You are on page 1of 52

Cu 1 :

Kelly is creating a WCF service. She wants to create a user-defined class and
serialize it into an XML format. Which of the following methods should Kelly
use to convert an object into its XML representation?
A. GetSchema()
B. ReadXmI()
C. WriteXml()
D. ReadWriteXml()

Cu 2: Joe has created a WC.F service that communicates with a client
application over the Internet. She wants to log the information related to the
conversion of the data exchanged between the service and a client
application into a standard format. Which of the following trace sources
allows Joe to log messages?
A System. ServiceModel.MessageLogging
B System.ServiceModel
C System.IO.Log
D System.Runtime.Serialization

Cu 3:
Georgina has created a component using .NET Framework. She has defined
a tcp channel to enable the component to communicate with a Windows client
application. To define the channel, she has written the following code snippet
in the server application where the component is hosted:
using System.Runtime.Remoting.Channels; namespace RemoteServer(Note)
{
class Program {
static void Main(stringQ args)
{
TcpServerChannel channel = new TcpServerChannel(9932);
}
However, while compiling the server application, she received an error.
Which of the following code snippets will fulfill the requirement without
throwing an error?


Cu 4:
You have created a WCF service that uses TCP in addition to the HTTP
protocol to communicate with client applications. In addition, you want that
the service should implement features such as process recycling, idle
shutdown, process health monitoring, and message-based activation. Which
of the following options will you choose to host your WCF service?
A. IIS
B. Self-host the service
C. WAS
D. Windows service

Cu 5:
You have created a Web service for car manufacturing company. The service
enables the distributors of the company to retrieve the details of a model of
a car by providing its model no. For this, you wrote the following code
snippet in the client application: protected void btnShow_Click(object sender,
EventArgs e)
{
Service obj = new Service();
DataSet dsObj = QueryModel(txtModelNo.Text); if
(dsObj.Tables[0].Rows.Count == 0)
{
IblMessage.Text = "Model Not Available";
}
else
{
GridViewl .DataSource = dsObj.Tables[0];
IblMessage.Text = "";
}
GridViewl .DataBind();
}

Cu 6:
Which of the following is an objective of defect reports?
A To provide information to the management to use as an evaluation tool for
its test team.
B To bring defects to the attention of the development team so that the
development team can acknowledge and fix the defect
C To find defects in a SDLC
D To report the technical flaws of the development team.

Cu 7: Susan Ward is a software developer in Supersoft2000. She has
developed an application that offers e-commerce services for transacting
business through the Internet. Which technique should Susan use to test
whether the system performs correctly over a continuous period of time?
A Live testing
B Production testing
C Requirements testing
D Compliance testing

Cu 8:
Henry Blake was assigned the task of testing an application that provides
automated solutions for the electronic marketplace. Henry has to create
relevant test cases on the basis of which test plans will be executed. Henry
has to check whether the application runs successfully on all supported
hardware and software environments. In the execution of which test plan will
the criteria be satisfied successfully?
A Integration Test Plan
B Acceptance Test Plan
C Unit Test Plan
D System Test Plan

Cu 9:
Jack is working as a Web developer in BlueSky Airlines. He has created a WCF
service that enables the passengers to view their flight schedules and PNR
status through a Web application. Jack wants that whenever a passenger logs
on the Web application and accesses the WCF service, the user name and
password of the passenger should be logged. Which of the following code
snippet will Jack use to accomplish the preceding task?
C <system.diagnostics>
<sources>
<source name="System.ServiceModel.MessageLogging"
I ogKnownPi i ="fal se">(note)
<listeners>
<add name=" MyMessageTraceListener"
type="System.Diagnostics.XmlWriterTraceListener" initializeData="
c:\Logs\MyMessageLogFile.txt" />
</listeners>
</source>
</sources>
Cu 10:
Which of the following classes specifies whether components in the assembly
run in the applications' process or in a system process?
A ApplicationActivationAttribute
B SecureMethodAttribute
C ApplicationAccessControl Attribute
D SharedProperty

Cu 11:
Which of the following ways of hosting aWCF service requires minimum
infrastructure for deployment of the service?
A Hosting the service in WAS.
B Self-hosting the service.
C Hosting the service as Windows service.
D Hosting the service in IIS.
Cu 12:
Which of the following attributes will you use to specify that the information
stored in the header of a message should only be logged?
A logMalformedMessages
B logEntireMessage
C maxMessagesToLog
D logMessagesAtTransportLevel

Cu 13: Which of the following contracts acts as an entry point to access a
WCF service?
A Message contract
B Operation contract
C Service contract
D Data contract

Cu 14:
Which of the following encoding types supports JavaScript Object Notation
(JSON) and Plain Old XML (FOX) encoding?
A. Text
B. Binary
C. MTOM
D. WebMessageEncoder
Cu 15:
Which of the following ensures quality in the product being developed?
A Quality policy
B Quality assurance
C Quality control
D Quality objectives

Cu 16:
Which of the following classes provided by the syndication API represents an
author or contributor of syndication content?
A SyndicationContent
B SyndicationCategory
C SyndicationPerson
D SyndicationLink

Cu 17: Consider the following statements:
Statement A: The selection of an appropriate tool is a secondary aspect of
the testing process.
Statement B: The selection of an appropriate tool leads to an ease in the
burden of test production and test execution.
Which of the following is correct about the above statements?

A Statement A is False and Statement B is True.
B Statement A is True and Statement B is False.
C Both, Statement A and Statement B, are True.
D Both, Statement A and Statement B, are False.

Cu 18:
What is the purpose for using a defect tracking tool?
A Defect Tracking tool is the latest trend in the market.
B Defect Tracking tool optimizes the cost of the software development
project
C Defect Tracking tool decreases the productivity of the testing team
D Defect tracking tools help the development and testing team to open
defects effectively.

Cu 19:
Consider the following statements:
Statement A: Acceptance Testing is conducted to determine if software is fit
for the customers use.
Statement B: The concept of fit is significant in software testing. Which of the
following is correct about the above statements?
A Statement A is False and Statement B is True.
B Both, Statement A and Statement B, are False.
C Statement A is True and Statement B is False.
D Both, Statement A and Statement B, are True.
Cu 20:
The software testing team of Sysnet Inc. is analyzing the results of a
software test on an ERP application. The team uses a scatter plot to study the
relationship between the errors found during the first test cycle and the
errors found during the second test cycle. After observing the scatter plot,
the testing team concludes that the tested variables have no relation. What
did the testing team observe in the scatter plot?
A Data points cluster in a straight line parallel to the horizontal axis of
the scatter plot
B Data points cluster in a band from upper right to lower left corner of
the scatter plot
C Data points do not cluster in a band
D Data points cluster in a band from upper left to lower right corner of
the scatter plot
Cu 21:
Identify the phase in the life cycle of a test process in which the need for an
automated tool is recognized.
A Execution phase
B System study phase
C Wind-up phase
D Design test cases phase

Cu 22:
Suzanne has created a WCF service using .NET Framework. She wants to
implement queues in the service for reliable messaging. For this, she has
written the following code snippet in the Web.config file of the service:
<configuration>
<system.serviceModel>
<services>
<endpoint address="msmq: DIRECT=OS: local host/private/requestqueue"
binding="msmqlntegration8inding" contract=
,,
MSMQApp.lService"><Chu y>
</endpoint>
</service>
</services>
<bindings>
<msmqlntegrationBinding>
<binding name="Bindingl" >
</binding>
</msmqlntegrationBinding>
</bindings>

Cu 23:
Trivia Ltd. is developing a software application whose production cost might
exceed the planned budget. Also the software application will have to
compete with similar applications in the market. What type of risk can the
application face?
A Premature Release Risk
B Business Risk
C Testing Risk
D Software Risk

Cu 24:
Which of the following advantages of the distributed application architecture
allows developers to modify the functionality of a layer without affecting the
other layers?
A Flexibility
B Reusability
C Fault tolerance and availability
D increased productivity

Cu 25:
Problem: Solution Shares Ltd has developed software to enable online
trading of shares. This software has to undergo testing in a live environment
at the customer site. Which is the kind of testing required to test this
software?
Solution: Beta testing will be done on the software as it involves operational
testing of the software at the customer site.
How well does the solution address the problem?
A Meets the requirement but is not a desirable solution
B Does not meet the requirement although it appears to work
C Meets the requirement and is an outstanding solution
D Meets the requirement and is a desirable solution
Cu 26:
Raymond has developed an application software for a Ranch to keep a record
of all the poultry and horses on the ranch. This application software has lot
of uncertainty regarding the correctness of processing in the new application
software, and the old and new versions of the application software are
similar Identify the ideal testing technique for performing this task.
A Parallel testing
B Control testing
C intersystem testing
D Regression testing

Cu 27:
Consider the following statements:
Statement A: TPA is a technique for test effort estimation.
Statement B: FPA is a technique for risk analysis.
Which of the following is correct about the above statements?
A. Both, Statement A and Statement B, are False.
B. Both, Statement A and Statement B, are True.
C. Statement A is False and Statement B is True.
D. Statement A is True and Statement B is False.

