BCS CTFL4 ISTQB Certified Tester Foundation Level CTFL 4.0 Exam Online Training
BCS CTFL4 Online Training
The questions for CTFL4 were last updated at Feb 03,2025.
- Exam Code: CTFL4
- Exam Name: ISTQB Certified Tester Foundation Level CTFL 4.0 Exam
- Certification Provider: BCS
- Latest update: Feb 03,2025
Which of the following is a test task that usually occurs during test implementation?
- A . Make sure the planned test environment is ready to be delivered
- B . Find, analyze, and remove the causes of the failures highlighted by the tests
- C . Archive the testware for use in future test projects
- D . Gather the metrics that are used to guide the test project
Which of the following statements is true?
- A . A defect does not always produce a failure, while a bug always produces a failure
- B . A defect may cause a failure which, when occurring, always causes an error
- C . Failures can be caused by defects, but also by environmental conditions
- D . Bugs are defects found during component testing, while failures are defects found at higher test levels
Which of the following statements about white-box test techniques is true?
- A . Achieving full statement coverage and full branch coverage for a software product means that such software product has been fully tested and there are no remaining bugs within the code
- B . Code-related white-box test techniques are not required to measure the actual code coverage achieved by black-box testing, as code coverage can be measured using the coverage criteria associated with black-box test techniques
- C . Branch coverage is the most thorough code-related white-box test technique, and therefore applicable standards prescribe achieving full branch coverage at the highest safety levels for safety-critical systems
- D . Code-related white-box test techniques provide an objective measure of coverage and can be used to complement black-box test techniques to increase confidence in the code
Which of the following statements is true?
- A . In Agile software development, work product documentation tends to be lightweight and manual tests tend to be often unscripted as they are often produced using experience-based test techniques
- B . Sequential development models impose the use of systematic test techniques and do not allow the use of experience-based test techniques
- C . In Agile software development, the first iterations are exclusively dedicated to testing activities, as testing will be used to drive development, which will be performed in the subsequent iterations
- D . Both in Agile software development and in sequential development models, such as the V-model, test levels tend to overlap since they do not usually have defined entry and exit criteria
Which of the following statements about the value of maintaining traceability between the test basis and test work products is not true?
- A . Traceability can be useful for assessing the impact of a change to a test basis item on the corresponding tests
- B . Traceability can be useful for determining how many test basis items are covered by the corresponding tests
- C . Traceability can be useful for determining the most suitable test techniques to be used in a testing project
- D . Traceability can be useful to support the needs required by the auditing of testing
Which of the following statements refers to good testing practice to be applied regardless of the chosen software development model?
- A . Tests should be written in executable format before the code is written and should act as executable specifications that drive coding
- B . Test levels should be defined such that the exit criteria of one level are part of the entry criteria for the next level
- C . Test objectives should be the same for all test levels, although the number of tests designed at various levels can vary significantly
- D . Involvement of testers in work product reviews should occur as early as possible to take advantage of the early testing principle
A virtual service emulating a real third-party service and the automated test scripts (aimed at testing the system under test) that interact with that service, are test work products that are typically created during:
- A . Test monitoring and control
- B . Test implementation
- C . Test design
- D . Test analysis
The following rules determine the annual bonus to be paid to a salesman of a company based on the total annual amount of the sales made (referred to as TAS).
If the TAS is between 50k and 80k, the bonus is 10%. If the TAS exceeds 80k by a value not greater than 40k, the bonus is 15%. Finally, if the TAS
exceeds the maximum threshold which entitles to a 15% bonus, the bonus is 22%.
Consider applying equivalence partitioning to the TAS (Note: 1k = 1000 euros).
Which one of the following answers contain only test cases that belong to the same equivalence partition?
- A . TC1 = 81 k; TC2= 97k; TC3=111k; TC4=118k
- B . TC1 = 40k; TC2= 46k; TC3=51k; TC4=53k
- C . TC1 = 79k; TC2= 80k; TC3=81k; TC4=82k
- D . TC1 = 90k; TC2= 110k; TC3=125k: TC4=140k
A typical objective of testing is to ensure that:
- A . testing is used to drive the development of a software
- B . a software has been tested using a combination of test techniques
- C . there are no defects in a software that is about to be released
- D . a software has been properly covered
Consider the following examples of risks identified in different software development projects:
[I]. The contrast color ratio for both normal text and large text of a website does not comply with the applicable accessibility guidelines, making it difficult for many users to read the content on the pages
[II]. A development vendor fails to deliver their software system on time, causing significant delays to system integration testing activities that have been planned as part of a development project for a system of systems
[III]. People in the test team do not have sufficient skills to automate tests at the test levels required by the test automation strategy which does not allow production of an effective regression test suite [IV]. In a web application, data from untrusted sources is not subject to proper input validation, making the application vulnerable to several security attacks
Which of the following statements is true?
- A . [I] and [III] are product risks; [II] and [IV] are project risks
- B . [I] and [IV] are product risks. [II] and [III] are project risks
- C . [II], [III] and [IV] are product risks; [I] is a project risk
- D . [IV] is a product risk; [I]. [II] and [III] are project risks