Technical test analyst questions for ISTQB advanced certification

Questions
Q1: Which of the following are generic risk factors that should be considered by the Technical Test Analyst? Select THREE options.

A    A. Technology factors such as complexity and availability of tools

B    B. Potential conflicts between stakeholders

C    C. Large number of defects found with the reliability of the software

D    D. Large number of defects found with the usability of previous versions

E    E. Availability of documentation from legacy systems to be used to verify the accuracy of computations

F    F. Budgetary restrictions on the project

Q2: When participating in a risk analysis, the Technical Test Analyst is expected to work closely with which of the following sets of people?

A    A. Developers

B    B. Users

C    C. Business analysts

D    D. Project sponsors

Q3: Which of the following statements about condition coverage is true?

A    A. It requires setting each atomic condition to true and false, but does not require the resulting decision to be tested with both true and false outcomes

B    B. It requires setting each atomic condition to true and false, and requires the resulting decision to be tested with both true and false outcomes

C    C. It requires evaluating the decision with both true and false outcomes, regardless of the atomic conditions

D    D. It provides more thorough coverage than decision coverage

Q4: You are testing a photo-enforcement system for traffic control in an intersection. A photo will be taken
if the following two conditions are true: The light is red (RED) and the front wheels of the car are over
the line marking the beginning of the intersection (WHEELS).
Consider these sets of values:
1. RED + WHEELS
2. RED + not WHEELS
3. not RED + WHEELS
4. not RED + not WHEELS
Assume the logic in the code is as follows:
If RED and WHEELS then
Take the photo
Else
Do not take the photo
Given this information, which sets of values provides the minimum tests to achieve 100%
decision/condition coverage?

A    A. 1 and 4

B    B. 1 and 2 or 1 and 3

C    C. 1, 2, 3 and 4

D    D. 2 and 3

Q5: You are testing a photo-enforcement system for traffic control in an intersection. It has been
determined that a photo should be taken if the signal light is red (RED) or the car is speeding (SPEED)
and if the front wheels of the car are over the line marking the beginning of the intersection
(WHEELS).
Consider these sets of test values:
1. RED + SPEED + WHEELS
2. RED + SPEED + not WHEELS
3. RED + not SPEED + WHEELS
4. RED + not SPEED + not WHEELS
5. not RED + SPEED + WHEELS
6. not RED + SPEED + not WHEELS
7. not RED + not SPEED + WHEELS
8. not RED + not SPEED + not WHEELS
Assume the logic in the code is as follows:
If ((RED or SPEED) and WHEELS) then
Take the photo
Else
Do not take the photo
Given this information, which sets of values provides the minimum tests to achieve 100% modified
condition/decision coverage?

A    1,5,78

B    1,3,8

C    2,8

D    3,4,5,7

Q6: You are testing a photo-enforcement system for traffic control in an intersection. The requirements
state a photo shall be taken if the signal light is red (RED) or the car is speeding (SPEED) and if the
front wheels of the car are over the line marking the beginning of the intersection (WHEELS).
Consider these sets of values:
1. RED + SPEED + WHEELS
2. RED + SPEED + not WHEELS
3. RED + not SPEED + WHEELS
4. RED + not SPEED + not WHEELS
5. not RED + SPEED + WHEELS
6. not RED + SPEED + not WHEELS
7. not RED + not SPEED + WHEELS
8. not RED + not SPEED + not WHEELS
Assume the logic in the code is as follows:
If ((RED or SPEED) and WHEELS) then
Take the photo
Else
Do not take the photo
Given this information, which sets of values provide the minimum tests to achieve 100% multiple
condition coverage?