Cu 28:
Consider the following statements:
Statement A: The scope of test specifies which features of the system will be
tested and which features will not be tested. Statement B: Test schedule
describes the various types of tests to be conducted to meet the testing
objectives.
Which of the following is correct about the above statements?
A. Both, Statement A and Statement B are True.
B. Statement A is False and Statement B is True.
C. Both, Statement A and Statement B are False.
D. Statement A is True and Statement B is False.

Cu 29:
You need to serialize the customized class, BankDetails, and its members,
AccountNo and CustomerName. Which of the following code snippets will
you use for this?
A. public class BankDetails
{
[DataMember] public int AccountNo;
[DataMember]
public string CustomerName;
}
B [DataContract]
public class BankDetails
{
public int AccountNo; public string CustomerName;
}
C. [DataContract]


Cu 30:
Dick has to create a RESTful service that displays the details of various car
models sold by Luxury Drive. The service should display the data in the RSS
format in the Web feed. For this, he has written the following code in the
service:
public class Service : IService
{
public Rss20FeedFormatter GetCarDetailsO
{
SyndicationFeed feed = new SyndicationFeed("Luxury Drive - Car Details",
"Car Details",null);
Syndicationltem iteml = new Syndicationltem("Model One", "This is the
content for Model One", new
Uri("http://1ocalhost/QueryCarDetaiIsCIientApp/MOOl .aspx"), "ItemOnelD",
DateTime.Now);
List<Syndicationltem> items = new List<Syndicationltem>0;
items.Add(iteml);
feed.Items = items;
}

Caau31:
Which process model advocates the use of static testing techniques
during the early stages of development?
A W Model
B V Model
C Waterfall Model
D Spiral Model


Cu 32:
In which phase of Acceptance Testing, a customer must acquire full
knowledge about the software?
A while developing acceptance decision
B While defining the acceptance criteria
C while executing acceptance plan
D while developing acceptance plan

Cu 33:
George has created a component using .NET framework and hosted it in a
server application. The component uses the HTTP channel to communicate
with a .NET client application. Which of the following code snippets should
George use to register the channel on the server side?
\
A. HttpServerChannel channel=new HttpServerChannel(9932);
ChannelServices.RegisterChannelQ;

B. HttpServerChannel channel=new HttpServerChannel();
ChannelServices.RegisterChannel (channel);

C. HttpServerChannel channel=new HttpServerChannel(9932);
ChannelServices.RegisterChannel (channel);
D. HttpServerChannel channel=new HttpServerChannel(9932);
RegisterChannel.ChannelServices(channel);

Cu 34:
Statement A: Risk analysis table is used to log the results of the risk analysis
process.
Statement B: The risk description column in the risk analysis table is used to
give a brief description ofthe identified risk and risks similar in nature.
Which ofthe following is correct about the preceding statements?
A Both, Statement A and Statement B, are True.
B Both, Statement A and Statement B, are False.
C Statement A is True and Statement B is False.
D Statement A is False and Statement B is True.

Cu 35:
Which of the following values of the transaction isolation level specifies that
the temporary or uncommitted data cannot be read during the transaction,
but can be modified?
A Snapshot
B Unspecified
C ReadCommitted
D Readllncommitted

Cu 36:
You have to create a Web service that exposes two methods, HelloWorld()
and Display(). Which of the following code will you use?

using System.Web.Services; [WebService]
public class MyService : WebService {
public MyService() {
// Constructor Code
}
[WebMethods]
public string HelloWorl()
{
return "Hello World";
}
[WebMethods]
public string Display(){
return "Hi";
}
}
C using System.Web.Services; [WebService]
public class MyService : WebService
{
public MyService()
// Constructor Code
}
[WebMethod]

Public Myservice
// Constructor Code
}
public string HelloWorldQ
{
return "Hello World";
}
public string DisplayO {
return "Hi";
}
}
C using System.Web.Services; [WebService]


Cu 37:
Which of the following values of the performanceCounters attribute
specifies the information provided by the ServiceModelService,
ServiceModelEndpoint, and ServiceModelOperation performance counters?
A ServiceOnly
B off
C All
D On

Cu 38:
COM stands for
A Common Object Model.
B Code Oriented Model.
C Component Object Model.
D Commonly Used Object Model.

Cu 39:
Infinity Ltd. is developing a payroll system. The system has to be delivered to
the client in three months. The probability that the project will exceed its
deadline has a value 0.7 on the rating scale and the impact of the risk has
the value 3.What is the risk factor for the risk?
A 3
B 0.7
C 0
D 2.1

Cu 40:
COM stands for
C Common Object Model.
C Code Oriented Model.
C Component Object Model.
C Commonly Used Object Model.

Cu 41:
Liza is creating a WC.F service that must implement transactions. She has set
the transactionFlow attribute of the binding element to true. Which of the
following values of the TransactionFlowOption property should she use to
accomplish the preceding task?
C Allowed
C Mandatory
C NotAllowed
C Unspecified

42:
Which of the following is an objective of defect reports?
A To find defects in a SDLC
B To bring defects to the attention of the development team so that the
development team can acknowledge and fix the defect
C To provide information to the management to use as an evaluation
tool for its test team.
D To report the technical flaws of the development team.
43:
You have created a Web service for car manufacturing company. The service
enables the distributors of the company to retrieve the details of a model of
a car by providing its model no. For this, you wrote the following code
snippet in the client application: protected void btnShow_Click(object sender,
EventArgs e)
{
Service obj = new Service();
DataSet dsObj = QueryModel(txtModelNo.Text); if
(dsObj.Tables[0].Rows.Count == 0)
{
IblMessage.Text = "Model Not Available";
}
else
{
GridViewl .DataSource = dsObj.Tablest()];
IblMessage.Text = "";
}
GridViewl .DataBind();
}
application. Which of the following code snippets will you use to execute the
application successfully?
A protected void btnShow_Click(object sender, EventArgs e)
<QueryWebRef.Service obj = new QueryWebRef.Service();
DataSet dsObj = QueryWebRef.Service.QueryModel(txtModelNo.Text); if
(dsObj.Tables[0].Rows.Count == 0)
{
IblMessage.Text = "Model Not Available";
}
else
{
GridViewl .DataSource = dsObj.Tables[0];
IblMessage.Text = "";
}
GridViewl .DataBind();
}



B protected void btnShow_Click(object sender, EventArgs e)

Service obj = new QueryWebRef.Service();
DataSet dsObj = obj.QueryModel(txtModelNo.Text); if
(dsObj.Tables[Q].Rows.Count == 0)
{
IblMessage.Text = "Model Not Available";
}
else
{
GridViewl .DataSource = dsObj.Tablest[0];
IblMessage.Text = "";
}
GridViewl .DataBindO;
}

C protected void btnShow_Click(object sender, EventArgs e) {
QueryWebRef.Service obj = new Service();
DataSet dsObj = obj.QueryModel(txtModelNo.Text); if
(dsObj.Tables[0].Rows.Count == 0)
{
IblMessage.Text = "Model Not Available";
}
else
{
GridViewl .DataSource = dsObj.Tablest[0];
IblMessage.Text = "";
}
GridViewl .DataBind();
}

