搜档网
当前位置:搜档网 › CCBA认证模拟自测题

CCBA认证模拟自测题

CCBA认证模拟自测题
CCBA认证模拟自测题

CCBA模拟题

1.What factor can be assessed through key performance indicators (KPIs) aligned with enterprise measures, goals, and objectives for a project, process performance targets, or tests for a software application?

a.Non performance.

b.Performance.

c.Solution acceptance.

d.Valu

e.

2.Policies, budget, time, resource availability are all types of __________________ ?

a.Capabilities.

b.Risks.

c.Resources.

d.Constraints.

3.What is the purpose of prioritizing requirements?

a.To rank requirements in the order of relative importance.

b.To determine which requirements carry the most risk.

c.To determine which requirements should be completed first.

d.To ensure requirements align to one another and manage the effects of any proposed chang

e.

4.Tony has listed a risk on the BA risk register that states, "The off-the-shelf solution will not interface with the existing accounting system without significant customization." Team members have asked him to remove it from the register. Why?

a.Because the team has determined a solution.

b.Because the statement is not a risk.

c.Because it is a design risk and should be addressed by the solution architect.

d.Because it is a solution risk that will be addressed by the delivery team.

5."Atomic" is a characteristic of requirements and/or design quality. What does it mean?

a.It is small; atom-like.

b.It contains no extraneous or unnecessary content.

c.It is self-contained and capable of being understood independently of other requirements or designs.

d.It is at the level that will guide further work.

6.Catherine is preparing to analyze requirements. She starts with conducting a thorough stakeholder analysis to identify stakeholders and analyze their characteristics. What technique is Catherine using?

https://www.sodocs.net/doc/b017120317.html,anizational modeling.

b.Stakeholder list, map, or personas.

c.Roles and permissions matrix.

d.Stakeholder analysis.

7.You are planning the business analysis approach to use for the current initiative to which you have been assigned. However, engaging stakeholders presents significant challenge - especially when you invite them for meetings. No matter what you do, many don't show up! What would you try next?

a.Reviews.

b.Escalation.

c.Interviews.

https://www.sodocs.net/doc/b017120317.html,plete the planning alone to avoid falling behind schedul

e.

8.Specifying and Modeling Requirements is a task in which of the following knowledge areas?

a.Strategy Analysis.

b.Requirements Analysis and Design Definition.

c.Elicitation and Collaboration.

d.Solution Evaluation.

9.Which of the following is NOT an element in item tracking technique?

a.Item Record.

b.Item Identifier.

c.Item Management.

d.Metrics.

10.What is the impact of the agile perspective on the planning and execution of elicitation and collaboration tasks?

a.Minimal to none; elicitation and collaboration tasks are planned and executed similarly in an agile environment.

b.While requirements are all elicited at the beginning of the project, they are not formally approved during the project.

c.High level requirements are elicited at the beginning of the project; requirements are detailed right to the appropriate level right before their development begins.

d.There is less emphasis on collaborative elicitation approaches.

11.What are all of the core concepts within the context of requirements life cycle management?

https://www.sodocs.net/doc/b017120317.html,parison, need analysis.

b.Change, need, solution, context, validation, solution.

c.Change, need, solution, context, value, stakeholder.

d.Context, change, solution.

12.Which of the following is NOT a listed strength of developing a Roles and Permission Matrix?

a.Provides procedural checks and balances, as well as data security, by restricting individuals from performing certain actions.

b.Provides an opportunity for stakeholders to be involved in the planning process.

c.Provides documented roles and responsibilities for activities.

d.Promotes improved review of transaction history, in that audit logs can capture details about any

assigned authorities at the time.

13.Which of the following is an input to plan business analysis approach task?

a.Designs.

b.Solution scope.

c.Requirements.

d.Needs.

14.Which of the following techniques would best help in visually uncovering interface requirements quickly and early in the analysis process?

a.Activity diagrams.

b.Prototyping.

c.Entity relationship diagrams.

https://www.sodocs.net/doc/b017120317.html,e cases.

15.What should NOT be considered when evaluating whether or not a solution should be retired or replaced?

a.Necessity.

b.Future investment required.

c.Sunk cost.

d.Opportunity cost.

