Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Describe what "Security Awareness Training" is and outline what steps you would include in your security awareness training program.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 5

Describe various ways of measuring a process, with examples.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 6

You have performed an analysis of production level defects and concluded that many of these defects were introduced inadvertently when changes to other parts of the software were being made. What type of validation technique is used to identify defects caused by modifications to other parts of the code and when is this type of testing appropriate?

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 7

The IT staff must be aware, understand and embrace quality management principles and practices. List and explain four tactics (e.g., approaches / methods) you would use to communicate these concepts to your IT staff.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 8

Explain why risk prioritization is important and give two methods used to prioritize risk.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 9

You have been appointed the Information Security Manager of the organization. Senior management wants you to assess and overhaul the security systems and processes. List and describe five information security principles that you will implement as security practices.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 10

A well-known benefit of process maturity is reduction in cycle time. Explain two ways by which cycle time reduces as process maturity increases.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 11

Control Charts are a statistical technique used to assess, monitor, and maintain the stability of a process. Describe below how you might employ the use of a control chart and describe the main components of a control chart. (NOTE: You do NOT need to draw a chart.)

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 12

Describe the steps to create a histogram.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 13

You have been working for years in a company that does not have any defined processes at the organizational level. The organization now wants to adopt CMMI Level 3 practices. You have been promoted to QA Manager and your first order of business is to establish the process definition framework. Describe the steps for effective process definition.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 14

You have been requested to develop a “customer satisfaction” baseline study. List five factors about the product or the project team that you might include in your customer satisfaction baseline.

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 15

The eight steps below describe a "Process Improvement Process". Briefly describe what should happen in each step.

Step 1 - Select process and team

Step 2 - Describe current process

Step 3 - Assess process for control and capability

Step 4 - Brainstorm for improvement

Step 5 - Plan how to test proposed improvement

Step 6 - Analyze results

Step 7 - Compare results

Step 8 - Change process or redo steps 4-8

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 16

In planning for risk response, what are the three categories which can be used for effective planning?

Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.

Full Access
Question # 17

When maturing the management process, movement will be from:

A.

Product Focus to Process Focus

B.

Process Focus to Product Focus

C.

Team Focus to Product Focus

Full Access
Question # 18

It is generally recognized that software testing should begin at which software development phase?

A.

Requirements Phase

B.

Internal Design Phase

C.

External Design Phase

D.

Build Phase

E.

After Software has Been Built

Full Access
Question # 19

If you found, through testing software, that your IT project team was building software with an average of 58 defects per 1000 function points, this would be a:

A.

Baseline

B.

Benchmark

C.

Complexity Metric

D.

Size Measure

Full Access
Question # 20

Statistical Process Control is used to measure:

A.

Productivity

B.

Variance in Processing

C.

Compliance to Standards

D.

Defect Rates

Full Access
Question # 21

One way to minimize risk is to:

A.

Install Controls

B.

Decrease Acceptance Testing

C.

Increase the Probability Factor

D.

None of the above

E.

All of the above

Full Access
Question # 22

Risk management is not an independent auditing process.

A.

True

B.

False

Full Access
Question # 23

Example of a test activity to be performed during Maintenance Phase is:

A.

Determine Test Strategy

B.

Modify and Retest

C.

Determine Adequacy of Design

D.

Design Phase Activities

Full Access
Question # 24

When management selects an approach or set of actions to align assessed risks with the organization's risk appetite in the context of strategy and objectives, this is called:

A.

Risk Assessment

B.

Risk Response

C.

Risk Analysis

D.

Information and Communication

E.

Monitoring

Full Access
Question # 25

Goals explain how the vision will be achieved.

A.

True

B.

False

Full Access
Question # 26

A payroll application requires that each new employee hired have a unique Employee ID and password and that all characters in a field are either numeric or alphabetic. This is an example of a:

A.

Logical Test

B.

Limit Test

C.

Validity Test

D.

Completeness Test

E.

None of the above

Full Access
Question # 27

Which of the following is / are used for determining the magnitude of the Risk?

A.

Using Personal Opinion or Team Consensus

B.

Using a Risk Formula

C.

Using Annual Loss Expectation (ALE) Estimation

D.

All of the above

E.

None of the above

Full Access
Question # 28

Quality award given in Japan is:

A.

Malcolm Baldrige National Quality Awards

B.

Deming Prize

C.

Juran Prize

D.

Japanese Quality Award

Full Access
Question # 29

The objective of a Pareto Chart is to:

A.

Show the present value of money

B.

Identify the cause of problems

C.

Rank the cause of problems by frequency

D.

Determine the return on investment

E.

Show the root cause of problems

Full Access
Question # 30

If common causes of variation result in a process operating outside the customer's specifications, the process is improved by reducing the special causes of variation.

A.

True

B.