A    A. All the sets are needed

B    B. 3, 4, 5, 7

C    C. 1, 3, 8

D    D. 1, 5, 7, 8

Q7: You are testing a photo-enforcement system for traffic control in an intersection. The requirements
state that a photo shall be taken if the signal light is red (RED) or the car is speeding (SPEED) and if
the front wheels of the car are over the line marking the beginning of the intersection (WHEELS).
Consider these sets of values:
1. RED + SPEED + WHEELS
2. RED + SPEED + not WHEELS
3. RED + not SPEED + WHEELS
4. RED + not SPEED + not WHEELS
5. not RED + SPEED + WHEELS
6. not RED + SPEED + not WHEELS
7. not RED + not SPEED + WHEELS
8. not RED + not SPEED + not WHEELS
Assume the logic in the code is as follows:
If ((RED or SPEED) and WHEELS) then
Take the photo
Else
Do not take the photo
Given this information, which sets of values provide the minimum tests to achieve 100% path
coverage.

A    3, 4, 5, 7

B    2, 3

C    1, 3, 8

D    1

Q8: Which of the following types of defects are targeted by API testing? Select THREE options.

A    A. incorrect data handling

B    B. timing problems

C    C. loss of transactions

D    D. non-conformance to coding standards

E    E. lack of usability

F    F. installation defects

Q9: You are the Technical Test Analyst working on the testing of software that will control the movement of
a roof on a new national sports stadium that seats 100,000 spectators. A failure analysis has shown
that if the software system fails then it may cause the roof to break up and fall on the spectators. The
government has requested that the level of testing for this software exceeds that normally required by
the relevant regulatory standards.
Which is the level of test coverage you would expect to be achieved in the testing of the control
software for the stadium roof?

A    Multiple Condition coverage

B    Branch coverage + Modified Condition/Decision coverage

C    Branch coverage + Statement coverage

D    Modified Condition/Decision coverage

Q10: Below is the pseudo-code for a TRICKY program:
0 program TRICKY
1 var1, var2, var3 : integer
2 begin
3 read ( var2 )
4 read ( var1 )
5 while var2 < 10 loop
6 var3 = var2 + var1
7 var2 = 4
8 var1 = var2 + 1
9 print ( var3 )
10 if var1 = 5 then
11 print ( var1 )
12 else
13 print ( var1+1 )
14 endif
15 var2 = var2 + 1
16 endloop
17 write ( “Wow – that was tricky!” )
18 write ( “But the answer is…” )
19 write ( var2+var1 )
20 end program TRICKY
Which of the following statements about the TRICKY program MOST correctly describes any control
flow anomalies in it?

A    The TRICKY program contains unreachable code and an infinite loop

B    The TRICKY program contains no control flow anomalies

C    The TRICKY program contains unreachable code

D    The TRICKY program contains a loop with multiple entry points

Q11: Below is the pseudo-code for a program that calculates and prints sales commissions:
0 program Calculate Commission
1 total, number : integer
2 commission_hi, commission_lo : real
3 begin
4 read ( number )
5 while number ≠ -1 loop
6 total = total + number
7 read ( number )
8 endloop
9 if total > 1000 then
10 commission_hi = 100 + 0.2 * ( total – 1000 )
11 else
12 commission_lo = 0.15 * total
13 endif
14 write ( “This salesman’s commission is:”)
15 write ( commission_hi )
16 end program Calculate Commission
Which of the following correctly lists data flow anomalies that exist in the ‘Calculate Commission’
program?

A    A. total: line 6; commission_lo: line 12; commision_hi: line 15

B    B. commision_hi: line 10; commission_lo: line 12

C    C. number: line 5; number: line 6

D    D. total: line 6; commision_hi: line 10; commission_lo: line 12

Q12: Which of the following is a way to use call graphs to determine integration testing requirements?

A    Detecting areas to be targeted for possible memory leaks

B    Establishing the number of locations within the software from where a method or function is
called

C    Determining conditional and unconditional calls for performance analysis

D    Establishing the number of locations within the software from where a module or system is
called

Q13: You are the Technical Test Analyst working on a project developing a new Ambulance Dispatch
System (ADS). This ADS assists operators in taking calls about incidents, identifying available
ambulances and mobilizing ambulances to handle the incidents. You know that the ADS was
designed using an object-oriented approach and implemented using a language with automated
garbage collection. During system and acceptance testing the system has been perceived to be
generally performing correctly, but also rather slowly, and it has also occasionally ‘crashed’; the
subsequent (brief) investigations were inconclusive.
Which of the following statements would BEST justify the use of dynamic analysis in this situation?