16.A BA who relies solely on their technical knowledge might be least likely to utilize which of the following tools?

a.Rational rose.

b.Service oriented architecture.

c.Mercury.

d.Maslow's hierarchy of needs.

17.Which of the following describe common non-functional requirement categories?

a.Reliability, compatibility, scalability, dependability.

b.Reliability, availability, scalability, traceability.

c.Reliability, compatibility, scalability, localization.

d.Reliability, readability scalability, localization.

18.Which of the following guidelines/tools provides results of previous valuation that should be reviewed and incorporated into all planning approaches?

a.Business policies.

b.Methodologies and frameworks.

c.Business analysis performance assessment.

d.Expert judgment.

19.What are all the inputs to the Define Requirements Architecture task?

https://www.sodocs.net/doc/b017120317.html,rmation Management Approach, Requirements (traced), Solution Scope.

https://www.sodocs.net/doc/b017120317.html,rmation Management System, Requirements (any state), Solution Scope.

https://www.sodocs.net/doc/b017120317.html,rmation Management Approach, Requirements (any state), Solution Scope.

https://www.sodocs.net/doc/b017120317.html,rmation Management System, Requirements (traced), Solution Scop

e.

20.Which of the following are outputs of the task Define Future State?

a.Business goals and objectives, capability analysis, potential value.

b.Business objectives, future state description, potential value.

c.Business goals and objectives, future state description, potential value.

d.Business objectives, capability analysis, potential valu

e.

21.Which of the following stakeholders are included in the task Verify Requirements?

a.All stakeholders.

b.Business analyst; domain subject matter experts; developers; architects.

c.Business analyst; domain subject matter experts; developers; testers.

d.Business analyst; domain subject matter experts; architects; testers.

22.What is the difference between noun and verb concepts in a concept model?

a.Noun concepts are the most basic concepts in the model and verb concepts make connections between them.

b.There are no noun and verb concepts in a concept model.

c.Noun concepts are tangible while verb concepts describe the actions performed by nouns.

d.Both noun and verb concepts must be present in a concept model.

23.What is the key reason for maintaining requirements?

a.To build a database of requirements that will ensure requirements are not missed in development.

b.To manage the requirements throughout the requirements life cycle and enable re-use of those requirements in other solutions.

c.To help ensure testing is performed effectively and requirements are traced to test cases.

d.To ensure organizational assets are updated and managed.

24.There are several situations in which requirements can be reused. Which of the following statements is accurate regarding requirements reuse?

a.Requirements at low levels of abstraction may be written with limited reference to specific solutions and therefore are more reusable.

b.Requirements that are represented in a general manner, without direct ties to a particular tool or organizational structure, tend to be less reusable.

c.As requirements are expressed in more detail, they become more tightly associated with a specific solution or solution option.

d.Specific references to applications or departments increase the reuse of requirements and designs across an organization.

25.Data dictionaries are used to standardize the definitions of data elements within the context of

a solution. What data model is oftentimes partnered with a data dictionary?

a.Swim lane diagram.

b.Sequence diagram.

c.Activity diagram.

d.Entity relationship diagram.

26.You have just completed your requirements workshop. Who should be involved with capturing the elicitation outcomes from the workshop?

a.Business analyst and project manager.

b.Business analyst.

c.Business analyst, project manager, and scribe.

d.Business analyst and scrib

e.

27.Troy is designing a web form for his online registration project. In order to allow stakeholders to provide input and feedback early, he decides to provide them with a prototype. Which of the following would NOT be a consideration for him?

a.Prototyping approach.

b.Prototyping examples.

c.Stakeholders knowledge of prototypes.

d.Prototyping methods.

28.How does the BABOK define a business rule?

a.A business rule is a specific, testable directive that serves as a criterion for guiding behavior, shaping judgments, or making decisions.

b.A capability or condition needed on a particular project to solve a problem or achieve an objective.

c.Expressed as a relationship between one entity/business object and another.

d.A regulation that an organization must adhere to.

29.In order to confidently analyze the current state of an enterprise, what must the BA utilize as an input?

a.Confirmed elicitation results.

b.Unconfirmed elicitation results.

c.Elicitation activity plan.

d.Interview and workshop transcripts.

30.What are the inputs for the verify requirement task?

a.Requirements in transition.

b.Requirements (signed off).

c.Requirements (validated).

d.Requirements (specified and modeled).