D protected void btnShow_Click(object sender, EventArgs e) {
QueryWebRef.Service obj = new QueryWebRef.Service();
DataSet dsObj = obj.QueryModel(txtModelNo.Text); if
(dsObj.Tables[()].Rows.Count == 0)
{
IblMessage.Text = "Model Not Available";
}
else
{
GridViewl .DataSource = dsObj.Tablest[0];
IblMessage.Text =
}
GridViewl .DataBind();
}
Cu 44:
Problem: Perfect Solutions has developed a Java code, which behaves
differently for inputs of the same class with different variables.
Which test case design technique should be used to perform testing on this
Java code?
Solution: Boundary value analysis technique should be used as it does a
thorough check at the boundary values of a class.
How well does the solution address the problem?
A Meets the requirement and is an outstanding solution
B Meets the requirement and is a desirable solution
C Meets the requirement but is not a desirable solution
D Does not meet the requirement although it appears to work

Cu 45:
Consider the following statements:
Statement A: Metrics can serve as a basis for cost estimating, training
planning, resource planning, scheduling, and budgeting. Statement B: Test
metrics can be directly observable quantities or can be derived from one or
more directly observable quantities.
Which of the following is correct about the above statements?
A Statement A is True and Statement B is False.
B Both, Statement A and Statement B are False.
C Statement A is False and Statement B is True.
D Both, Statement A and Statement B are True.
Cu 46:
You want to create a component using .NET Framework and want to
implement the just-in-time-activation service in the component. Which of
the following steps will you perform to accomplish the preceding task?
1. Expand the Components node.
2. Click the Activation tab in the Properties dialog box.
3. Expand the Component Services>Computers>MyComputer
>COM+ Applications node in the Component Services window.
4. Right-click the component in the application, and then select
Properties.
5. Select the Enable Just In Time Activation check box and click the OK
button.
6. Expand the COM+ application in which you want to implement JIT
service.

C Step 3> Step 1 > Step 6> Step 4> Step 2> Step 5
C step 3> Step 6> Step 1 > Step 2> Step 4> Step 5
C Step 3> Step 6> Step 4> Step 1 > Step 2> Step 5
C Step 3> Step 6> Step 1 > Step 4> Step 2> Step 5

Cu 47:
You are creating a WCF service that communicates with another WCF service.
You want that the data transferred between the services should be encoded.
Which of the following encoding types will you use to encode the data?
A Binary
B MTOM
C WebMessageEncoder
D Text

Cu 48:
John is creating aWCF service and implemented message-level security in the
service to secure the communication. For this, he has written the following
code snippet in the Web.config file of the service:
<bindings>
<wsHttpBinding>
cbinding name="SecurityByMessage">
<security mode="Message">
<clientCredentialType="Certificate7>
</security>
</binding>
</wsHttpBinding>
</bindings>
However, while executing the service an error occurred. Which of the
following code snippets will John use to rectify the error and execute the
service successfully?
A<system.serviceModel>
<diagnostics>
<messagel_ogging logEntireMessage="true" maxMessagesToLog="50"
logMessagesAtServiceLevel="true" logMessagesAtTransportLevel="true" I
ogMal form edMessages="true7 >
</diagnostics>
</system .serviceModel >

B <system.servi ceModel >
<diagnostics/>
<messageLogging logEntireMessage="true" maxMessagesToLog="50"
logMessagesAtServiceLevel="true" logMessagesAtTransportLevel="true" I
ogMal form edMessages="trueV >
</system.serviceModel >

C <system.serviceModel>
<diagnostics messageLogging>
<logEntireMessage="true" maxMessagesToLog="50"
I ogMessagesAtServi ceLevel ="true" I ogMessagesAtTransportLevel ="true"
I ogMal form edMessages="true7 >
</diagnostics>
</system.serviceModel>

D <system.serviceModel>
<diagnostics messageLogging logEntireMessage="true"
maxMessagesToLog="50"
I ogMessagesAtServi ceLevel ="true" I ogMessagesAtTransportLevel ="true"
I ogMal form edMessages="true7 >
</diagnostics>

You have created a WCF service that enables the employees of your
organization to retrieve information from the organization's database. Now,
you want to log the messages transferred between the service and the client
applications over the network. Which of the following code snippets will you
use to log messages?
A. <system.serviceModel>
<diagnostics>
cmessageLogging logEntireMessage="true" maxtvlessagesToLog="50"
logMessagesAtServiceLevel="true" logMessagesAtTransportLevel=
,,
true"
logMalformedMessages="true7>
</diagnostics>
</system. serviceModel>
B <system.serviceModel>
<diagnostics/>
cmessageLogging logEntireMessage="true" maxMessagesToLog="50"
logMessagesAtServiceLevel="true" logMessagesAtTransportLevel="true"
logMalformedMessages="true7>
</system.serviceModel>
C <system.serviceModel>
<diagnostics messageLogging>
<logEntireMessage="true" maxMessagesToLog="50"
I ogMessagesAtServi ceLevel ="true" I ogMessagesAtTransportLevel ="true"
I ogMal form edMessages="true7 >
</diagnostics>
</system.serviceModel>

D <system.serviceModel>
<diagnostics messageLogging logEntireMessage="true"
maxMessagesToLog="50"
I ogMessagesAtServi ceLevel ="true" I ogMessagesAtTransportLevel ="true"
I ogMal form edMessages="true7 >
</diagnostics>
</system.serviceModel>


Cu 49:
Which of the following WCF serialization classes can be used only when both
the serializing and deserializing ends share the same CLR types?
C DataContractJsonSerializer
C NetDataContractSerializer
XmlSerializer
C DataContractSerializer


Cu 50:
Henry Blake was assigned the task of testing an application that
provides automated solutions for the electronic marketplace. Henry
has to create relevant test cases on the basis of which test plans will
be executed. Henry has to check whether the application runs
successfully on all supported hardware and software environments.
In the execution of which test plan will the criteria be satisfied
successfully?

A. Integration Test Plan
B. System Test Plan
C. Acceptance Test Plan
D. Unit Test Plan

Cu 51:
Identify the person responsible for defining the acceptance criteria
of a software.
A Developer
B Test Manager
C Tester
D Customer