A    Dynamic analysis could be used to measure response times for various functions to
subsequently allow system tuning.

B    Dynamic analysis could identify memory access violations caused by a wild pointer
that result in the occasional ‘crashes’.

C    Dynamic analysis could be used to generate call graphs of the system to allow targeted
performance enhancement.

D    Dynamic analysis could be used to determine if defects introduced by programmers failing to
release allocated memory are causing the ‘crashes’.

Q14: Assume you are working as a technical test analyst on a project where a new banking system is being
developed. This system will store customer financial data, including personally identifying information,
account numbers and balances, and transaction history. Based on this information, which of the
following topics are you most likely to need to contribute to the test plan?

A    Coordination of distributed components

B    Test data anonymization

C    Testing data encryption

D    Testing in production

Q15: A system has an editable, free-form input field labeled “File Name to Open”. Based on this
information only, which of the following security threats should you test?

A    Cross-site scripting

B    Buffer overflow

C    Denial of service

D    Breaking encryption

Q16: Scenario 1.
Assume that you are working for a start-up company with big ambitions but a limited initial funding.
They are creating a system that will provide customized loyalty and rewards programs for small- and
medium-sized businesses selling to customers on the web. These companies enroll themselves on
the system’s web store. This allows the companies to create customized buttons, to be placed on
their websites, that let customers enroll in the companies’ loyalty and rewards program. Each
subsequent purchase earns points, and both companies and their customers can manage the
program; for example, companies can determine the number of points required for customers to
receive a free product or service, and customers can monitor their points.
Your employer’s marketing staff is heavily promoting the system, offering aggressive discounts on the
first year’s fees to sign up new companies. The marketing materials state that the service will be
highly reliable and extremely fast for companies and their customers.
At this time, the requirements are complete and development of the software has just begun. The
current schedule will allow companies and their customers to enroll starting in three months.
Your employer intends to use cloud computing resources to host this service, and to have no
hardware resources other than ordinary office computers for its developers, testers, and other
engineers and managers. Industry-standard web-based application software components will be used
to build the system.
The production environment will be used for testing, and the operations team has already defined and
tested the process for configuring this environment as needed.
Refer to scenario 1. Assume that marketing wants to ensure that the system will be very fast. Which
TWO of the options should be addressed as challenges in planning for the performance testing of this
system prior to release?

A    A. Defining the performance requirements

B    B. Cost of performance test tools

C    C. Selection of test data

D    D. Compatibility of performance test tools

E    E. Configuring a production-like test environment

F    F. Developing a complex simulator

Q17: Which TWO of the following test types will be most important for a software control system that will be
integrated into a wider system and is expected to generate several variants and undergo a number of
environment changes over a period of 10 years?

A    A. Adaptability testing

B    B. Maintainability testing

C    C. Recoverability testing

D    D. Replaceability testing

E    E. Security testing

Q18: Consider the following product risk:
Abnormal application termination due to network connection failure
Which of the following is the appropriate test type to address this risk?

A    Portability testing

B    Performance testing

C    Operability testing

D    Reliability testing

Q19: Scenario 1.
Assume that you are working for a start-up company with big ambitions but a limited initial funding.
They are creating a system that will provide customized loyalty and rewards programs for small- and
medium-sized businesses selling to customers on the web. These companies enroll themselves on
the system’s web store. This allows the companies to create customized buttons, to be placed on
their websites, that let customers enroll in the companies’ loyalty and rewards program. Each
subsequent purchase earns points, and both companies and their customers can manage the
program; for example, companies can determine the number of points required for customers to
receive a free product or service, and customers can monitor their points.
Your employer’s marketing staff is heavily promoting the system, offering aggressive discounts on the
first year’s fees to sign up new companies. The marketing materials state that the service will be
highly reliable and extremely fast for companies and their customers.
At this time, the requirements are complete and development of the software has just begun. The
current schedule will allow companies and their customers to enroll starting in three months.
Your employer intends to use cloud computing resources to host this service, and to have no
hardware resources other than ordinary office computers for its developers, testers, and other
engineers and managers. Industry-standard web-based application software components will be used
to build the system.
Consider scenario 1. Assume that adequate system response time is considered one of the most
important product risks for this system.
Which of the following statements is true?

