Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Static analysis cannot ____________(a) Enforce coding standards(b) Help in code understanding(c) Identify anomalies or defects in the code(d) Detect memory leaksI have been asked this question by my college director while I was bunking the class.This intriguing question originated from Test-driven Development topic in division Test Coverage and Development of JUnit

Answer»

Correct OPTION is (d) DETECT memory LEAKS

Best explanation: Memory leaks occur dynamically and HENCE, static analysis cannot identify them.

2.

________________ is an approach to software testing that is concisely described as simultaneous learning, test design and test execution.(a) Data flow analysis(b) Decision testing(c) Exploratory testing(d) Use Case analysisThe question was posed to me in homework.Question is taken from Cobertura in division Test Coverage and Development of JUnit

Answer»

Correct OPTION is (C) Exploratory testing

The best I can explain: Exploratory testing is DEFINED as a STYLE of software testing that emphasizes the personal FREEDOM and responsibility of the individual tester.

3.

The purpose of the _____________ is to ensure that all requirements defined for a system are tested in the test protocols.(a) RTM(b) FDD(c) KISS(d) TMThe question was posed to me in my homework.My question comes from Testing in the Development Cycle topic in section Test Coverage and Development of JUnit

Answer»

Right OPTION is (a) RTM

The best explanation: The RTM links REQUIREMENTS and hence, ensures all the requirements are TESTED.

4.

A _____________ test is when an invalid input is put and errors are received.(a) Positive(b) Regression(c) Negative(d) NeutralThe question was asked during an interview for a job.Question is taken from Test-driven Development in chapter Test Coverage and Development of JUnit

Answer» CORRECT option is (C) Negative

Explanation: Negative TESTING tests that invalid INPUTS do not get passed by the code.
5.

The discipline of AUP which deals with managing access to project artefacts is called ______________(a) Model(b) Deployment(c) Project Management(d) Configuration ManagementI got this question in homework.This intriguing question originated from Measuring Test Coverage in chapter Test Coverage and Development of JUnit

Answer»

The correct choice is (d) CONFIGURATION Management

For EXPLANATION I would say: Configuration management includes not only TRACKING artefact versions over time but ALSO controlling and managing CHANGES to them.

6.

__________________ is a methodology for modelling and documenting software systems based on best practices.(a) TDD(b) FDD(c) Scrum(d) AMThis question was posed to me in an interview for job.I'd like to ask this question from Measuring Test Coverage topic in section Test Coverage and Development of JUnit

Answer» RIGHT option is (d) AM

Explanation: Agile modelling is a collection of values and PRINCIPLES that can be applied on an (agile) SOFTWARE DEVELOPMENT project.
7.

The review process for a particular review begins with a _____________ by the author to the moderator in formal review.(a) Request For Review(b) Requirement Analysis(c) Notice For Review(d) Goal DesignThis question was posed to me in a job interview.The question is from Writing Testable Code topic in chapter Test Coverage and Development of JUnit

Answer» CORRECT option is (a) Request For Review

To elaborate: Planning forms the FIRST STEP of a formal review which BEGINS with a request for review.
8.

_____________ is triggered by modifications, migration or retirement of existing software.(a) Regression Testing(b) Unit Testing(c) Maintenance testing(d) Integration TestingI had been asked this question in semester exam.My question is taken from Testing in the Development Cycle in portion Test Coverage and Development of JUnit

Answer»

Right option is (c) MAINTENANCE TESTING

Easiest explanation: Maintenance Testing is done on the ALREADY deployed SOFTWARE.

9.

RTM stands for ____________(a) Repeated Trade Matrix(b) Redundant Trace Module(c) Robust Test Mechanism(d) Requirement traceability matrixI have been asked this question in unit test.Asked question is from Testing in the Development Cycle in section Test Coverage and Development of JUnit

Answer»

Right choice is (d) Requirement traceability MATRIX

For explanation I WOULD say: The Requirements Traceability Matrix or RTM is a DOCUMENT that LINKS requirements throughout the validation process.