Cu 52:
AB Corp. has developed a server-based application. The developers at AB
need to test the application for its response time during peak hours, when
the number of users logging on to the application is the highest. Which
testing method should the developers use?
C Operations testing
C Execution testing
C Recovery testing
C Stress testing
Cu 53:
Sam a developer has developed an application software for Tools 2000,
which keeps track of the time spent by each employee on the different
projects allocated. An external team is required to review the functioning of
the application software. Which kind of testing should be conducted to
ensure an external code review of the code?
C Smoke testing
C Beta testing
C Static testing
C Alpha testing
Cu 54:
Which of the following is the exit criteria for executing Unit test plans?
A check whether or not the control is passed from one subprogram to
another in accordance with the program specifications
B Test the client components
C Confirm that the application runs successfully on all supported
hardware and software environments
D Check the accuracy of the output interface file
Cu 55:
Sam has created a component using .NET Framework. He has created a
server application to host the component and written the following code
snippet in the server application to register a remote object:
Rem oti ngConfiguration.RegisterWelIKnownServiceType
(typeof(RemoteObject.Classl),"RemoteObject",
WelIKnownMode.SingleCalI);
However, while compiling the server application he received an error in the
application. Which of the following options is the correct solution?
A The second parameter should be the name of the class of the component.
B The typeof parameter should have method of the component as argument.
C The method to register the object should be Regi sterWelIKnownService.
D The third parameter should be WellKnownObjectMode.
Cu 56:
Which of the following classes specifies whether components in the assembly
run in the applications' process or in a system process?
A ApplicationActivationAttribute
B ApplicationAccessControl Attribute
C SecureMethodAttribute
D SharedProperty
Cu 57:
Which of the following comprises of a step-by-step procedure of the actions
to be taken in a test process?
C Test Script
C Test Strategy
C Test Condition
C Test Data
Cu 58:
Consider the following statements:
Statement A: A Test Manager should effectively use constructive criticism as
a tool to improve the performance of the team members. Statement B: A Test
Manager should be reactive in providing constructive criticism.
Which of the following is correct about the above statements?
C Both, Statement A and Statement B, are False.
C Both, Statement A and Statement B, are True.
C Statement A is True and Statement B is False.
C Statement A is False and Statement B is True.
Cu 59:
Joe has created a WCF service that communicates with a client application
over the Internet. She wants to log the information related to the conversion
of the data exchanged between the service and a client application into a
standard format. Which of the following trace sources allows Joe to log
messages?
C System. ServiceModel.MessageLogging
C System.IO.Log
C System.ServiceModel
C System.Runtime.Serialization
Cu 60:
A RESTful service is a collection of that contain the
data or information to be sent to a client application.
C Data
C Resources
C SOAP packets
C Web feeds
Cu 61:
Consider the following statements:
Statement A: Installation testing checks the software installed on the system.
Statement B: Documentation testing checks the accuracy of documents.
Which of the following is correct about the preceding statements?
C Both, Statement A and Statement B, are False.
C Statement A is False and Statement B is True.
C Both, Statement A and Statement B, are True.
C Statement A is True and Statement B is False.
Cu 62:
Jim Morrison was asked to test a software developed by HRM Systems Inc.
The software provides automation solutions for managing the HR
department of the company. While testing the software, Jim found that
certain features of the software were not functioning according to the
standards and guidelines provided by the client. While communicating these
errors to the development team, which step should be performed by Jim that
will determine the cause of the software problems?
C identify the procedures used in producing the condition.
C identify the flow of information leading to the condition.
C identify the statement of condition.
C identify the resources used for producing the condition.
Cu 63:
Which of the following qualities should a software tester have?
C Pleasing personality
C Creativity
C Good documentation skills
C Good presentation skills
Cu 64:
The TChannel attribute of the ChannelFactoryo class represents a/an
C Endpoint address of the service
C Method of the service
C Class of the service
C The name of the interface of the service
Cu 65:
Which of the following is NOT a test effort estimation technique?
KPA
TPA
Parametric modeling
FPA
Cu 66:
Which of the following defines the scope of the testing activity?
C Test Specifications
C Test Plan Review
C Test Plan
C Test Procedure
Cu 67:
Consider the following statements:
Statement A: Test effort estimation is the responsibility of a test manager.
Statement B: The test effort estimate helps in determining the number of
testers and time required for software testing.
Which of the following is correct about the above statements?
C Both, Statement A and Statement B, are True.
C Statement A is False and Statement B is True.
C Both, Statement A and Statement B, are False.
C Statement A is True and Statement B is False.




Cu1 :
Job Solutions Inc. has developed a web site for online application for jobs.
During software acceptance testing, it was found that some of the features in
the software were not functioning as per the acceptance criteria. As a result,
the customer was not satisfied with the final product and rejected the
software. Identify the best strategy that should have been implemented by
Job Solutions for meeting the acceptance criteria.

1identifying the business standards and procedures for software
development
2Detecting software defects early during development
3Considering customers requirements early during software development
4preparing appropriate test facilities

Cu2 :
You have created a WCF service and hosted it as a Windows service so that it
starts automatically when the user's computer starts and stops automatically
when the computers shuts down. To enable the user to access the service,
you also need to create a client application.
Which of the client applications will you create to access the service?
C Console client application
C Java client application
C ASP.NET client application
C Windows client application
Cu3 :
Which of the following is an effective technique for resolving disagreement in
a defect acknowledgement process?
CMeetings between the testing and development teams to determine the
understanding of the defects
CThe customer using the software determines whether or not the problem is
a defect.
CThe development team ignores the defect as the testing team is only meant
to find defects
Ca senior manager of the software development project supports the
development team to ignore defect.
Cu 4:
Raymond has developed an application software for a Ranch to keep a record
of all the poultry and horses on the ranch. This application software has lot
of uncertainty regarding the correctness of processing in the new application
software, and the old and new versions of the application software are
similar Identify the ideal testing technique for performing this task.
C intersystem testing
C Parallel testing
C Control testing
C Regression testing
Cu5 :
.Identify the person responsible for identifying the critical success factors of
a software in the project plan.
C Developer
C Customer
C Project Manager
C Tester
Cu 6:
Which of the following values of the ImpersonationOption property specifies
that impersonation is implemented when a client provides its credentials to
the service?
C Required
C Allowed
C NotRequired
C NotAllowed
Cu 7:
Consider the following statements:
Statement A: Periodic review of software projects helps to identify potential
risks to future projects and their test process.
Statement B: The plan of the software project can be reviewed to gather
relevant information
Which of the following is correct about the preceding statements?
CStatement A is Trueand Statement B is False.
CBoth, Statement A and Statement B, are True.
CStatement A is False and Statement B is True.
CBoth, Statement A and Statement B, are False.
Cu 8:
David has created a WCF service that is accessed by multiple users over the
Internet and over an Intranet. He has implemented message logging in the
service to track the messages received and sent by the service. The
information related to the logged messages is critical and confidential. Which
of the following security concerns David should consider to secure the
information from the multiple users?
CSpecify a path for the log file location that should be inside the Web host
public directory.
CChoose a file extension that can be easily to a user.
CEnsure that the log or text files are protected by Access Control Lists.
CSet the logKnownPii attribute to false
Cu9 :
Problem: Net Solutions Ltd has developed a software to create HTML pages
without coding. Operations testing needs to be carried out on the software.
The test manager needs a document to bring together all the important
information about testing, including an assessment of how well the testing
has been done, the number of incidents raised and an assessment of the
quality of the system. Which kind of document should the test manager
prepare to assimilate all this information?
Solution: The test manager should prepare a test log.
How well does the solution address the problem?
C Meets the requirement and is a desirable solution
C Meets the requirement and is an outstanding solution
C Meets the requirement but is not a desirable solution
C Does not meet the requirement although it appears to work
Cu10 :
.Infinity Solutions is developing a voice recognition system. A sister concern
of the company has tested a similar application. The testing team of Infinity
Solutions wants to use the experienced testers of the sister concern for
identifying risks that can occur during testing. Which risk identification tool
will these experience testers use in this case?
C Observation
C Survey
C interview
C Checklist

Cu 11:
Peter Cooper has recently been appointed as the Test Manager in ICIS Ltd.
and has to manage a staff of 25 certified testers. Peter soon realized that
there were ego problems among the team members. Moreover, the attitude
of the team members was affecting the project. Peter decided to point out
this issue at the weekly project update meetings. Which quality of the team
member is lacking in Peters team members?
C Providing information effectively
C Providing constructive criticism
C Demonstrating personal effectiveness
C Demonstrating leadership qualities
Cu 12:
Lara, a distributed application developer, has developed a WCF service to
check the usage of FaultContract. She has written the following code snippet
in the WCF service:
[ServiceContract] public interface IService {
[OperationContract]
[FaultContract(typeo f(MyFaultException))]
DataSetGetEmpDetails(intEmpID);
}
[DataContract]
public class MyFaultException
{
public string errorMessage;
}
Compiling the WCF senvice does not produce any error. However, Lara is
unable to access the errorMessage variable in the client application. What
could be the reason?
CTheMyFaultException class should be attributed with FaultContract.
CThe errorMessage variable should be attributed FaultContract.
CThe errorMessage variable should be attributed with DataMember.
CTheMyFaultException class should be attributed with OperationContract.
Cu 13:
Consider the following statements:
Statement A: Test procedure specification document is solely developed
from the test case specification document.
Statement B: The test procedure specification document describes how a
tester will physically perform a test, the physical set-up required, and the
procedural steps that should be followed to perform the test.
Which of the following is correct about the above statements?
CStatement A is False and Statement B is True.
CBoth, Statement A and Statement B, are False.
CStatement A is Trueand Statement B is False.
CBoth, Statement A and Statement B, are True.
Cu 14:
Which of the following is the first step in test effort estimation?
CDeveloping a test plan strategy
Cidentifying components that need to be tested
CComputing the size of the application
Cidentifying the tasks to be performed
Cu 15:
Consider the following statements:
Statement A: A Test Manager should criticize a team member on a one-to-
one basis, preferably in a neutral location.
Statement B: A Test Manager should criticize a team member, without
considering the past performance of the team member.
Which of the following is correct about the above statements?
CBoth, Statement A and Statement B, are True.
CBoth, Statement A and Statement B, are False.
CStatement A is False and Statement B is True.
CStatement A is True and Statement B is False.
Cu 16:
D & A software solution Inc. is currently developing a software application
for Kewl Ships Ltd., which is a ship designing organization. The stakeholders
need to know the average time period after which a defect occurs in the
software project because the accurate functioning of this software is very
critical. Which metric should be gathered?
C Cyclomatic Complexity
C DD
r MTTF
c DRE
Cu 17:
Which of the following bindings supports message queuing?
CnetPeerTcpBinding
CnetMsmqBinding
CnetNamedPipeBinding
CnetTcpBinding
Cu 18:
Consider the following statements:
Statement A: The tester while creating test cases estimates the expected test
results, whereas, the actual test results occur during execution of these test
cases.
Statement B: When the tester executes a test script, the tester must be aware
of the test conditions, the general test objectives, and the specific test
objectives listed for that test script.
Which of the following is correct about the above statements?
CStatement A is True and Statement B is False.
CBoth, Statement A and Statement B, are False.
CBoth, Statement A and Statement B, are True.
CStatement A is False and Statement B is True.
Cu 19:
Jan Matthews has been assigned to test a Java application developed by Java
Max Corp. For a particular Java code, Ian requires sufficient number of test
cases to verify whether each condition affects the result of its encompassing
decision. Which Code Coverage measure is best suited for this situation?
C Condition Coverage
C Multiple Condition/Decision Coverage
C Decision Coverage
C Condition/Decision Coverage
Cu 20:
Which of the following code snippets can be used to specify the
OperatonBehavior attribute to implement transactions in a WCF service?
1public class Service :IService {
[OperationBehavior(TransactionAutoComplete,TransactionScopeRequired)]
public string ShowHelloo
{
return ("Hello!!");
}

