0% found this document useful (0 votes)
275 views13 pages

MCQS +SUbjective Paper - CS608

Uploaded by

Saad Bin Sajid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views13 pages

MCQS +SUbjective Paper - CS608

Uploaded by

Saad Bin Sajid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

vuexamguide.

com
FINAL TERM EXAMINATION
Fall 2022
CS608 - Software Verification and Validation

Time: 90 min
Marks: 60

Question No: 1 (Marks: 01) - Please choose the correct option

Software reliability is one of the important factor of_________.

A. Software quality
B. Software testing
C. Software design
D. Requirement gathering

Question No: 2 (Marks: 01) - Please choose the correct option

A. Bug
B. Fault
C. Error
D. Failure

Question No: 3 (Marks: 01) - Please choose the correct option

______ is an activity that must be carried out throughout the life-cycle.

A. Planing
B. Testing
C. Coding
D. Maintenance

Question No: 4 (Marks: 01) - Please choose the correct option

Which of the following statement is related to validation?

A. Are we building the right product


B. Are we building the product right
C. Are our develop product satisfy all condition
D. The software is on right direction

Question No: 5 (Marks: 01) - Please choose the correct option

Validation is carried out by______ and Verification is carried out by_______.

A. Testing team, QA team


B. QA team, testing team
C. Testing, codding team
D. QA team, Administrative team

Question No: 6 (Marks: 01) - Please choose the correct option

The system should only allow authorized access, it is an example of_________.

A. Functional requirement
B. User requirement
C. Non-functional requirements
D. Include use case

Question No: 7 (Marks: 01) - Please choose the correct option

__________is fault/failure detection through static and/or dynamic testing of artefacts.

A. Quality attribute
B. Validation
C. Testing
D. Quality control

Question No: 8 (Marks: 01) - Please choose the correct option

Which of the following testing approach known as program-based testing?

A. White box
B. Black box
C. Out of box
D. Gray box

Question No: 9 (Marks: 01) - Please choose the correct option

Drivers are ________, which is used when the sub modules are ready but the main
module is still not ready.

A. Dummy code
B. Actual code
C. Sub code
D. Functional code

Question No: 10 (Marks: 01) - Please choose the correct option

Which of the following testing technique is used to test that data accepted by that API /
tool is correct?

A. Unit testing
B. Integration testing
C. Automation testing
D. System testing

Question No: 11 (Marks: 01) - Please choose the correct option

In _________ ,Review process doesn't involve management participation.

A. Team reviews
B. Client reviews
C. Peer review
D. Customer reviews

Question No: 12 (Marks: 01) - Please choose the correct option

__________ is a testing technique that focuses on measuring the adequacy of test cases.
A. Unit testing
B. Top down testing
C. Integration testing
D. Mutation Testing

Question No: 13 (Marks: 01) - Please choose the correct option

Formal conformance testing techniques based on __________.

A. Formal test cases


B. Finite state machine (FSM)
C. Transition
D. Formal requirement
Question No: 14 (Marks: 01) - Please choose the correct option

A test case is adequate if it is useful in detecting _______in a program.

A. Functions
B. Outputs
C. faults
D. Logical error

Question No: 15 (Marks: 01) - Please choose the correct option

Fault Seeding, is used to estimate the ________ remaining in a program.

A. Number of uncovered paths


B. Number of bugs
C. Test cases
D. Number of errors

Question No: 16 (Marks: 01) - Please choose the correct option

Interface-based testing is ________ while interaction-based is _______.

A. Structural, behavioral
B. Behavioral, structural
C. Dynamic, static
D. Static, dynamic

Question No: 17 (Marks: 01) - Please choose the correct option

_________ is a programming language mechanism by which one unit transfers control to


another unit.

A. Flow graph
B. Message
C. Sequence
D. Transition flow

Question No: 18 (Marks: 01) - Please choose the correct option

The call Graph of a program is a_________ in which nodes are units and edges
correspond to actual program calls.

A. Undirected graph
B. Connected graph
C. Next neighbor graph
D. Directed graph

Question No: 19 (Marks: 01) - Please choose the correct option

_________ is a decomposition technique that extracts statements relevant to a particular


computation from a program.

A. Program decomposition
B. Statistical analyzing
C. Program slice
D. Toggling

Question No: 20 (Marks: 01) - Please choose the correct option

In a Control Flow Graph, A __________ represents a conditional statement.

A. Predicate node
B. Conditional node
C. Terminal node
D. Statement node

Question No: 21 (Marks: 01) - Please choose the correct option

In software testing, we need to perform the test planning activity, the output of this
activity is termed as_________.

A. Test plan design


B. Test Plan environment
C. Test Plan document
D. Test Plan ingredients

Question No: 22 (Marks: 01) - Please choose the correct option

A test case is a ______________ rather than a ______________.

A. Single activity, Process


B. Testing, Process
C. A simple activity, Complex Process
D. Process, Single activity

Question No: 23 (Marks: 01) - Please choose the correct option

As part of Test data management, consider we have a learning management system that is
under development which can be treated as _______________.

A. Software Under Test (SUT)


B. System Under Test (SUT)
C. System Attack Test (SAT)
D. System Under Task (SUT)

Question No: 24 (Marks: 01) - Please choose the correct option

Software Testing Lifecycle (STLC) involves System under test (SUT) Analysis, Test
Planning, Test case development, Test Environment setup, ______________, and Test
Cycle closure.