A    Dynamic performance testing should happen during code reviews.

B    Performance testing should happen after functional testing is done

C    Performance testing should start on initial builds of the system

D    Reliability testing should happen after performance testing.

Q20: Scenario 1.
Assume that you are working for a start-up company with big ambitions but a limited initial funding.
They are creating a system that will provide customized loyalty and rewards programs for small- and
medium-sized businesses selling to customers on the web. These companies enroll themselves on
the system’s web store. This allows the companies to create customized buttons, to be placed on
their websites, that let customers enroll in the companies’ loyalty and rewards program. Each
subsequent purchase earns points, and both companies and their customers can manage the
program; for example, companies can determine the number of points required for customers to
receive a free product or service, and customers can monitor their points.
Your employer’s marketing staff is heavily promoting the system, offering aggressive discounts on the
first year’s fees to sign up new companies. The marketing materials state that the service will be
highly reliable and extremely fast for companies and their customers.
At this time, the requirements are complete and development of the software has just begun. The
current schedule will allow companies and their customers to enroll starting in three months.
Your employer intends to use cloud computing resources to host this service, and to have no
hardware resources other than ordinary office computers for its developers, testers, and other
engineers and managers. Industry-standard web-based application software components will be used
to build the system.
Consider scenario 1. Assume that you are executing security tests against the system
Which of the following types of defects would you expect to find during this testing?

A    System allows unauthorized access to data

B    System clears screen too quickly after login

C    System removes user temporary files after logout

D    System allows access from unsupported browser.

Q21: Question:
You have been participating in an architectural review of a new product design. This is an embedded
product that has severe memory restrictions. Consider the following lists of programming practices
and problems that can result from using those practices.
Programming Practices:
1. Connection pooling
2. Data caching
3. Lazy instantiation
4. Transaction concurrency
Problems:
1. Performance impact when the instantiation is needed
2. Transaction loss due to processor unavailability
3. Errors in multi-threading logic
4. Stale data
Which of the above is a programming practice that can be used to reduce unnecessary memory use in
this scenario and what are the possible problems in using this practice?

A    A. Practice 1, Problem 2

B    B. Practice 2, Problem 4

C    C. Practice 4, Problem 3

D    D. Practice 3, Problem 1

Q22: Question:
You are participating in a code review and have noticed a problem in the following section of pseudocode
(assume *** indicates a comment).
*** this code checks for valid card type ***
If credit card is type “Discover” then
Display error message 437
Else if credit card is type “Visa” or “MasterCard” then
Process purchase
Else if credit card is type “AmericanExpress” then
Display error message 439
Else
Display error message 440
End if
Which of the following problems is demonstrated in this section of the code and why should it be
corrected?

A    A. An external library should be used to validate the credit card, resulting in inefficiency by not
re-using existing components

B    B. The comment in the code is incorrect, resulting in a maintainability impact

C    C. The most likely case is not tested first, resulting in a potential performance impact

D    D. There is no default clause, resulting in potential cases not being handled

Q23: Scenario 2.
Assume that you are involved in testing a mature application. This application is an online dating
service that allows users: to enter a profile of themselves; to meet orientation-appropriate people who
would be a good match for them; to arrange social events with those people; and, to block people they
don’t want to contact them.
Defects and test cases are managed in an existing commercial test management tool, which is
working well. Source code and other project work products are stored in an open source configuration
management system.
Your manager directs you to help her select a test execution automation tool to automate most of the
regression testing.
Consider scenario 2. Which of the following is an important consideration in relation to the existing
tools?

A    A. The cost of the test execution automation tool.

B    B. The process for storing and versioning automated tests.