4public class Service :IService {
[OperationBehavior(TransactionAutoComplete =
trueJransactionScopeRequired)] public string ShowHelloQ
{
return ("Hello!!");
}
}
2public class Service :IServicei
[OperationBehavior(TransactionAutoComplete,TransactionScopeRequired
true)]
public string ShowHelloO
{
return ("Hello!!");
{
[OperationBehavior(TransactionAutoCorn pi ete,Transact! onScopeRequi red
true)]
public string ShowHelloO
{
return ("Hello!!");
}
}
3public class Service :IService{
[OperationBehavior(TransactionAutoComplete =
trueJransactionScopeRequired = true)] public string ShowHelloO
{
return ("Hello!!");
}
}

Cu21 :
Which of the following WCF serialization classes can be used only when both
the serializing and deserializing ends share the same CLR types?
CNetDataContractSerializer
CDataContractJsonSerializer
CDataContractSerializer
CXmlSerializer
Cu 21:
Which of the following phases in the Testing Life Cycle involves evaluating
software quality using metrics?
C Quantitative measurement
C Planning process
C Defect tracking and management
C Risk analysis
Cu 22:
Which domain of software testing involves large enterprises using complex
applications to manage and integrate business processes across multiple
divisions and organizational boundaries?
C Business Reengineering
C Enterprise Resource Planning
C E-Commerce
C Knowledge Management
Cu23 :
Which of the following classes specifies whether components in the assembly
run in the applications' process or in a system process?
C SharedProperty
C ApplicationActivationAttribute
C ApplicationAccessControl Attribute
C SecureMethodAttribute
Cu 24:
In which type of application architecture, the data access layer is divided into
data access layer and data layer?
C N-tier architecture
C Three-tier architecture
C Single-tier architecture
C Two-tier architecture
Cu 25:
Consider the following statements:
Statement A: FPA is used to estimate the size of a test effort. Statement B:
TPA is used to estimate the size of a software application.
Which of the following is correct about the above statements?
CStatement A is True and Statement B is False.
CBoth, Statement A and Statement B, are True.
CBoth, Statement A and Statement B, are False.
CStatement A is False and Statement B is True.
Cu 26:
You have created a WCF service that communicates with a multiple Windows
applications simultaneously. You wanted your service to use TCP protocol to
interact with the client applications. For this, you have created a customized
channel listener that listens to the request by using the following code
snippet:
CustomBindingcb = new CustomBindingO;
cb.Elements.Add(new TcpTransportBindingElementO);
IChannelListener<IReplyChannel>lis=
cb.BuildChannelListener<IReplyChannel>(new
Uri("net.tcp// local host: 8000/ MyWCFService"), new
BindingParameterCollectionO);
lis.OpenO;
IReplyChannelrepchnl = lis.AcceptChannelO; repchnl.OpenO;
RequestContextrc = repchnl.ReceiveRequestO;
Message reqmes = rc.RequestMessage;
rc.Reply(repmes);
reqmes.CloseO;
Message reqmes = rc.RequestMessage;
rc.Reply(repmes);
reqmes.CloseO;
rc.CloseO;
repchnl.CloseO;
Ms.CloseO;
After writing the preceding code snippet in the service and
executing it, you find that an error occurs in the service. Which of
the following code snippets will you use to rectify the error and
execute the service successfully?
1.CustomBindingcb = new CustomBindingO;
cb.Elements.Add(new TcpTransportBindingElementO);
IChannelListener<IReplyChannel>Ms =
cb.BuildChannelListener<IReplyChannel>(new
Uri("net.tcp// local host: 8000/ MyWCFService"), new
BindingParameterCollectionO);
lis.OpenQ;
2 .Customindingcb = new CustomindingO;
cb.Elements.Add(new TcpTransportindingElementO);
IChannelListener<IReplyChannel>lis =
cb.uildChannelListener<IReplyChannel>(new
Uri ("nettcp//local host: 8000/ MyWCFSeivice"), new
BindingParameterCollectionO);
lis.OpenO;
repchnl.OpenO;
RequestContextrc = repchnl.ReceiveRequestO;
Message reqmes = rc.RequestMessage;
Message repmes = Message.CreateMessageC Message Created");
rc.Reply(repmes);
reqmes.CloseO;
rc.CloseO;
repchnlClose;
lis.CloseO;
3. CustomBindingcb = new CustomindingO;
cb.Elements.Add(new TcpTransportindingElementO);
IChannelListener<IReplyChnnel>lis =
cb.BuildChannelListener<IReplyChannel>(new
Uri ("nettcp//local host: 8000/ MyWCFSen/ice"), new
BindingParameterCollectionO);
IReplyChannelrepchnl = Ms.AcceptChannelO;
repchnl.OpenO;
RequestContextrc = repchnl.ReceiveRequestO;
Message reqmes = rc.RequestMessage;
Message repmes = Message.CreateMessageC Message Created");
rc.Reply(repmes);
reqmes.CloseO;
rcCloseO;
repchnl.CloseO;
lis.CloseO;
4 .Customindingcb = new CustomindingO;
cb.Elements.Add(new TcpTransportBindingElementO);
IChannelListener<IReplyChnnel>lis =
cb.uildChannelListener<IReplyChannel>(new
Uri ("net.tcp//local host: 8000/ MyWCFService,m), new
BindingParameterCollectionO);
lis.OpenO;
IReplyChannelrepchnl = Ms.AcceptChannelO;
repchnl.OpenO;
Message reqmes = rc.RequestMessage;
Message repmes = Message.CreateMessageC Message Created");
rc.Repiy(repmes);
reqmesClseO;
rc.CloseO;
repchnl.CloseO;
lis.CloseO;

Cu27 :
Which of the following ensures quality in the product being developed?
C Quality control
C Quality objectives
C Quality assurance
C Quality policy
Cu 28:
You have created a WCF service and implemented transport-level
security. You want that the username and password provided by a
client accessing the service should be authenticated against the Active
Directory. Which of the following values of the clientCredentialType
attribute will allow you to do this?
C Basic
C Certificate
C Windows
C None
Cu 29:
Which of the following options is an operating system service
embedded in IIS 7.0 that is the built-in Web server for Windows Vista?
C .NET application
C MS
r was
C Windows service
Cu30 :
Which of the following values of the performanceCounters attribute
specifies the information provided by the ServiceModelService,
ServiceModelEndpoint, and ServiceModelOperation performance
counters?
1 On
2 ALL
3. off
4. ServiceOnly
Cu 31:
You are creating a component for a bank. The component enables
bank customers to retrieve the details of the transactions done in their
account through a Web application. To retrieve the details of the
transactions, the customers have to provide their account numbers as
input . For this, you have written the following code snippet in the
component: using System.Data; using System.Data.SqICIient;
[Marshal ByRefObject] namespace RemoteObject {
public class Classl {
publicDataSetTransDetails(string AccountNumber)
{
stringconstring = " server=MyServer;database =lmperialBank;user id
=sa; password = niit#pass
string query = "Select TransactionJd as 'Transaction Id',
Transaction_Dateas 'Transaction Date',Credit, Debit, BaLAmt as
'Balance Amount' from Transactions where acc_no = + AccountNumber
^ Mill.
SqIConnection con = new SqlConnection(constring);
SqlDataAdapter da = new SqlDataAdapter(query, con);
DataSet ds = new DataSetO; da.Fi 11 (ds, "Transactions"); return ds;
}
}
However, while executing the application to verify the component, an
error occurred. Which of the following code snippets will you use to
execute the application successfully?

