Maven/Maven Mcq Set 5 Sample Test,Sample questions

adplus-dvertising

Question:
 A ______ is the basic unit of development in Scrum.

1.Class

2.Manifesto

3. Slice

4. Sprint

Posted Date:-2022-01-08 05:27:36


Question:
 The discipline of AUP which deals with managing access to project artefacts is called ______

1. Model

2.Deployment

3. Project Management

4. Configuration Management

Posted Date:-2022-01-08 05:34:01


Question:
 The Sprint is a/an ___________ effort.

1.Timeboxed

2.Closed

3.Sandboxed

4. Open

Posted Date:-2022-01-08 05:28:36


Question:
 The ______ is the sum of all the Product Backlog Items completed during a Sprint.

1. Sprint burn-down char

2.Release burn-up chart

3. Potentially shippable increment

4. Scrumban

Posted Date:-2022-01-08 05:31:19


Question:
 Which tools is involved in the automation of regression test?

1.Data tester

2.Boundary tester

3.Capture/Playback

4.Output comparator.

Posted Date:-2022-01-08 05:54:47


Question:
 White box testing is also known as ______

1.Structure-based testing

2. Black box testing

3.Free testing

4.Closed testing

Posted Date:-2022-01-08 05:52:57


Question:
A key principle of Scrum is ______

1. Strict requirements

2.Requirements volatility

3.Fixed scale development

4.Cross-functional development

Posted Date:-2022-01-08 05:23:17


Question:
A major benefit of exploratory testing is that testers can use ____based on the results of previous results.

1.Deductive Reasoning

2. Object Creation

3.Garbage Collection

4.Modularity

Posted Date:-2022-01-08 05:45:02


Question:
A Use-case realization describes how a particular __________ is realized within the design model.

1.Class

2. Object

3.Use case

4.Function

Posted Date:-2022-01-08 05:42:55


Question:
A _______ test is when an invalid input is put and errors are received.

1.Positive

2.Regression

3.Negative

4. Neutral

Posted Date:-2022-01-08 05:53:56


Question:
A ____________ test is when a valid input is put and some action to be completed in accordance with the specification is expected.

1.Positive

2. Regression

3.Negative

4.Neutral

Posted Date:-2022-01-08 05:54:19


Question:
An input field takes the year as input between 1800 and 2016, the boundary values for testing this field are _____

1. 1899,1900,2004,2005

2.1799,1900,2004,2005

3. 1799,1800,2016,2017

4.1600,1700,1800,1900

Posted Date:-2022-01-08 05:55:17


Question:
At the ______ the team reflects on the past Sprint.

1.Sprint Review

2. Daily Scrum

3.Sprint Retrospective

4.Sprint Reflection

Posted Date:-2022-01-08 05:29:35


Question:
Configuration management procedures be implemented during ______

1.Test Execution

2. Test Planning

3. Test Planning

4.Test Success

Posted Date:-2022-01-08 05:49:07


Question:
Each day during a Sprint, the team holds a ______ with specific guidelines.

1. Impediment

2. Daily Scrum

3.Backlog refinement

4. Scrum of Scrums

Posted Date:-2022-01-08 05:29:07


Question:
Equivalence Partitioning, Use Case Testing and Decision Testing are _______ techniques.

1. Static

2.Dynamic

3.Outdated

4.Infeasible

Posted Date:-2022-01-08 05:48:06


Question:
Exploratory testing is often thought of as a _______ technique.

1.White box testing

2.Functional testing

3.Non-functional testing

4.Black box testing

Posted Date:-2022-01-08 05:43:55


Question:
Exploratory testing is particularly suitable if ______ and specifications are incomplete.

1. Investment

2.Time

3.Requirements

4.Deadlines

Posted Date:-2022-01-08 05:45:29


Question:
Monkey testing is also different from _____________ testing in that ad-hoc testing is performed without planning and documentation.

1. Fuzz

2.Functional

3. Ad-hoc

4.Random

Posted Date:-2022-01-08 05:36:18


Question:
Monkey Testing is also included in Android Studio as part of the standard testing tools for _______

1.Unit Testing

2.Stress Testing

3.Functional Testing

4.Integration Testing

Posted Date:-2022-01-08 05:34:52


Question:
Monkey testing is more about random actions while __________ testing is more about random data input.

1.Fuzz

2.Functional

3.Ad-hoc

4.Random

Posted Date:-2022-01-08 05:35:52


Question:
Random testing often known as __________ testing

1. Monkey

2.Amorous

3.Sporadic

4.Unknown

Posted Date:-2022-01-08 05:34:26


Question:
Static analysis cannot ______

1.Enforce coding standards

2.Help in code understanding

3.Identify anomalies or defects in the code

4. Detect memory leaks

Posted Date:-2022-01-08 05:55:48


Question:
The main advantage of exploratory testing is that less _____ is needed.

1.Investment

2. Preparation

3. Knowledge

4.Accuracy

Posted Date:-2022-01-08 05:44:35


Question:
The review process for a particular review begins with a _____________ by the author to the moderator in formal review.

1.Request For Review

2. Requirement Analysis

3.Notice For Review

4.Goal Design

Posted Date:-2022-01-08 05:48:40


Question:
The _____ is the list of work the Development Team must address during the next Sprint.

1. Sprint Review

2. Sprint Backlog

3. Product Increment

4.Product backlog

Posted Date:-2022-01-08 05:30:30


Question:
The _______ comprises an ordered list of requirements that a Scrum Team maintains for a product.

