Which of the following is the correct definition of the Quality Attribute Maintainability?
A. Effort required to ensure that the system performs as its intended
B. Effort required to locate and fix an error in an operational system
C. Extent to which a program satisfies its specifications
D. Extent to which a program can be expected to perform its intended function
E. None of the above
Which of the following is the correct definition of a policy?
A. The intended future state of the organization
B. Managerial control over processes
C. The step-by-step methods followed to ensure that standards are met
D. Managerial desires and intents concerning processes and products
E. A standard that is enforced
A snapshot of an organization's security program at a certain time is a:
A. Security Model
B. Security Baseline
C. Security Risk
D. Security Test Procedure
Which category of control methods is the most acceptable to the individual?
A. Automatic
B. Auditors
C. Peer Reviews
D. Supervisory
E. Third Party
At a minimum, the acceptance test for contracted software should validate:
A. The documentation is consistent with the software execution
B. The documentation is understandable
C. Users will be adequately trained in the software
D. It is operable within the operational constraints of the organization
E. All of the above
In the broad context of comparing quality assurance activities and quality control activities in an IT organization, which of the following would be considered a quality assurance activity?
A. Developing Test Plans
B. Conducting Design Inspections
C. Developing Test Processes
D. Performing Acceptance Testing
E. Performing Regression Testing
In transaction processing, the accuracy and completeness of database storage, data security and privacy, error handling, backup, recovery, and retention is governed by:
A. Transaction Origination Controls
B. Transaction Processing Controls
C. Transaction Output Controls
D. Database Storage and Retrieval Controls
A test case tested data values at 0, 9, 10, 11, 49, 50, 51, 100. Which black-box technique was most likely used to generate these data points.
A. Error Guessing
B. Boundary Analysis
C. Equivalence Partitioning
D. Data Sampling
Quality Assurance methods are usually considered:
A. Detective
B. Corrective
C. Preventive
D. Protective
A histogram is a bar graph.
A. True
B. False
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Software exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CSQA exam preparations and Software certification application, do not hesitate to visit our Vcedump.com to find your solutions here.