31.Which of the following considerations is NOT addressed when assessing the impact of a proposed change?

a.The business analyst evaluates the impact of any change to the dependencies between requirements.

b.The business analyst evaluates cost of the change, the cost of any associated work, and opportunity costs.

c.The business analyst evaluates the impact of the change on customers and business processes.

d.The business analyst evaluates the benefit that will be gained by accepting the chang

e.

32.IDEF, BPMN, and IGOE are types of notations utilized in which of the following models?

a.Data models.

b.Conceptual models.

c.State models.

d.Process models.

33.Continual prioritization is best described by the following statement:

a.Initially, prioritization is done at a higher level of abstraction. As the requirements are further refined, prioritization is done at a more granular level and will incorporate additional bases for prioritization as they become appropriate.

b.Stakeholders may also have difficulty characterizing any requirement as a lower priority, and this may impact the ability to make necessary trade-offs.

c.Requirements are prioritized is agreed upon by relevant stakeholders as defined in the business analysis planning and monitoring knowledge area.

d.The chance that the requirement cannot deliver the potential value, or cannot be met at all. This may include many factors such as the difficulty of implementing a requirement, or the chance that stakeholders will not accept a solution component.

34.The senior business analyst requested that all requirements be self-contained and capable of being understood independently of other requirements or designs. Which characteristic of requirements and design is the senior business analyst requesting?

a.Unambiguous.

b.Consistent.

https://www.sodocs.net/doc/b017120317.html,plete.

d.Atomic.

35.What are the input(s) to the plan business analysis governance task?

a.Business analysis approach and performance objectives (external).

b.Needs and business analysis approach.

c.Business analysis approach and stakeholder engagement approach.

d.Needs.

36.What is the purpose of the information management approach in defining requirements architecture?

a.To trace business rules to requirements that they support.

b.It defines the level of detail at which information should be captured.

c.Defines how the business analysis information will be stored and accesse

d.

d.Defines the relationships between requirements, designs, and solution components.

37.A senior business analyst was discussing the reason why she was using an onion diagram to address the concerns of the client regarding resources in the organization who will be involved with the solution. The BA provided which of the following responses?

a.An onion diagram will help identify stakeholders.

b.An onion diagram indicates how involved the stakeholders will be with the solution, which stakeholders will directly interact with the solution, which are internal or external to the organization.

c.An onion diagram will determine impacted stakeholders who are internal and external to the organization.

d.An onion diagram indicates which stakeholders will directly interact with the solution.

38.What is the output of the manage stakeholder collaboration task?

a.Stakeholder engagement.

b.Stakeholder list, maps, and personas.

c.Stakeholder collaboration.

d.Business analysis performance assessment.

39.Which technique below is used to produce numerous new ideas, and to derive from them themes for further analysis?

a.Non-functional requirement analysis.

b.Lessons learned process.

c.Brainstorming.

d.Decision Analysis.

40.Which guideline and tool is NOT leveraged to support assessing solution limitations?

a.Change strategy.

b.Future state description.

c.Risk analysis results.

d.Solution scop

e.

41.Which of the following would NOT be considered a strength of creating a glossary?

a.A glossary promotes common understanding of the business domain and better communication among all stakeholders.

b.Capturing the definitions as part of an enterprise's documentation provides a single reference and encourages consistency.

c.Simplifies the writing and maintenance of other business analysis information including but not limited to requirements, business rules, and change strategy.

d.It is an essential input into the data dictionary.

42.Which of the following stakeholders will be more focused on prioritization being consistent with legal and regulatory constraints?

a.Project manager.

b.Regulator.

c.Implementation SME.

d.Sponsor.

43.What is the key difference between a state transition and state diagram?

a.A state diagram describes how the entity changes from one state to another; a state transition shows the life cycle of one entity.

b.A state transition describes how the entity changes from one state to another; a state diagram shows the life cycle of one entity.

c.A state diagram is conceptual; a state transition is more detailed and operational.

d.A state transition is conceptual; a state diagram is more detailed and operational.

44.What task needs to occur before a change can be assessed?

a.Determine the cost of the change.

b.Establish the requirements baseline.

c.Determine the specific stakeholder who will implement the change.

d.Analyze the impact(s) of the chang

e.

