Cine
Comida
ISTQB - Group 1
ISTQB - Group 2
Data
100

Esta película narra las aventuras de juguetes cuando los dueños no están presentes.

Toy Story

100

Las Coyotas son un postre tradicional del estado de Sonora, elaborado con harina de trigo, manteca vegetal, leche, azúcar y relleno de piloncillo.

Verdadero o Falso?

Verdadero

100

What is quality?

a) Activities focused on providing confidence that quality requirements will be fulfilled

b) The degree to which a component or system satisfies the stated and implied needs of its various stakeholders

c) The degree to which a component or system protects information and data so that persons or other components or systems have the degree of access appropriate to their types and levels of authorization

d) The total costs incurred on quality activities and issues and often split into prevention costs, appraisal costs, internal failure costs and external failure costs

b) The degree to which a component or system satisfies the stated and implied needs of its various stakeholders

100

You are working as a tester on an online banking system. Availability is considered one of the top products (quality) risks for the system. You find a reproducible failure that results in customers losing their connections to the bank Web site when transferring funds between common types of accounts and being unable to reconnect for between three and five minutes.

Which of the following would be a good summary for a defect report for this failure, one that captures both the essence of the failure and its impact on stakeholders?

a) Web server logs show error 0x44AB27 when running test 07.005, which is not an expected error message in /tmp filesystem

b) Developers have introduced major availability defect which will seriously upset our customers

c) Performance is slow and reliability flaky under load

d) Typical funds-transfer transaction results in termination of customer session, with a delay in availability when attempting to reconnect

d) Typical funds-transfer transaction results in termination of customer session, with a delay in availability when attempting to reconnect

100

Data leakage threats do not usually occur from which of the following?

  • a) Web and email
  • b) Mobile data storage
  • c) USB drives and laptops
  • d) Television

d) Television

200

Esta película del 2018 esta basada en la vida y obra del vocalista de una de las más grandes bandas de Rock Ingles.

Bohemian Rhapsody

200

Que tipo de pan se usa en los pambazos?

  • Birote
  • Pan Francés
  • Bolillo
  • Telera

Telera

200

Which of the following statements is true?

a) Impact analysis is useful for confirmation testing during maintenance testing

b) Confirmation testing is useful for regression testing during system design

c) Impact analysis is useful for regression testing during maintenance testing

d) Confirmation testing is useful for impact analysis during maintenance testing

c) Impact analysis is useful for regression testing during maintenance testing

200

Which of the following is a true statement about exploratory testing?

a) More experienced testers who have tested similar applications and technologies are likely to do better than less experienced testers at exploratory testing

b) Exploratory testing does not identify any additional tests beyond those that would result from formal test techniques

c) The time required to complete an exploratory testing session cannot be predicted in advance

d) Exploratory testing can involve the use of black-box techniques but not white-box techniques

a) More experienced testers who have tested similar applications and technologies are likely to do better than less experienced testers at exploratory testing

200

Email or phone calls that seem official to gain access or personal information is called __________ 

  • a) Tailgating
  • b) Phishing.
  • c) Shoulder surfing
  • d) Hadooken

b) Phishing.

300

Este actor es conocido por haber perdido en diversas ocaciones el Oscar para ganarlo después al ser devorado por un oso.

Leonardo DiCaprio

300

Por qué el mezcal o tequila lleva un gusano?

  • Le da sabor
  • Es una tradición prehispánica
  • Solo por estética

Es una tradición prehispánica

300

Consider the following types of defects that a test level might focus on:

1. Defects in separately testable modules or objects

2. Not focused on identifying defects

3. Defects in interfaces and interactions

4. Defects in the whole test object

Which of the following list correctly matches test levels from the Foundation syllabus with the defect focus options given above?

a) 1 = performance test; 2 = component test; 3 = system test; 4 = acceptance test

b) 1 = component test; 2 = acceptance test; 3 = system test; 4 = integration test

c) 1 = component test; 2 = acceptance test; 3 = integration test; 4 = system test

d) 1 = integration test; 2 = system test; 3 = component test; 4 = acceptance test

c) 1 = component test; 2 = acceptance test; 3 = integration test; 4 = system test

300

During a period of intensive project overtime, a system architecture document is sent to various project participants, announcing a previously-unplanned technical review to occur in one week. No adjustments are made to the participants’ list of assigned tasks. Based on this information alone, which of the following is a factor for review success that is MISSING?

a) Appropriate review type

b) Adequate time to prepare

c) Sufficient metrics to evaluate the author

d) Well-managed review meeting

b) Adequate time to prepare

300

What is Shoulder Surfing?