A. Test Execution
B. Test Integration
C. Test Design
D. Test Deployment

Question No: 25 (Marks: 01) - Please choose the correct option

___________________ usually refers to testing activities during the software


maintenance phase.

A. Black box Testing


B. Unit Testing
C. Regression testing
D. Acceptance testing

Question No: 26 (Marks: 01) - Please choose the correct option

____________ do regression testing at the function level.


A. Requirements Engineers
B. Deployment Engineers
C. Designers
D. Test engineers

Question No: 27 (Marks: 01) - Please choose the correct option


In safety-critical software applications, the most appropriate method for
___________________is to re-test everything/all.

A. Unit Testing
B. Random Testing
C. Regression Test Selection
D. Progressive testing

Question No: 28 (Marks: 01) - Please choose the correct option

In estimating __________________ we try to find out the system behavior that is


subjected to the expected load.

A. User load
B. Minimum load
C. Normal load
D. Maximum load

Question No: 29 (Marks: 01) - Please choose the correct option

________________ are used for evaluating and measuring the Software Processes,
Services, and products.

A. Software Goals
B. Software Metrics
C. Software Requirements
D. Software Functions

Question No: 30 (Marks: 01) - Please choose the correct option

In the Test Metrics Life cycle, we ______________ at the evaluation stage.

A. Calculate metrics values using data


B. Identify Metrics to use
C. Define Metrics and parameters
D. Collect feedback

Question No: 31 (Marks: 01) - Please choose the correct option


________________ gives the percentage of invalid defects that the testing team has
opened and which needs to be controlled.

A. Defect Rejection
B. Defect Acceptance
C. Bad Fix Defect
D. Defect Severity Index

Question No: 32 (Marks: 01) - Please choose the correct option

_______________ helps us to indicate the defects missed out during the testing phase
and hence migrated to the next phase.

A. Test Execution Productivity


B. Test Case Productivity
C. Defect Rejection
D. Test Efficiency

Question No: 33 (Marks: 01) - Please choose the correct option

Network Vulnerability, Web Vulnerability, Wireless Driving, Phone Network, and


Physical Security Auditing are the different forms of _____________.

A. Penetration Testing
B. Unit testing
C. Deployment Testing
D. Load Testing

Question No: 34 (Marks: 01) - Please choose the correct option

________________ makes only limited information available to the tester to attack the
system externally.

A. Black Box Penetration Testing


B. White Box Penetration Testing
C. Gray Box Penetration testing
D. Load Based Testing

Question No: 35 (Marks: 01) - Please choose the correct option

______________ is concerned with identifying the exposure to attacks and determining


their severity.
A. Vulnerability Analysis
B. Exploitation
C. Post-Exploitation Reporting
D. Threat Modelling

Question No: 36 (Marks: 01) - Please choose the correct option

NMap, Nessus, Metasploit, Wireshark, and Veracode are some of the most commonly
used tools used for _________________.

A. Manual Penetration Testing


B. White Box Penetration Testing
C. Automated Penetration Testing
D. Vulnerability Analysis

Question No: 37 (Marks: 01) - Please choose the correct option

___________ is an approach to GUI Testing where we launch the application in testing


code to obtain references to the various components and send events to them.

A. Glass box
B. Black box
C. Automated Penetration Testing
D. Manual Penetration Testing

Question No: 38 (Marks: 01) - Please choose the correct option

____________ is best suited to smaller and very critical systems, and where fault
localization can be achieved easily.

A. Fault Seeding
B. Mutation Testing
C. White Box Penetration Testing
D. Load Based Testing

Question No: 39 (Marks: 01) - Please choose the correct option

Abstract syntax tree, Control flow graph, Program dependence graph, Call graph, and
Points-to relations are the types of _______________.

A. Dynamic program representations


B. Hybrid program representations
C. Static program representations
D. Semi-Hybrid program representations

Question No: 40 (Marks: 01) - Please choose the correct option

____________ captures the complete path followed by a program during execution. It is


analyzed to determine execution frequencies of shorter program paths.

A. Program Dependence Graph


B. Control Flow Graph
C. Abstract Syntax Tree (AST)
D. Points-to relations

Question No: 41 (Marks: 03)

Different testing strategies are available you are required to write the the name of any two
of them.

Answer

Question No: 42 (Marks: 03)

What are the two important goals of software testing?

Answer

Question No: 43 (Marks: 03)

Following are some items evaluating during to validation and verification process. You
are require to identify whether these are related to validation or verification.

Column A Validation/verification
Actual product
Code
Plans

Answer

Question No: 44 (Marks: 03)

How can we select the subset of test cases from the existing test suite as part of the
System under Test (SUT)?

Answer

Question No: 45 (Marks: 03)

What are the three (3) key phases involved in Penetration Testing?
Answer

Question No: 46 (Marks: 03)

Given a list of program representations, you are required to classify each term whether it
belongs to Static or dynamic program representations.
List:
1. Abstract syntax tree
2. Control flow trace
3. Control flow graph
4. Whole execution trace
Static Program Representation Dynamic Program Representation

Answer
Question No: 47 (Marks: 05)

Write down any five quality factors which are known as non-functional requirements for
a software system.

Answer

Question No: 48 (Marks: 05)

Faults have different levels of severity, you are required to write down at least five levels
of severity.

Answer

Question No: 49 (Marks: 05)

Identify the steps that are involved in Software Testing Lifecycle (STLC).

Answer

Question No: 50 (Marks: 05)

You are required to identify the Four Defects Related to Metrics used in Software
Testing.
Answer
vuexamguide.com

You might also like