1.using System .Data;
usingSystem.Data.SqIClient; namespace RemoteObject
{
public class Classl {
[M ars h al By Re fObj e c t]
publicDataSetTransDetails(string AccountNumber)
{
stringconstring = " server=MyServer;database =lmperialBank;user id
=sa; password = niittfpass
string query = "Select Transact!onJd as 'Transaction Id',
Transaction_Date as 'Transaction Date',Credit, Debit, BaLAmt as
'Balance Amount' from Transactions where acc_no = + AccountNumber
^ mil.
SqIConnection con = new SqlConnection(constring);
SqlDataAdapter da = new SqlDataAdapter(query, con);
DataSet ds = new DataSetO; da.Fi 11 (ds, "Transactions");
return ds:
2. usingSystem.Data;
usingSystem.Data.SqICIient; namespace RemoteObject
{
[Marshal By Re fObject] public class Classl
{
publicDataSetTransDetails(string AccountNumber)
{
stringconstring = " server=MyServer;database =lmperialBank;user id
=sa; password = niit#pass
string query = "Select Transaction_ld as 'Transaction Id',
Transaction_Date as 'Transaction Date',Credit, Debit, BaLAmt as
'Balance Amount' from Transactions where acc_no = '" +
AccountNumber
^ Hill.
SqIConnection con = new SqlConnection(constring);
SqlDataAdapter da = new SqlDataAdapter(query, con);
DataSet ds = new DataSetO; da.Fi 11 (ds, "Transactions");
return ds;
3.using System .Data;
usingSystem.Data.SqIClient; namespace RemoteObject
{
[Marshal By Re fObject] public class Classl {
publicDataSetTransDetails(string AccountNumber)
{
stringconstring = " server=MyServer;database =lmperialBank;user id
=sa; password = niittfpass ";
string query = "Select Transactionjd as 'Transaction Id',
Transaction_Date as 'Transaction Date',Credit, Debit, BaLAmt as
'Balance Amount' from Transactions where acc_no = '" +
AccountNumber
^ mil.
SqIConnection con = new SqlConnection(constring);
SqlDataAdapter da = new SqlDataAdapter(query, con);
DataSet ds = new DataSetO; da.Fi11 (ds, "Transactions"); return ds:
4.Cusing System.Data;
usingSystem.Data.SqICIient; namespace RemoteObject
{
public class Classl
{
publicDataSetTransDetails(string AccountNumber)
{
stringconstring = " server=MyServer;database =lmperialBank;user id
=sa; password = niit#pass ";
string query = "Select Transactionjd as 'Transaction Id',
Transaction_Date as 'Transaction Date',Credit, Debit, BaLAmt as
'Balance Amount' from Transactions where acc_no = '" +
AccountNumber
^ Hill.
SqIConnection con = new SqlConnection(constring);
SqlDataAdapter da = new SqlDataAdapter(query, con);
DataSet ds = new DataSetO; da.Fi11 (ds, "Transactions"); return ds;
Cu 32:
You are creating a WCF service that needs to be accessed by an AJAX-
enabled Web application. Which of the following WCF serialization
classes will you use to serialize and deserialize an object of the service
into a standard format to enable the service to communicate with the
application?
C NetDataContractSerializer
C DataContractSerializer
C XmlSerializer
C DataContractJsonSerializer
Cu 33:
You are creating a WCF service that needs to be accessed by an AJAX-
enabled Web application. Which of the following WCF serialization
classes will you use to serialize and deserialize an object of the service
into a standard format to enable the service to communicate with the
application?
C NetDataContractSerializer
C DataContractSerializer
C XmlSerializer
C DataContractJsonSerializer
Cu 34:
Consider the following statements:
Statement A: Pareto voting is based on pareto principle.
Statement B: Pareto principle states that 20% of the problems result
from 80% of the possible causes.
Which of the following is correct about the above statements?
CBoth, Statement A and Statement B, are True.
CBoth, Statement A and Statement B, are False.
CStatement A is False and Statement B is True.
CStatement A is True and Statement B is False.
Cu 35:
Jim has created a component using .NET Framework. He wants that
when a client application accesses the component, a copy of the
remote object of the component is created and passed to the client
application. Which of the following code snippets will Jim use to
accomplish the preceding task?
1/ [Serializable Attribute] public class Classl
{
}
2/ public class Classl : Marshal ByRefObject
{
}
3. [Marshal ByRefObject] public class Class
{
}


Cu 35:
Which of the following HTTP methods is used to transfer a file over the
Web?
1 PUT
2 DELETE
3\ GET
4 post
Cu 36:
Albert has created a WCF service that accepts two numbers from the
user and divides the first numbers with the second. While creating the
service, he realized that there might be a possibility that the second
number may be zero. This may cause an error. To handle this error,
Albert needs to implement exception handling in the service. Which of
the following code snippet will he use to display the reason and code
for the error?

1/ public intDivide(int numerator, int denominator)
{
if (denominator == 0)
{
throw new FaultException(FaultReason("A number cannot be divided by
zero."), FaultCode(new FaultCode("DivideBy2eroException")));
}
return numerator / denominator;
}
2/public intDivide(int numerator, int denominator)
{
if (denominator == 0)
{
throw new Fault(new FaultReason("A number cannot be divided by
zero."), FaultCode.CreateReceiverFaultCode(new
FaultCode("DivideBy2eroException")));
}
}
3/ public intDivide(int numerator, int denominator)
{
if (denominator == 0)
{
throw new FaultException(new FaultReason("A number cannot be
divided by zero."), FaultCode.CreateReceiverFaultCode(new
FaultCode("DivideByZeroException")));
}
return numerator / denominator;
4/ public intDivide(int numerator, int denominator)
{
if (denominator == 0)
{
throw new FaultException(FaultReason("A number cannot be divided by
zero."), FaultCode.CreateReceiverFaultCode(new
FaultCode("DivideByZeroException")));
}
return numerator / denominator;
}
Cu 37:
You need to consume a Web service in a client application. Identify the
correct sequence of steps required.
I/l. Add a Web reference of the Web service in the client application.
7. Generate a proxy class for the Web service.
8. Create an object of the Web service proxy class.
9. Access the Web service by using the proxy object.
2/l. Generate a proxy class for the Web service.
2. Create an object of the Web service proxy class.
3. Add a Web reference of the Web service in the client application.
4. Access the Web service by using the proxy object.
3/i. Generate a proxy class for the Web service.
2. Add a Web reference of the Web service in the client application.
3. Create an object of the Web service proxy class.
4. Access the Web service by using the proxy object.
4/
1. Generate a proxy class for the Web service.
10. Add a Web reference of the Web service in the client application.
11. Access the Web service by using the proxy object.
Create an object of the Web service proxy class.
Caau38:
Safe Software Ltd. is developing a software application for mobile
phones. This is the first time that Safe Software Ltd. has been involved
in such type of development. The senior management wants to find
defects in the software application at the earliest possible stage so as
to control the impact of the defects on the system. Which of the
following will help the developers at Safe Software Ltd. to effectively
find defects while developing the application?
1 Regression Testing
2 Validation
3 inspection
4 The developers can enhance software code to capture the state of
the environment when an abnormal or unknown condition occurs
within the system
Cu39 :
You have created a WCF service using .NET Framework. You have to
implement transaction on a method in the service. In addition, want to
specify that the current transaction will be completed automatically if
no exception occurs during the transaction. For this, you have written
the following code snippet:
public class Service : IService
{
[Transact! onAutoCom pi ete =true,TransactionScopeRequired = false]
public string DisplayMessageQ
{
return ("Hello Client");
}
}
While executing the service, an error occurred. Which of the following
code snippets will you use to execute the service successfully?
1public class Service :IService i
[OperationBehavior(TransactionAutoComplete
=false,TransactionScopeRequired = true)] public string
DisplayMessageO i
return ("Hello Client");
}
}
2public class Service :IService
{
[Transact! onAutoCom pi ete =true,TransactionScopeRequired = true]
public string DisplayMessageO
{
return ("Hello Client");
}
}
3public class Service :IService
{
[OperationBehavior(TransactionAutoComplete =
true,TransactionScopeRequired = true)] public string DisplayMessageO
{
return ("Hello Client");
}
}
4 public class Service : IService {
[OperationBehavior(TransactionAutoComplete
=true,TransactionScopeRequired = false)] public string
DisplayMessageO {
return ("Hello Client");
}
}
Cu 1:
Consider the following statements:
Statement A: Frequent and periodic reviews of projects are not required to
identify the potential risks to future projects. Statement B: Project plans can
be reviewed to gather relevant information.
Which of the following is correct about the preceding statements?
A. Both, Statement A and Statement B, are False.
B. Statement A is False and Statement B is True.
C. Both, Statement A and Statement B, are True.
D. Statement A is True and Statement B is False.:
Cu 2
In which phase of Software Development Life Cycle (SDLC), the software
acceptance criteria is defined?
Requirements
Design
Testing
Coding