1.Sprint Review

2. Sprint Backlog

3. Product Increment

4.Product backlog

Posted Date:-2022-01-08 05:30:01


Question:
The _________ represents the product’s stakeholders and the voice of the customer

1.Development Team

2.Scrum Master

3.Product Owner

4. Servant-leader

Posted Date:-2022-01-08 05:23:56


Question:
UML stands for _______

1.Unknown Markup Language

2. Unified Modelling Language

3.Universal Markup Language

4.Universal Modelling Language

Posted Date:-2022-01-08 05:32:28


Question:
White box testing is ______

1.Static

2.Dynamic

3. Infeasible

4.Time-consuming

Posted Date:-2022-01-08 05:53:30


Question:
_____ defines “a flexible, holistic product development strategy where a development team works as a unit to reach a common goal”.

1.Scrum

2.FDD

3.DevOps

4.MDD

Posted Date:-2022-01-08 05:22:47


Question:
_____ have no knowledge about the application or system in monkey testing.

1.Cloned Objects

2. Smart Monkey tests

3.Dumb Monkey tests

4.Fuzz tests

Posted Date:-2022-01-08 05:35:17


Question:
_____ is driven by an Audit or a Risk function to look at a specific control or compliance issue.

1.Security Audit

2.Vulnerability Scan

3. Vulnerability Assessment

4.Penetration Test

Posted Date:-2022-01-08 05:58:44


Question:
_____ uses discovery and vulnerability scanning to identify security vulnerabilities

1. Discovery

2.Vulnerability Scan

3.Vulnerability Assessment

4.Penetration Test

Posted Date:-2022-01-08 05:58:19


Question:
______ builds upon Vulnerability Assessment by adding manual verification to confirm exposure.

1.Security Audit

2. Security Assessment

3.Vulnerability Assessment

4.Penetration Test

Posted Date:-2022-01-08 05:59:35


Question:
______ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended.

1.Integrity Testing

2. Unit Testing

3.Security Testing

4.Stress testing

Posted Date:-2022-01-08 05:49:33


Question:
______ is a technique for gathering information about the possible set of values calculated at various points in a computer program.

1.Data flow analysis

2.Equivalence partitioning

3.Inspections

4.Decision testing

Posted Date:-2022-01-08 05:41:51


Question:
______ is an approach to software testing that is concisely described as simultaneous learning, test design and test execution.

1.Data flow analysis

2.Decision testing

3. Exploratory testing

4.None of the mentioned

Posted Date:-2022-01-08 05:43:19


Question:
______ is normally used to evaluate a product to determine its suitability for intended use and to identify discrepancies.

1.Supervisor Review

2. Technical Review

3.Decision Review

4.Design Review

Posted Date:-2022-01-08 05:57:08


Question:
______ of information refers to protecting information from being modified by unauthorized parties.

1.Confidentiality

2.Authentication

3.Authorization

4. all of the mentioned

Posted Date:-2022-01-08 05:50:14


Question:
______ test cases are when random test cases are performed and equivalence partitioning is applied to those test cases.

1.Random

2.Static

3.Semi-random

4.Equivalent-random

Posted Date:-2022-01-08 05:56:39


Question:
_______ describes a simple and easy to understand approach to developing business application software using agile techniques and concepts while still remaining true to the RUP.

1.RUPP

2. Scrum

3.AUP

4.EUP

Posted Date:-2022-01-08 05:32:55


Question:
_______ ensures the original fault has been removed.

1.Regression testing

2.Re-testing

3.Negative testing

4.Positive testing

Posted Date:-2022-01-08 05:56:14


Question:
_______ helps visualizing both the processes and the data of a method.

1.Configuration Management.

2.Domain Object Modelling

3.MetaModeling

4.Inspections

Posted Date:-2022-01-08 05:20:32


Question:
_______ is a methodology for modelling and documenting software systems based on best practices.

1.TDD

2. FDD

3.Scrum

4.AM

Posted Date:-2022-01-08 05:33:35


Question:
_______ is a software testing technique that divides the input data of a software unit into partitions of equivalent data from which test cases can be derived.

1. Data flow analysis

2.Equivalence partitioning

3.Inspections

4.Decision testing

Posted Date:-2022-01-08 05:47:29


Question:
_______ looks for known security issues by using automated tools to match conditions with known vulnerabilities.

1.Discovery

2.Vulnerability Scan

3.Security Assessment

4.Penetration Test

Posted Date:-2022-01-08 05:57:51


Question:
________ is a technique used to identify the requirements of a system (usually associated with software/process design) and the information used to both define both processes used and classes (a collection of actors and processes).

1.Data flow analysis

2.Use Case analysis

3.Exploratory testing

4. Decision testing

Posted Date:-2022-01-08 05:42:20


Question:
________ is an adaptable process framework, intended to be tailored by the development organizations that will select the elements of the process that are appropriate for their needs.

1.RUP

2.AOP

3. FDD

4.XP

Posted Date:-2022-01-08 05:31:59


Question:
________ simulates an attack by a malicious party.

1.Security Audit

2.Vulnerability Scan

3.Vulnerability Assessment

4. Penetration Test

Posted Date:-2022-01-08 05:59:08


More MCQS

  1. Maven Mcq Set 1
  2. Maven Mcq Set 2
  3. Maven Mcq Set 3
  4. Maven Mcq Set 4
  5. Maven Mcq Set 5
  6. Maven Mcq Set 6
  7. Maven Mcq Set 7
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!