10.

A ____________ test is when a valid input is put and some action to be completed in accordance with the specification is expected.(a) Positive(b) Regression(c) Negative(d) NeutralThe question was asked in an internship interview.This intriguing question originated from Test-driven Development in chapter Test Coverage and Development of JUnit

Answer» RIGHT option is (a) Positive

To elaborate: Positive TESTING checks that the CORRECT output is produced for correct INPUTS.
11.

White box testing is ______________(a) Static(b) Dynamic(c) Infeasible(d) Time-consumingThis question was addressed to me during a job interview.The origin of the question is Test-driven Development in portion Test Coverage and Development of JUnit

Answer»

Right choice is (b) Dynamic

Best explanation: White box TESTING tests the dynamic COMPONENTS of the code including their INTERNAL STRUCTURE.

12.

Bottom up testing starts with __________(a) Root(b) Second level roots(c) Inner nodes(d) Terminal nodesThe question was posed to me in an international level competition.Asked question is from Testing in the Development Cycle topic in portion Test Coverage and Development of JUnit

Answer»

Right answer is (d) TERMINAL NODES

The explanation: SINCE bottom up testing TESTS from lower hierarchy, terminal nodes are tested first.

13.

_____________ test cases are when random test cases are performed and equivalence partitioning is applied to those test cases.(a) Random(b) Static(c) Semi-random(d) Equivalent-randomThe question was posed to me during a job interview.This question is from Test-driven Development topic in section Test Coverage and Development of JUnit

Answer»

Correct choice is (C) Semi-random

Easiest EXPLANATION: It removes redundant TEST cases, thus giving semi-random test cases.

14.

Monkey testing is more about random actions while __________ testing is more about random data input.(a) Fuzz(b) Functional(c) Ad-hoc(d) RandomThe question was asked in my homework.Query is from Measuring Test Coverage in chapter Test Coverage and Development of JUnit

Answer»

Right answer is (a) Fuzz

To explain: While monkey testing uses RANDOMIZED tests, fuzz uses randomized TEST data INPUTS.

15.

In ___________ each component at lower hierarchy is tested individually and then the components that rely upon these components are tested.(a) Top down testing(b) Unit testing(c) Bottom up(d) Load testingI got this question during an internship interview.The question is from Testing in the Development Cycle topic in portion Test Coverage and Development of JUnit

Answer»

Right CHOICE is (c) Bottom up

Easy explanation: The modules at LOWER HIERARCHY is TESTED and then the testing goes up in bottom up testing.

16.

__________ uses discovery and vulnerability scanning to identify security vulnerabilities(a) Discovery(b) Vulnerability Scan(c) Vulnerability Assessment(d) Penetration TestThe question was asked by my college professor while I was bunking the class.This key question is from Writing Testable Code topic in division Test Coverage and Development of JUnit

Answer»

Right choice is (C) VULNERABILITY Assessment

The best explanation: Vulnerability Assessment PLACES the findings into the context of the environment under TEST.

17.

___________ is a technique for gathering information about the possible set of values calculated at various points in a computer program.(a) Data flow analysis(b) Equivalence partitioning(c) Inspections(d) Decision testingI got this question during a job interview.Question is taken from Cobertura in section Test Coverage and Development of JUnit

Answer»

The CORRECT option is (a) Data FLOW analysis

Easiest explanation: Data flow analysis USES the process of collecting information about the way the variables are USED, defined in the program.

18.

Decision table technique is sometimes also referred to as a ________ table.(a) Cause-effect(b) Redundant(c) Extreme(d) IsolatedThis question was posed to me in an online quiz.This interesting question is from Testing in the Development Cycle in division Test Coverage and Development of JUnit

Answer»

Right option is (a) Cause-effect

To EXPLAIN I would say: An associated LOGIC diagramming technique KNOWN as ‘cause-effect graphing’ is sometimes used to HELP derive the decision table.

19.

