ISTQB CTAL-TTA ISTQB Advanced Level Technical Test Analyst (CTAL-TTA) Online Training
ISTQB CTAL-TTA Online Training
The questions for CTAL-TTA were last updated at Feb 13,2025.
- Exam Code: CTAL-TTA
- Exam Name: ISTQB Advanced Level Technical Test Analyst (CTAL-TTA)
- Certification Provider: ISTQB
- Latest update: Feb 13,2025
Which of the following statements BEST describes how tools support model-based testing?
- A . Finite state machines are used to describe the intended execution-time behavior of a software-controlled system.
- B . Random sets of threads of execution are generated as test cases.
- C . Large sets of test cases are generated to provide full code coverage.
- D . An engine is provided that allows the user to execute the model.
A component has been analysed during a risk-assessment and rated as highly critical.
Which of the following white-box test techniques provides the highest level of coverage and could therefore be used to test this component?
- A . Decision testing
- B . Statement testing
- C . Multiple condition testing
- D . Modified condition/decision testing
Consider the following fault attack:
• Force all possible incoming errors from the software/operating system interfaces to the application.
Which of the following is the kind of failure you are looking for when using this attack?
- A . Application crashes when unsupported characters are pasted into an input field.
- B . Application crashes when the network is unavailable.
- C . Application crashes due to a lack of portability.
- D . Application miscalculates total monthly balance due on credit cards.
Which of the following is NOT a common issue with traditional capture/playback test automation?
- A . Difficult to maintain when software changes.
- B . Recorded scripts are difficult to maintain by non-technical persons.
- C . Data and actions are mixed in the recorded script.
- D . Execution of the recorded script is difficult outside office hours.
Which of the following is a valid reason for including security testing in a test approach?
- A . There is a threat of unauthorized copying of applications or data.
- B . To provide measurements from which an overall level of availability can be obtained.
- C . To evaluate the ability of a system to handle peak loads at or beyond the limits of its anticipated or specified workloads
- D . Software changes will be frequent after it enters production.
You are working on an internet banking project. Your company is offering this product to the financial market. For each new customer, some customization will typically be needed. To make the product successful there is a strong focus during development on a reliable and maintainable architecture. To support architectural reviews, a checklist will be developed. Within the checklist specific sections will be attributed to reliability and maintainability.
Which question from the list below should you include in the maintainability section of the architectural review checklist?
- A . Will the system use n-version programming for critical components?
- B . Will the user interface be implemented independently from the other software modules?
- C . Does the system have user-friendly error messages?
- D . Does the password protection of the system adhere to the latest regulations?
A new web site has been launched for a testing conference. There are a number of links to other related web sites for information purposes. Participants like the new site but complaints are being made that some (not all) of the links to other sites do not work.
Which type of test tool is most appropriate in helping to identify the causes of these failures?
- A . Review tool
- B . Hyperlink tool
- C . Static analysis tool
- D . Dynamic analysis tool
Which of the following statements is TRUE regarding tools that support component testing and the build process?
- A . Component testing and build automation tools are only used by developers.
- B . Build automations tools facilitate manual testing at a low level by allowing the change of variables values during test execution.
- C . Component testing tools are typically specific to the programming language and may be used to automate unit testing.
- D . Component testing tools are the basis for a continuous integration environment.
Which of the following defect types is NOT an example of a defect type typically found with API testing?
- A . Data handling issues
- B . Timing problems
- C . High architectural structural complexity
- D . Loss of transactions
Below is the pseudo-code for the Win program:
The bingo program contains a data flow anomaly.
Which data flow anomaly can be found in this program?
- A . Variable ‘A" is not assigned a value before using it.
- B . Variable ‘D" is defined but subsequently not used.
- C . The program does not contain any comments.
- D . It is recommended to use a variable instead of the hard-coded print results "Win" and *Loose".