Cu 4:
You need to consume a Web service in a client application. Identify the
correct sequence of steps required.
A. l. Generate a proxy class for the Web service.
1. Create an object of the Web service proxy class.
2. Add a Web reference of the Web service in the client application.
3. Access the Web service by using the proxy object.
B. l. Add a Web reference of the Web service in the client application.
2. Generate a proxy class for the Web service.
3. Create an object of the Web service proxy class.
4. Access the Web service by using the proxy object.
C. l. Generate a proxy class for the Web service.
2. Add a Web reference of the Web service in the client application.
3. Access the Web service by using the proxy object.
Create an object of the Web service proxy class.
D. 1. Generate a proxy class for the Web service.
4. Add a Web reference of the Web service in the client application.
5. Create an object of the Web service proxy class.
Access the Web service by using the proxy object

Cu 5:
Peter is creating a WCF service that will be accessed over the Internet. He
wants to authenticate a user through a membership provider. In addition, he
wants that the password provided by the user should be encrypted and
stored in the database. Which of the following attributes allow him to do
this?
A. enablePasswordReset
B. enable Pas sword Retrieval
C. passwordFormat
D. minRequiredPasswordLength
Cu 6:
You have created aWCF service and hosted it as a Windows service so
that it starts automatically when the user's computer starts and stops
automatically when the computers shuts down. To enable the user to
access the service, you also need to create a client application.
Which of the client applications will you create to access the service?
A. Java client application
B. Windows client application
C. ASP.NET client application
D. Console client application
Cu 7:
Sam a developer has developed an application software for Tools 2000, which keeps
track of the time spent by each employee on the different projects allocated. An
external team is required to review the functioning of the application software. Which
kind of testing should be conducted to ensure an external code review of the code?
A Static testing
B Smoke testing
C Alpha testing
D Beta testing
Cu 8:
Consider the following statements:
Statement A: A control chart is used to determine whether a process is in
control.
Statement B: The objective of a control chart is to monitor the variation of a
statistically stable process wherever activities are repetitive.
Which of the following is correct about the above statements?
<* Statement A is False and Statement B is True.
C Both, Statement A and Statement B, are False.
C Both, Statement A and Statement B, are True.
C Statement A is True and Statement B is False.
Cu 9:
Henry Ford was assigned to test a Java application developed by Smart Java
Co. While testing a particular Java code, Henry suggested to his team that if
they want complete code coverage, all the Boolean sub-expressions must be
separated by logical || and && operators. Also, the test cases created require
a logical operator truth table.
The truth table will describe the relationship of logical operators for a
particular condition. Identify the relevant Code Coverage measure in this
situation.
C Path Coverage
C Condition Coverage
C Decision/Condition Coverage
C Multiple Condition Coverage
Cu 10:
Which of the following properties of a transaction ensures that the changes
made to the system after the successful completion of a transaction are
permanent?
C Consistency
C Atomicity
C Durability
C Isolation
Cu 11:
Which of the following COM+ services enables a component to maintain data
integrity and consistency by grouping various related operations as an
atomic unit?
C object pooling
C Role-Based Security
C Synchronization
C Transactions
Cu 12:
Which of the following attributes allows client applications running on user's
computer to log information that includes the username and the password of
the user?
C name
C logKnownPii
C type
C initializeData
Cu 13:
What is the role of Manual testing in the Test Execution process?
C To ensure that all the functions performed by a system are in accordance
with the requirements.
C To verify the systems ability to recover from varying degrees of failure.
C To verify that the software application module that is currently being
installed does not affect the functioning of a previously installed application.
C To ensure that the people interacting with the automated system
accurately perform their functions.
Caau14:
In WCF, you want to expose a peer to allow communication among multiple
peers over a P2P network. Which of the following options enables you to
expose the peer?
C netPeerTcpBinding
C Peer Name Resolution Protocol
C PeerNameRecordCollection class
C PeerNameResolver class
Caau15:
Consider the following statements:
Statement A: A test bed is prepared to conduct a test based on the
requirements stated for a test environment and the strategy devised to
implement it.
Statement B: A test bed only contains the hardware necessary to conduct a
test.
Which of the following is correct about the above statements?
C Both, Statement A and Statement B, are False.
C Statement A is True and Statement B is False.
C Both, Statement A and Statement B, are True.
C Statement A is False and Statement B is True.
Cu 16 :
Michael has created aCOM+ serviced component, MyComponent, using .NET
Framework. After writing the business logic code in the component, he has
performed the following steps to create a strong key for the component:
6. Right-click the Properties node in the Solution Explorer window, and
then select Open.
7. Clear the Protect my key file with a password check box, and then click
the OK button.
8. Select the New option from the Choose a strong name key file drop-
down list..
9. Type MyComponentKey in the Key file name text box.
10. Select the Sign the assembly check box
11. Click the Signing tab in the BankComponent window.
After performing the preceding steps, Michael registered the component in
the Component Services tool. While registering the service, he received an
error related to the strong key. Which of the following sequence of steps
should he perform to create the strong key properly and register the
component successfully?
A. l. Right-click the Debug node in the Solution Explorer window, and then
select Open.
12. Click the Signing tab in the BankComponent window.
13. Type MyComponentKey in the Key file name text box.
14. Select the New option from the Choose a strong name key file drop-
down list.
15. Select the Sign the assembly check box.
Clear the Protect my key file with a password check box, and then click the
OK button.
B. l. Right-click the Debug node in the Solution Explorer window, and then
select Open.
16. Click the Signing tab in the BankComponent window.
17. Select the New option from the Choose a strong name key file drop-
down list.
18. Select the Sign the assembly check box.
19. Type MyComponentKey in the Key file name text box.
20. Clear the Protect my key file with a password check box, and then click
the OK button.
C. l. Right-click the Properties node in the Solution Explorer window, and then
select Open.
5. Clear the Protect my key file with a password check box, and then click
the OK button..
6. Select the Sign the assembly check box.
7. Select the New option from the Choose a strong name key file drop-
down list.
8. Type MyComponentKey in the Key file name text box.
Click the Signing tab in the BankComponent window
D. 1. Right-click the Properties node in the Solution Explorer window, and then
select Open.
21. Click the Signing tab in the BankComponent window.
22. Select the Sign the assembly check box.
23. Select the New option from the Choose a strong name key file drop-
down list.
24. Type MyComponentKey in the Key file name text box.
Clear the Protect my key file with a password check box, and then click the
OK button.