Monkey Testing is also included in Android Studio as part of the standard testing tools for ______________(a) Unit Testing(b) Stress Testing(c) Functional Testing(d) Integration TestingI got this question by my college professor while I was bunking the class.Origin of the question is Measuring Test Coverage in section Test Coverage and Development of JUnit

Answer» RIGHT answer is (b) Stress TESTING

To explain: Monkey testing is USED to implement stress testing on the ANDROID Studio.
20.

A major benefit of exploratory testing is that testers can use ______________ based on the results of previous results.(a) Deductive Reasoning(b) Object Creation(c) Garbage Collection(d) ModularityThis question was addressed to me during an interview.The above asked question is from Cobertura topic in section Test Coverage and Development of JUnit

Answer»

Correct answer is (a) DEDUCTIVE Reasoning

To explain: Deductive reasoning helps testers to GUIDE their FUTURE testing on the FLY.

21.

Exploratory testing is particularly suitable if _______________ and specifications are incomplete.(a) Investment(b) Time(c) Requirements(d) DeadlinesThe question was asked during an online exam.My query is from Cobertura topic in portion Test Coverage and Development of JUnit

Answer» RIGHT choice is (C) Requirements

Explanation: Exploratory TESTING can be used to verify that previous testing has FOUND the most IMPORTANT defects.
22.

______________ is a process which is intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended.(a) Integrity Testing(b) Unit Testing(c) Security Testing(d) Stress testingThis question was posed to me by my college professor while I was bunking the class.My query is from Writing Testable Code in chapter Test Coverage and Development of JUnit

Answer»

The CORRECT option is (c) Security Testing

To explain: Typical security requirements may include specific elements of CONFIDENTIALITY, integrity, availability, AUTHENTICATION, AUTHORIZATION and non-repudiation.

23.

________________ simulates an attack by a malicious party.(a) Security Audit(b) Vulnerability Scan(c) Vulnerability Assessment(d) Penetration TestThis question was addressed to me during an interview for a job.I'm obligated to ask this question of Writing Testable Code in portion Test Coverage and Development of JUnit

Answer»

The correct option is (d) Penetration Test

The EXPLANATION: Penetration Test APPROACH LOOKS at the DEPTH of attack in comparison to the Security ASSESSMENT approach.

24.

RTM is prepared ___________(a) After test case designing(b) Before test case designing(c) During test case designing(d) Not preparedI have been asked this question in a job interview.I would like to ask this question from Testing in the Development Cycle topic in division Test Coverage and Development of JUnit

Answer»

Correct OPTION is (b) Before test CASE DESIGNING

The EXPLANATION: Requirements should already be TRACEABLE from Review activities ande RTM is prepared before test case designing.

25.

____________ is a software testing technique that divides the input data of a software unit into partitions of equivalent data from which test cases can be derived.(a) Data flow analysis(b) Equivalence partitioning(c) Inspections(d) Decision testingThe question was asked in examination.The doubt is from Cobertura topic in portion Test Coverage and Development of JUnit

Answer»

The CORRECT option is (B) Equivalence partitioning

The BEST I can explain: In principle of Equivalence partitioning, test CASES are DESIGNED to cover each partition at least once.

26.

________________ is a technique used to identify the requirements of a system (usually associated with software/process design) and the information used to both define both processes used and classes (a collection of actors and processes).(a) Data flow analysis(b) Use Case analysis(c) Exploratory testing(d) Decision testingThis question was addressed to me in an international level competition.This interesting question is from Cobertura topic in portion Test Coverage and Development of JUnit

Answer»

Right choice is (B) USE Case analysis

The EXPLANATION is: The use case analysis is the foundation UPON which the system will be BUILT.

27.

Random testing often known as __________ testing(a) Monkey(b) Amorous(c) Sporadic(d) UnknownThe question was posed to me in an online quiz.This question is from Measuring Test Coverage in portion Test Coverage and Development of JUnit

Answer» CORRECT answer is (a) Monkey

To explain: The source of the name monkey testing comes from the infinite monkey THEOREM.
28.