False

Full Access
Question # 31

There are many benefits associated with maturing work processes. As work processes mature, which of the following would be expected to decrease:

A.

Training

B.

Management Support

C.

Defect Rates

D.

Customer Satisfaction

E.

Confidence in the Process

Full Access
Question # 32

What is the risk that an organization faces if management does not take action to alter the risk's likelihood or impact?

A.

Risk Management

B.

Risk Appetite

C.

Enterprise Risk Management

D.

Residual Risk

E.

Inherent Risk

Full Access
Question # 33

Customer software requirements are an attribute of a:

A.

Product / Service

B.

Process

C.

Metric

D.

Architecture

Full Access
Question # 34

What does 'C' stand for in PDCA cycle?

A.

Correct

B.

Check

C.

Confirm

D.

Continuous

Full Access
Question # 35

For maturing the management process at Level 3, which of the following should be in focus?

A.

Employee Suggestion System

B.

End-user Feedback System

C.

Employee Surveys

D.

Quality Planning

E.

None of the above

Full Access
Question # 36

Which of the following question(s) is associated with the post-implementation review?

A.

Is the quality what we wanted?

B.

Did the process work?

C.

Did buying a tool help improve the process?

D.

Did automation help speed up the process?

E.

All of the above

Full Access
Question # 37

The workbench definition should contain a policy statement. The objective of the policy statement is which of the following?

A.

Define why the workbench is performed

B.

Define what the workbench is to accomplish

C.

Explain how the workbench will perform the tasks

D.

Define the quality of the offered product

E.

Define who is accountable for performing the workbench

Full Access
Question # 38

"Establish Functional Improvement Objectives" is a step in the ____________ of benchmarking.

A.

Planning Phase

B.

Analysis Phase

C.

Integration Phase

D.

Action Phase

Full Access
Question # 39

Causes of variation that are typically "external" to the process are referred to as:

A.

Special Causes of Variation

B.

Common Causes of Variation

C.

Separate Causes of Variation

D.

None of the above

Full Access
Question # 40

A "task force" is a cross-functional group organized for a specific purpose. Task force management principles include:

A.

Task force leader should be an expert in leading groups

B.

Task force should be organized for multiple purposes

C.

Task force needs a clear description of what is to be addressed

D.

All of the above

E.

A and C above

Full Access
Question # 41

Which of the following quality control practices would be considered a validation method?

A.

Code Inspections

B.

Desk Checking

C.

Design Reviews

D.

Error Guessing

E.

Unit Testing

Full Access
Question # 42

____________ provides teams an opportunity to reach high-quality decisions with total team commitment.

A.

Consensus

B.

Compatibility

C.

Agreement

Full Access
Question # 43

A "leader" and a "manager" are two terms that basically mean the same thing.

A.

True

B.

False

Full Access
Question # 44

Mode is the measures of central tendency. What does it represent?

A.

Average of the items in the population

B.

Sum of the items in the population

C.

Items are repeated most frequently

D.

Item at which half the items in the population are below this item and half the items are above this item

Full Access
Question # 45

Philip Crosby's concept that "quality is free" means that:

A.

It is not necessary to budget for quality activities

B.

Quality activities provide a positive return on investment

C.

Quality activities come out of a corporate budget as opposed to an IT budget

D.

Individual work activities are not charged for quality activities

E.

Quality costs should be integrated into project costs

Full Access
Question # 46

Three fundamental types of mistakes that IT leaders make are:

A.

Isolation, lack of modeling, lack of business perspective

B.

Isolation, inability to reward, lack of dedication

C.

Isolation, inability to reward, lack of business perspective

D.

None of the above

Full Access
Question # 47

Boundary analysis techniques are used to create test cases that divide equivalence partitioned groups.

A.

True

B.

False

Full Access
Question # 48

How do you objectively measure operational reliability?

A.

Customer satisfaction

B.

Mean time between failure

C.

Number of errors in outputs

D.

Function points per person month

Full Access
Question # 49

When making a judgment while compliance monitoring, experience plays a larger role when:

A.

The standard is objective

B.

The standard is subjective

C.

Standards should not be a factor

D.

None of the above

Full Access
Question # 50

Out of the three critical aspects of Toyota's JIT concept, which one is the most important?

A.

Reduction of Waste

B.

Perfect Quality

C.

Employee Involvement

D.

None of the above

Full Access
Question # 51

Process improvement activities should also be conducted as per a defined process.

A.

True

B.

False

Full Access
Question # 52

Which of the following statements completely interprets the 'Act' phase of PDCA cycle?

A.

Correct the abnormality and prevent its recurrence

B.

Correct the abnormality

C.

Prevent the recurrence of abnormality

D.

Follow quality control activities

Full Access
Question # 53

Laws and regulations affecting the products produced and operated are generally addressed in which planning activity:

A.