Cu 17:
Which of the following advantages of a P2P network allows peers to share
content over a network without the involvement of the server?
C Distributed processing
C Content distribution
C Increased scalability
C Less expensive
Cu 18:
P and L Software Solutions is a software development organization. The
developers at P and L Software Solutions are involved in an Air Traffic
Control Software project. The project uses very sensitive data and high
accuracy is demanded at all times as information provided is highly critical.
The testing team, however, were not able to provide the developers with
enough information to reproduce a defect that would have occurred while
testing the software. How can the developers help the testing team in
accurately conveying the software defect?
c The developers can start testing the software with the testers.
c The developers can tell the testers to ignore any strange defect that occurs
in the system
c The developers can ask for a change in the skill set of the testing team.
c The developers can upgrade the software code to create an error log file
that states the environment when an abnormal or unknown condition occurs
within the svstem.

Cu 19:
Which of the following components form an endpoint in WCF?
C Address, Contract, Namespace
C nam espace, Bi ndi ng, Contract
C Address, Binding, Contract
C Address, Namespace, Binding

Cu 23:
You want to create a user-defined binding to create a reliable https based
binding named MyBinding that implements reliable session and uses the
httpstransport protocol to send and receive SOAP messages from a client
application. For this, you have written the following code snippet in the
Web.config file:
<system.serviceModel>
<bindings>
<customBinding>
<binding name="MyBinding">
<reliableSession sequence="true'7>
<httpsTransport/>
</binding>
</customBinding>
</bindings>
</system.serviceModel>
However, you did not get the desired functionality due to an error in the
code snippet. Identify the reason for the error and provide
A. <system. servi ceModel>
<bindings>
<custominding>
<binding name="MyBinding"> <reliableSession ordered="true'7>
<httpsTransport/>
</binding>
</customBinding>
</bindings>
</system.servi ceModel>
B. The correct code is:
<system.servi ceModel>
<bindings>
<customBinding>
<binding name="MyBinding"> <reliableSession sequence="true7>
</binding>
</customBinding>
</bindings>

</system.servi ceModel>
C. <system.servi ceModel>
<bindings>
<customBinding>
<binding name="MyBinding"> <reliableSession order="sequence7>
<httpsTransport/>
</binding>
</customBinding>
</bindings>
</system.servi ceModel>
D. <system.servi ceModel>
<bindings>
<customBinding>
<binding name="MyBinding"> <reliableSession sequence="false'7>
<httpsTransport/>
</binding>
</customBinding>
</bindinqs>

Cu 24:
which of the following code snippets can be used to specify the Servi
ceBehavi or attribute to implement transactions in a WCF service?
A. usi ng System .Transacti ons;
[Servi ceBehavi or T ransacti onAutoCom pi eteOnSessionCI ose] public class
Service : IService {
public string DisplayMessageO {
return ("Hello Client");
}
}
B. usi ng System.Transacti ons;
[ServiceBehavior(TransactionAutoCompleteOnSessionClose = true)] public
class Service : IService {
public string DisplayMessageO {
return ("Hello Client);
}
}
C. usi ng System .Transacti ons;
[Servi ceBehavi or T ransacti onAutoCom pi eteOnSessionCI ose=true] public
class Service : IService {
public string DisplayMessageO {
return ("Hello Client");
}
}
D. usi ng System .Transacti ons;
[Servi ceBehavior(TransactionAutoCom pi eteOnSessionCI ose)] public class
Service : IService {
public string DisplayMessageO {
return ("Hello Client");
}
}


Cu 25:
The development team knows the number of operators and number of
operands used in a software project. How can they use this information to
calculate the size of the program?
C Software Size= Total number of operator tokens used + Total number of
operand tokens used
C Software Size= Iog2 (Total number of operator tokens used) + log2 (Total
number of operand tokens used)
C Software Size= Total number of operator tokens used * Total number of
operand tokens used
C Software Size= Total number of unique operator tokens used + Total
number of unique operand tokens used
Cu 26:
Which of the following classes is used to inherit a Windows service?
C ChannelFactory<TChannel>
C Channel Factory
C ServiceHost
C ServiceBase

Cu 1:Consider the following statements:
Statement A: Frequent and periodic reviews of projects are not required to identify the
potential risks to future projects.
Statement B: Project plans can be reviewed to gather relevant information.
Both Statement A and B are True
Statement A is False Statement B is True
Cau 2:In which phase of Software Development Life Cycle (SDLC),the software acceptance
criteria is defined ?
Testing
Design
Cau 3:You need to consume a Web service in a client application.Idetify the correct sequence
of steps required.
1.Generate a proxy class for the Web service.
2.Add a Web reference of the Web service in the client application.
3.Create an object of the Web service proxy class.
4.Access the Web service by using the proxy object.
Cau 4:Peter is creating a WCF service that will be accessed over the Internet.
enablePasswordRetrieval
passwordForm at
Cau 5:Which of the following behaviors limits the number of connections,sessions,and
threads to control the number of messages processed by a service simultaneously?
Instance behavior
Metadata behavior
Cau 6: P and L Software Solutions is a software development organization.
The developers can upgrade the software code to create an error log file that states the
environment when an abnormal or unknown..
Cau 7:Robert has created a WCF service and hosted it in IIS.
The class of the service
The endpoint address of the service.


Cau 8:Which of the following classes contains the InstallAssembly method?
ServiceComponent
RegistrationHelper
Cau 9:David has created a WCF service that is accessed by multiple users over the internet
and over an Intranet.
Choose a file extension that can be easily to a user
Set the logKnownPii attribute to false.
Cau 10:The developers at P and L Software Solutions are involved in a AirTraffic Control
Software project.
The developers can upgrade the software code to create an error log file that states the
environment when an abnormal or unknown condition occurs within the system.
Cau 11:Net Solution Ltd has developed a software to create HTML pages without coding.
Test log
Test summary
Cau 12:which domain of software testing involves large enterprises using complex
applications to manage and integrate business processes across multiple divisions
organizational boundaries?
Business Reengineering
E-Commerce
Cau 13:The software testing team of Sysnet Inc. is analyzing the results of a software test on
an ERP application.
Data points do not cluster in a band
Data points cluster in a band from upper right to lower left corner of the scatter plot
Cau 14:Which review checklist helps you to check whether design has been properly
translated into code?
Testing Review Checklist
HLD Review Checklist



Cau 15:You have created a component using .NET Framework and hosted the component in
a server application
using System.Runtime.Remoting.Channels.TCP;
namespace RemoteServer
{
Class Program
{
Static void Main{string[] args)
{
TcpServerChannel channel = new TcpServerChannel(9932);
}
Cau 16:Kim has created a WCF service and implemented queues to manage mismatched
messages production and consumption rates so that the destination doeas not receive
mismatched and unordered messages.Which of the following options depict the preceding
scenario?
Failure isolation
Load leveling
Cau 17:You have created a RESTful service for an online book store.The display the details
of various book in the form of a URL..
<?xml version=1.0 encoding=uft-8?>
<rss version=2.0>
<title>LuxuryDrive Car Details</title>
<link>http://localhost:8000/Service</link>
<description>Details of Cars available at LuxuryDrive
</description>
<item>
<item>Model One</title>
<link>http//localhost/QueryCarDetailsClientApp/M001.aspx</link>
<description>This is the content for Model one</description>
</item>
</rss>




Cau 18:John is creating a WCF service and implemented message-level security in the
service to secure the communication.For this, he has written the following code snippet in the
Web.config file of the service:
<bindings>
<wsHttpBinding>
<binding name=SecurityByMessage>
<security mode=Message>
<message clientCredentialType=Windows/>
</security>
</binding>
</wsHttpBinding>
</bindings>
Cau19: You are implement Windows integrated security in a WCF service.You have written
the following code snippet in the service.
[PrincipalPermission(SecurityAction.Demman,Manager)]
[PrincipalPermission(SecurityAction.Demman,Role =Manager)]
Cau 20: James Cooper,a certified software tester, has been asked by CompCord Inc.
Audit Trail

You might also like