  • a) A person hovers over your should to obtain your personal information, such as a password, or a PIN at an ATM.
  • b) An attacker will seek entry to a restricted area by closely following behind someone with legitimate access.
  • c) A hacker goes through the garbage to try to find sensitive information.
  • d) Hackers send SMS messages and attempt to acquire personal information or send the user to a website with malware

a) A person hovers over your should to obtain your personal information, such as a password, or a PIN at an ATM.

400

Esta Saga de películas cuenta la historia de un joven y su relación con una criatura negra voladora que escupe plasma.

Como entrenar a tu dragón

400

De que cultura proviene originalmente la receta de los tacos al pastor?

  • Arabe
  • Español
  • Japonés
  • Mexicano

Arabe

400

Consider a mobile app that allows customers to access and manage their bank accounts. A user story has just been added to the set of features that checks customers’ social media accounts and bank records to give personalized greetings on birthdays and other personal milestones. Which of the following test techniques could a PROGRAMMER use during a unit test of the code to ensure that coverage of situations when the greetings ARE supposed to occur and when the greetings ARE NOT supposed to occur?

a) Statement testing

b) Exploratory testing

c) State transition testing

d) Decision testing

d) Decision testing

400

Which of the following statements comparing component testing and system testing is TRUE?
a) Component testing verifies the functionality of software modules, program objects, and classes that are separately testable, whereas system testing verifies interfaces between components and interactions between different parts of the system
b) Test cases for component testing are usually derived from component specifications, design specifications, or data models, whereas test cases for system testing are usually derived from requirement specifications or use cases
c) Component testing only focuses on functional characteristics, whereas system testing focuses on functional and non-functional characteristics
d) Component testing is the responsibility of the testers, whereas system testing typically is the responsibility of the users of the system

b) Test cases for component testing are usually derived from component specifications, design specifications, or data models, whereas test cases for system testing are usually derived from requirement specifications or use cases

400

_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.

  • a) Database hacking
  • b) Data leakage
  • c) Data cracking
  • d) Data revealing

b) Data leakage

500

En qué película de 1999 Tom Hanks lidera a un grupo especial para salvar a un recluta que fue desplegado.

Rescatando al Soldado Ryan

500

Dulce tradicional de consistencia rígida elaborado a base de piloncillo con leche, coco, nuez y en su mayoría y pueden hacer alusión a las momias de Guanajuato?.

  • Palanqueta
  • Charamusca
  • Gloria
  • Jamoncillo

Charamusca

500

Which of the following lists contains only typical exit criteria from testing?
a) Reliability measures, test coverage, schedule and status about fixing defect and remaining risks
b) Reliability measures, test coverage, degree of tester’s independence and product completeness
c) Reliability measures, test coverage, test cost, availability of test environment, time to market and product completeness
d) Time to market, remaining defects, tester qualification, availability of testable use cases, test coverage and test cost

a) Reliability measures, test coverage, schedule and status about fixing defect and remaining risks

500

Match the following test work products (1-4) with the right description (A-D).
1. Test suite
2. Test case
3. Test script
4. Test charter
A. A set of test scripts to be executed in a specific test run
B. A set of instructions for the execution of a test
C. Contains expected results
D. Documentation of test activities in session-based exploratory testing
a) 1A, 2C, 3B, 4D
b) 1D, 2B, 3A, 4C
c) 1A, 2C, 3D, 4B
d) 1D, 2C, 3B, 4A

a) 1A, 2C, 3B, 4D

500

Data leakage is popularly known as ___________ 

  • a) data theft
  • b) data crack
  • c) low and slow data theft
  • d) slow data theft

c) low and slow data theft

M
e
n
u