Business or Activity Planning

B.

Environment Planning

C.

Capabilities Planning

D.

Assumptions Planning

E.

Policies Planning

Full Access
Question # 54

Which one of the following best describes "mission statement" for a company or an organization?

A.

How will we show success?

B.

How will we achieve objectives?

C.

Why do we exist?

D.

What is our long term program?

Full Access
Question # 55

A test case tested data values at 0, 9, 10, 11, 49, 50, 51, 100. Which black-box technique was most likely used to generate these data points.

A.

Error Guessing

B.

Boundary Analysis

C.

Equivalence Partitioning

D.

Data Sampling

Full Access
Question # 56

Organizations use many ways to determine the size of a program. Which of the following methods for measuring the size of a program can be used before the coding process is complete?

A.

Lines of code

B.

Programmer hours expended to write the code

C.

Function points

D.

Cyclomatic complexity

Full Access
Question # 57

The team member is told what to do, and then how to check that what was done was done correctly. This statement shows relationship between:

A.

Plan and Do Processes

B.

Plan and Check Processes

C.

Do and Check Processes

D.

Do and Act Processes

Full Access
Question # 58

A snapshot of an organization's security program at a certain time is a:

A.

Security Model

B.

Security Baseline

C.

Security Risk

D.

Security Test Procedure

Full Access
Question # 59

Which of the following activities should occur before processes are defined to ensure that the most critical processes are defined first.

A.

Do

B.

Design

C.

Implementation

D.

Check

E.

None of the above

Full Access
Question # 60

The primary responsibility of quality lies with:

A.

Project Manager

B.

Senior Management

C.

Testing Team

D.

Developer

Full Access
Question # 61

The amount of effort required to intercouple or interconnect computer systems is referred to as:

A.

Reusability

B.

Flexibility

C.

Portability

D.

Interoperability

Full Access
Question # 62

Which technique is used to develop a common vision of what a process should look like and depicts processes, their relationships, and their owners?

A.

Flowchart

B.

Process Map

C.

Nominal Group Technique

D.

Pie Chart

Full Access
Question # 63

Which of the following would be considered an important prerequisite to quality planning?

A.

Establishing a Quality Assurance Function

B.

Defining the IT Vision, Mission, and Goals

C.

Defining the Quality Assurance Mission and Goals

D.

Adopting the Six Sigma Concept

E.

Calculating Cost-of-Quality for the IT Organization

Full Access
Question # 64

Branch testing technique is included in which of the following test data categories?

A.

Functional

B.

Structural

C.

Error Oriented

Full Access
Question # 65

The stakeholders of security system should be trained on security data collection methods and:

A.

Organization mission

B.

Security baseline program and charter

C.

Requirements

Full Access
Question # 66

While contracting for outsourced software development, ___________ refers to the rights of the customer to run the application system in more than one location.

A.

Maintainability

B.

Transportability

C.

Security

D.

Reliability

Full Access
Question # 67

Which of the following is NOT a major concerns during the operation and maintenance of a purchased application or software?

A.

Adequacy of Control

B.

Life of Contract

C.

Speed of Service

D.

Multi-Contractor Problem Resolution

Full Access
Question # 68

Which of the following would be measured subjectively to develop a baseline:

A.

Number of people assigned a project

B.

Projects completed on schedule

C.

Understandability of training material

D.

Lines of code

Full Access
Question # 69

At what process maturity level in the SEI process maturity model would you expect that the most effort would be devoted to quality control?

A.

Level Two

B.

Level Three

C.

Level Four

D.

Level Five

Full Access
Question # 70

Checking if the web page on a internet banking site comes up within 2 seconds is an example of:

A.

Functional Testing

B.

Structural Testing

C.

Stress Testing

D.

Performance Testing

E.

White-Box Testing

Full Access
Question # 71

Which tool is used by teams to help create order out of chaos, by categorizing large numbers of ideas?

A.

Nominal Group Technique

B.

Cause and Effect Diagram

C.

Quality Function Deployment

D.

Force field analysis

E.

Affinity Diagram

Full Access
Question # 72

If a software development contract includes a clause on foreign attachments, which of the following would be considered a foreign attachment?

A.

A software system developed by an organization in another country

B.

An application component developed by a different contractor than the one contracted to build software using that component

C.

The customer's right to discontinue service with the contractor

D.

Having the hardware installed by an individual from a country other than where the software will be operated

Full Access
Question # 73

A major corporation issued this statement: "We see ourselves now and in the future as a company with a strong customer franchise, known for reliability, trust and integrity in all relationships. Our business will be based on technologies that have evolved over a long history and which will give us unique advantages over our competition. These technologies will span our core businesses and will also go beyond boundaries we can see today." What type of statement is this?

A.

Vision

B.

Value

C.