C    C. The process of removing duplicate defect reports created by the automated tests.

D    D. Selecting a test execution automation tool from the test management tool vendor.

Q24: Which TWO of the following are typical activities performed by a Technical Test Analyst when setting
up a test automation project?

A    A. Defining the interface requirements between the project’s test management tool and
the test automation tool

B    B. Scheduling the test automation project and allocating time for maintenance with the
test manager

C    C. Designing the test data for the automated test cases

D    D. Defining the business process keywords for use in test cases when using keyword-driven
testing

E    E. Determining who will be responsible for the test analysis and design of test cases to be automated

Q25: Which of the following statements best captures the difference between data-driven and keyworddriven
test automation?

A    A. Data-driven test automation is more maintainable than keyword-driven test automation.

B    B. Data-driven test automation extends keyword-driven automation by defining data
corresponding to business processes.

C    C. Keyword-driven test automation extends data-driven automation by defining keywords
corresponding to business processes.

D    D. Keyword-driven test automation is easier to develop than data-driven test automation.

Q26: Which of the following describes a common technical issue that causes automation projects to fail to
achieve the planned return on investment?

A    A. Lack of separation between code and changeable data in the testware

B    B. Elimination of duplication of information across tools

C    C. Removal of manual checking of data exchanges between tools

D    D. Use of an integrated development environment to simplify integration between tools

Q27: Scenario 2.
Assume that you are involved in testing a mature application. This application is an online dating
service that allows users: to enter a profile of themselves; to meet orientation-appropriate people who
would be a good match for them; to arrange social events with those people; and, to block people they
don’t want to contact them.
Defects and test cases are managed in an existing commercial test management tool, which is
working well. Source code and other project work products are stored in an open source configuration
management system.
Your manager directs you to help her select a test execution automation tool to automate most of the
regression testing.
Consider scenario 2. Assume you are using a keyword-driven automation approach. Which THREE of
the options would be the MOST LIKELY keywords for this application?

A    A. Enter_Profile

B    B. Block_Person

C    C. Find_Match

D    D. Delete_Profile

E    E. Enter_Test_Data

F    F. Remove_Test_Data

Q28: Which of the following statements about fault seeding tools is NOT correct?

A    A. These tools insert defects into the source code to test the input checking capabilities of
the software

B    B. These tools insert defects into the source code to check the level of fault tolerance of the
software

C    C. These tools insert defects into the source code to check the test effectiveness of the test suite

D    D. These tools insert defects into the source code as part of the mutation testing technique

Q29: Which of the following statements about performance testing and monitoring tools is correct?

A    A. These tools drive the application at the communications protocol level rather than through its user interface to more accurately measure response times

B    B. These tools generate a load by simulating a large number of virtual users following
their designated operational profiles to generate specific volumes of input data

C    C. These tools capture a script from an individual user interaction and multiple identical copies of the script are then replayed in parallel to represent the full range of possible users

D   
D. These tools take a wide range of measurements after test execution to enable the analysis of the most significant performance characteristics of the test object

Q30: Which TWO of the following BEST describe the purpose of tools supporting web-based testing?

A    A. Scanning through the server checking for orphaned files

B    B. Checking for accessibility standards violations

C    C. Executing a model of the execution-time behavior to generate test cases

D    D. Changing variable values during line by line execution to isolate faults in the user interface

E    E. Injecting defects into the test object for test suite quality measurement

Q31: Which of the following statements BEST explains the relationship between component testing tools
and build automation tools?

A    D. A Component testing tool can be used against multiple programming languages; build
automation tools allow a new build to be triggered when a component changes

B    B. A JUnit framework can simplify automation of component testing in a Java environment; build
automation tools automatically trigger the component tests whenever a component changes in
a build

C    C. An xUnit framework can be used to automate component testing; build automation tools
execute automated component tests

D    A. Component testing frameworks can simplify automation of component testing; build
automation tools allow a new build to be triggered when a component is changed

Navigation :

ISTQB Home |  ISTQB mock tests |