___________ is a model that illustrates how testing activities integrate with software development phases.(a) Waterfall Model(b) V-Model(c) Spiral Model(d) Iterative ModelI got this question during an interview for a job.The above asked question is from Testing in the Development Cycle topic in section Test Coverage and Development of JUnit

Answer» RIGHT option is (b) V-MODEL

Easy explanation: The V-model represents a development PROCESS that may be considered to be an EXTENSION of the waterfall model.
29.

_______________ of information refers to protecting information from being modified by unauthorized parties.(a) Confidentiality(b) Authentication(c) Authorization(d) IntegrityThis question was posed to me in my homework.Query is from Writing Testable Code in portion Test Coverage and Development of JUnit

Answer» CORRECT option is (d) INTEGRITY

Explanation: Integrity of information is intended to allow the RECEIVER to DETERMINE that the information PROVIDED by a system is correct.
30.

Exploratory testing is often thought of as a ______________ technique.(a) White box testing(b) Functional testing(c) Non-functional testing(d) Black box testingThis question was addressed to me in quiz.This question is from Cobertura in division Test Coverage and Development of JUnit

Answer» RIGHT choice is (d) Black box testing

Explanation: EXPLORATORY testing does not require the INTERNALS of the product to be known and HENCE, is THOUGHT of as a type of black box testing.
31.

DRE stands for ____________(a) Defect Removal Efficiency(b) Detect Redundant Errors(c) Defectively Run Enumerations(d) Detect Random ErrorThis question was posed to me in examination.Query is from Testing in the Development Cycle in division Test Coverage and Development of JUnit

Answer»

The correct option is (a) Defect Removal Efficiency

To explain I would say: It is a powerful METRIC USED to measure TEST EFFECTIVENESS.

32.

Which tools is involved in the automation of regression test?(a) Data tester(b) Boundary tester(c) Capture/Playback(d) Output comparator.The question was posed to me by my school principal while I was bunking the class.I want to ask this question from Test-driven Development topic in division Test Coverage and Development of JUnit

Answer»

Correct CHOICE is (d) Output comparator.

To explain I would say: The Output comparator is a USEFUL FEATURE for seeing exactly what the error is in a test failure.

33.

________________ means to ensure that a transferred message has been sent and received by the intended parties who are claiming to have sent and received the message.(a) Confidentiality(b) Authentication(c) Non-repudiation(d) IntegrityThis question was posed to me by my college professor while I was bunking the class.My enquiry is from Writing Testable Code in portion Test Coverage and Development of JUnit

Answer»

Right option is (C) Non-repudiation

For explanation: Non-repudiation is USED to GUARANTEE that the sender of a message cannot later DENY having sent the message.

34.

_______________ ensures the original fault has been removed.(a) Regression testing(b) Re-testing(c) Negative testing(d) Positive testingThis question was posed to me by my school principal while I was bunking the class.This is a very interesting question from Test-driven Development in portion Test Coverage and Development of JUnit

Answer»

The correct answer is (b) Re-TESTING

The best I can explain: Regression testing LOOKS for unexpected SIDE EFFECTS while retesting ensures the original errors are removed.

35.

An input field takes the year as input between 1800 and 2016, the boundary values for testing this field are ___________(a) 1899,1900,2004,2005(b) 1799,1900,2004,2005(c) 1799,1800,2016,2017(d) 1600,1700,1800,1900The question was posed to me in quiz.This interesting question is from Test-driven Development in division Test Coverage and Development of JUnit

Answer»

Right option is (C) 1799,1800,2016,2017

Explanation: Only option (c) has the 4 boundary VALUES for the given INPUT RANGE of 1800 to 2016.

36.

White box testing is also known as _____________(a) Structure-based testing(b) Black box testing(c) Free testing(d) Closed testingThe question was asked in quiz.The question is from Test-driven Development topic in portion Test Coverage and Development of JUnit

Answer» RIGHT option is (a) STRUCTURE-based TESTING

For explanation I would say: Structure-based testing techniques use the internal structure of the software to derive test CASES.
37.