Goal

D.

Principle

Full Access
Question # 74

Six Sigma quality is a statistical term defining the number of defects that have been established as a quality objective. A Six Sigma defect rate is:

A.

3.4 defects per 1,000 opportunities

B.

3.4 defects per 10,000 opportunities

C.

3.4 defects per 100,000 opportunities

D.

3.4 defects per 1,000,000 opportunities

E.

3.4 defects per 10,000,000 opportunities

Full Access
Question # 75

If a software project produced over 100 defects, would you state:

A.

The project was poorly implemented

B.

The project implemented was acceptable

C.

You do not have enough information to state an opinion

D.

The project is not under statistical control

Full Access
Question # 76

_______________ is a structured, problem-solving technique used to show the relationship between groupings.

A.

Brainstorming

B.

Matrix

C.

Affinity Diagram

D.

Pie Chart

Full Access
Question # 77

Within an ISO process assessment, a capability level is said to be established 'only' and 'only if' all the process attributes are 'fully achieved'.

A.

True

B.

False

Full Access
Question # 78

Which of the following is not included in 'Failure Cost' under 'Cost of Quality'?

A.

Rework Cost

B.

Complaints

C.

Inspection Cost

D.

Damage Claims

Full Access
Question # 79

Cause-and-Effect Diagrams are also referred to as a:

A.

Fishbone Diagram

B.

Ishikawa Diagram

C.

Why-why Diagram

D.

All of the above

E.

None of the above

Full Access
Question # 80

The effort required for testing a program to insure it performs its intended function is called:

A.

Correctness

B.

Reliability

C.

Testability

D.

Flexibility

E.

Efficiency

Full Access
Question # 81

The guarantee provided by the contractor of software development that the deliverables will meet the specification is called:

A.

Contractor Support

B.

Penalties

C.

Warranty

D.

Fairness of Contract

E.

Acceptance Test Criteria

Full Access
Question # 82

If there is a 50% probability of a risk occurring and the impact of the occurrence is $40,000 lost of revenue, then what is the expected value of the risk?

A.

$20,000

B.

$80,000

C.

$2,000

D.

$800,000

Full Access
Question # 83

Risk has two attributes. One is magnitude and the other is:

A.

Frequency

B.

Cause

C.

Type

D.

Use

Full Access
Question # 84

Which of the following is NOT normally considered one of the questions that must be answered in performing quality planning?

A.

Where are we?

B.

Where do we want to go?

C.

How are we going to get there?

D.

When will it be done?

E.

If it fails, who is responsible?

Full Access
Question # 85

The risk associated with replacing a team member would be characterized as:

A.

Time-Based

B.

Situational

C.

Interdependent

D.

Time-Based

E.

Value-Based

Full Access
Question # 86

Which is the best positioning of a quality manager within the IT organization?

A.

Senior IT Manager

B.

Manager of Systems Programming

C.

Manager of Computer Operations

D.

Outside of the IT Function

Full Access
Question # 87

Requirements reviews, code walkthroughs, and inspections are examples of:

A.

Verification

B.

Validation

Full Access
Question # 88

In the new quality management philosophy, the emphasis must be on:

A.

Defect Identification

B.

Quality Control

C.

Reducing Rework

D.

Catching Defects

Full Access
Question # 89

Which of the following is the primary objective of a quality improvement program?

A.

Ensure our users are adequately trained in their work processes

B.

Reduce the defect rate in IT products and processes

C.

Identify the individuals responsible for poor quality

D.

Train workers in how to do quality work

E.

Identify processes that no longer work

Full Access
Question # 90

Your manager describes his / her desires and intents concerning a process to you. The manager is describing the:

A.

Policy

B.

Standard

C.

Procedure

Full Access
Question # 91

Which layer of management is the weakest link in a successful quality management program?

A.

Top

B.

Quality Champion

C.

Middle

Full Access
Question # 92

Which of the following is NOT one of the five types of listening?

A.

Therapeutic Listening

B.

Critical Listening

C.

Structured Listening

D.

Comprehensive Listening

E.

Discriminative Listening

Full Access
Question # 93

-- Exhibit –

-- Exhibit --

In the diagram of the tester's work bench, the box labeled (2) is the:

A.

Input(s)

B.

Standard(s)

C.

Policy

D.

Check Procedures

E.

Do Procedures

Full Access
Question # 94

Many managers use a metrics dashboard to present measurement data to the user of that data. Another name for a dashboard is:

A.

Subjective Measures

B.

Objective Measures

C.

Valid Measures

D.

Key Indicators

E.

Reliable Measures

Full Access
Question # 95

Prior to TQM, the distinction between “little-Q” and “big-Q” was given by:

A.

Philip Crosby

B.

Edwards Deming

C.

Motorola

D.

Joseph Juran

Full Access