let the software system happen.

Ans :A

86) Check for defects in process for the primary aim of correcting or establishing new process. This is?
a. Quality Control
b. Quality Assurance
c. Both Quality Control and Quality Assurance
d. None of the listed options

Ans :C

87) The following should be used to estimate ALE EXCEPT:
a. Calculate an ALE using the loss and frequency tables
b. Understanding of information services concepts and systems design
c. Make a preliminary assessment of the loss
d. Document the decision reached

Ans :B

88) Decision to stop test execution should be based upon ____________________.
a. successful use of specific test case design methodologies
b. All of the listed options
c. a percentage of coverage for each coverage category
d. rate of error detection falls below a specified threshold

Ans :B

89) Following lead to improper use of technology in software testing EXCEPT:
a. Early use of new hardware technology
b. Detailed analysis of the technology
c. Early use of new software technology
d. Improper skill

Ans :B

90) Which of the following factor assures that data is processed in accordance with the intents of management for processing of transactions?

a. Authorization
b. Maintainability
c. Access Control
d. Service Levels

Ans :A

91) When a defect is fixed in production rather than in requirement, how many times can this be expensive in software testing?
a. 1000 times
b. 10 times
c. 1 times
d. 100 times

Ans :B

92) Which among the following is the correct order in which Defect Resolution process should follow in software testing?
a. Schedule fix, Prioritize fix, fix defect, Report resolution
b. Prioritize fix, fix defect, Report Resolution, Schedule fix
c. Prioritize fix, Schedule fix, fix defect, Report resolution

Ans :C

93) Entering alphabetic characters when numeric characters are expected is not an example of test using valid data. (T/F).

Ans : FALSE

94) What is incremental testing?
a. Testing a string of units that accomplish a specific function in the application
b. Testing the interfaces between the unit – tested programs as well as between components
c. All of the listed options
d. Testing transaction flow, input validation and functional completeness in incremental order

Ans :B

95) Most common cause of defect is ________________.
a. failure to estimate
b. failure to assess risks
c. ambiguous or incomplete requirements
d. weak communication

Ans :C

96) Following are the most effective way of communicating moral guidance in software testing EXCEPT:
a. Verbal communication
b. Lead by examples
c. Written code of conduct
d. CMM and ISO standards

Ans : D

97) Inability to Substantiate Processing includes the following EXCEPT:
a. The cost of substantiating processing exceeds the benefits derived from the process
b. The evidence from intermediate processing is not retained
c. Users inability to specify requirements in sufficient details
d. Evidence is not retained long enough

Ans :C

98) Test team should investigate the following characteristics in order to evaluate the potential magnitude of the risk EXCEPT:
a. Assess the severity of potential failures
b. Identify the components for the system
c. Evaluate contingency plans for this system and activities
d. Build the test plan

Ans : D

99) A _______________ is a software item that is an object of testing.
a. Both proof of correctness and test item
b. Proof of correctness
c. Test item

Ans :C

100) Which among the following is an example of functional testing?
a. Condition coverage
b. Branch Coverage
c. Decision coverage
d.Cause-Effect Graphing (orange)

Ans : D

Did we left something?

Comment down below and share your knowledge with others too , Thanks.

Or Please give your valuable feedback to us...

Feedback

Author: Saad Mansuri

Leave a Reply

Your email address will not be published. Required fields are marked *