_________ is driven by an Audit or a Risk function to look at a specific control or compliance issue.(a) Security Audit(b) Vulnerability Scan(c) Vulnerability Assessment(d) Penetration TestThis question was posed to me in a job interview.Query is from Writing Testable Code in division Test Coverage and Development of JUnit

Answer»

Right option is (a) SECURITY Audit

To EXPLAIN I would say: Characterized by a narrow scope, Security audit is used to diagnose a compliance issue or specific CONTROL.

38.

______________ have no knowledge about the application or system in monkey testing.(a) Cloned Objects(b) Smart Monkey tests(c) Dumb Monkey tests(d) Fuzz testsI got this question during an interview for a job.I'm obligated to ask this question of Measuring Test Coverage topic in portion Test Coverage and Development of JUnit

Answer»

The correct answer is (c) DUMB MONKEY TESTS

Easiest EXPLANATION: Dumb monkey tests don’t know if their input or behaviour is VALID or invalid.

39.

Configuration management procedures be implemented during ____________(a) Test Execution(b) Test Planning(c) Test Design(d) Test SuccessThe question was asked during a job interview.Asked question is from Writing Testable Code topic in section Test Coverage and Development of JUnit

Answer»

Correct option is (b) Test PLANNING

The explanation: Configuration management PROCEDURES allow the testers to MANAGE their TESTWARE and hence, should be implemented during test planning.

40.

_____________looks for known security issues by using automated tools to match conditions with known vulnerabilities.(a) Discovery(b) Vulnerability Scan(c) Security Assessment(d) Penetration TestI have been asked this question in a national level competition.This key question is from Writing Testable Code topic in portion Test Coverage and Development of JUnit

Answer»

The CORRECT CHOICE is (b) Vulnerability Scan

To explain: Vulnerability scanning is supplemented with credential BASED scanning thatremove some COMMON false positives.

41.

A Use-case realization describes how a particular __________ is realized within the design model.(a) Class(b) Object(c) Use case(d) FunctionI had been asked this question in an online quiz.Question is taken from Cobertura topic in chapter Test Coverage and Development of JUnit

Answer»

Correct choice is (c) USE case

Easiest explanation: A use case is realized within the design in TERMS of collaborating objects.

42.

The main advantage of exploratory testing is that less _______________ is needed.(a) Investment(b) Preparation(c) Knowledge(d) AccuracyI got this question in an online quiz.Question is from Cobertura in division Test Coverage and Development of JUnit

Answer» RIGHT ANSWER is (b) Preparation

Easy explanation: IMPORTANT bugs are found quickly in exploratory testing.
43.

______________ describes a simple and easy to understand approach to developing business application software using agile techniques and concepts while still remaining true to the RUP.(a) RUPP(b) Scrum(c) AUP(d) EUPThe question was asked during an online exam.My question is taken from Measuring Test Coverage topic in division Test Coverage and Development of JUnit

Answer»

Correct answer is (c) AUP

Easiest explanation: AUP, which STANDS for Agile Unified Process, applies agile techniques INCLUDING test-driven development (TDD) and agile MODELLING (AM).

44.

______________ is an adaptable process framework, intended to be tailored by the development organizations that will select the elements of the process that are appropriate for their needs.(a) RUP(b) AOP(c) FDD(d) XPThe question was asked by my school principal while I was bunking the class.Origin of the question is Measuring Test Coverage topic in division Test Coverage and Development of JUnit

Answer»

Right answer is (a) RUP

Explanation: Rup, which stands for RATIONAL UNIFIED PROCESS, is the ADAPTABLE process framework.

45.

UML stands for _______________(a) Unknown Markup Language(b) Unified Modelling Language(c) Universal Markup Language(d) Universal Modelling LanguageThe question was posed to me in a job interview.This is a very interesting question from Measuring Test Coverage in division Test Coverage and Development of JUnit

Answer»

Right CHOICE is (b) Unified Modelling Language

Explanation: UML is one TOOL that can be used to MAKE the TASK of model visualization more feasible.