45.Jessica is a business analyst planning a meeting to assess the risks associated with achieving the future state of an enterprise. Who are some of the stakeholders she should invite?

a.Sponsor, domain subject matter experts, suppliers, project manager, end-users.

b.Sponsor, domain subject matter experts, suppliers, regulators, end-users.

c.Sponsor, domain subject matter experts, suppliers, project manager, testers.

d.Sponsor, domain subject matter experts, suppliers, project manager, customers.

46.When does the requirements life cycle end?

a.When all requirements have been approved and the solution is deployed.

b.When the solution is retired and its associated requirements are archived.

c.When the solution is retired and any eligible requirements are made re-usable.

d.When the solution and the requirements that represent it are retired.

47.Which of the following is the best definition of a "need" which is an input to many BA tasks?

a.A need is synonymous with a requirement.

b.A need is synonymous with business requirements.

c.A problem or opportunity to be addresse

d.

d.The perceived gap between business goals and the current state environment.

48.Which techniques might you use during the Assess Risks task?

a.Brainstorming; functional decomposition; root cause analysis.

b.Brainstorming; root cause analysis; variance analysis.

c.Brainstorming; financial analysis; lessons learne

d.

d.Brainstorming; benchmarking; lessons learned.

49.According to the BABOK, which of the following are the valid five tasks task for elicitation and collaboration knowledge area?

a.Prepare for elicitation, conduct elicitation, confirm elicitation results, communicate business

analysis information, and verify the outcomes of the solution.

b.Prepare for elicitation, conduct elicitation, confirm elicitation results, document elicitation, and communicate business analysis information.

c.Prepare for elicitation, conduct elicitation, confirm elicitation results, communicate business analysis information, and facilitate stakeholder engagement.

d.Prepare for elicitation, conduct elicitation, confirm elicitation results, communicate business analysis information, and manage stakeholder collaboration.

50.The following are guidelines and tools under the Validate Requirements task. Which one is NOT?

a.Business objectives.

b.Future state description.

c.Potential solution.

d.Solution scop

e.

华为LTE认证考试试题

华为LTE认证考试试题 一.填空题(每题一分)共15分 1.LTE上行物理信道包含PUSCH,PUCCH,PRACH.(物理上行共享信道 PUSCH - 物理 上行控制信道 PUCCH - 物理随机接入信道 PRACH) 2.BCH的传输时间间隔是40ms. 3.ICIC技术是用来解决系统内同频干扰问题. 4.空口协议伐中,数据的压缩功能位于PDCP层. 5.一个RB时域包含1个slot,频域包含12连续子载波. 6.LTE TDD的帧结构每帧长10ms,包含22个时隙(slot)和10个子帧(subframe). 7.LTE最小的资源单位是RE,最小的资源分配单位是RB. 8.LTE协议规定物理小区标识(PCI)共有504个. 9.LTE ENODEB与EPC之间的接口是S1,ENODEB之间的接口是X2. 二.判断题(每题一分)共15分 1.下行参考信号包括三种类型,包括:Cell-specific,MBSFX-specific,UE-specific。( 对 ) 2.NAS层协议是属于用户面协议。(错)NAS层协议是属于控制面协议 3.基于非竞争的随机接入过程,其接入前导的分配是由网络侧分配的。(对) 4.SFBC是一种发射分集技术,主要获得发射分集增益,用于SINR较低的区域,比如 小区边缘,与STBC相比,SFBC是(对) 5.MIMO的信道容量与空间信道的相关性有关,信道相关性越低,MIMO信道容量越大。(对) 6.MIMO模式分为分集和复用,其中分集主要是提升小区覆盖,而复用主要是提升小区容量。(对) 7.LTE系统中,UE在多个属于同一个TA list下的多个TA间移动,不会触发TA的更新。(对)

最新ISTQB初级认证模拟题 中文资料

ISTQB软件测试初级认证 ——考前辅导International Software Testing Qualifications Board 目录 第一章:软件测试基础(18%) (2) 1.学习目标 (2) 2.练习题 (4) 第二章:软件生命周期中的测试(15%) (11) 3.学习目标 (11) 4.练习题 (12) 第三章:静态技术(7%) (15) 5.学习目标 (15) 6.练习题 (16) 第四章:测试设计技术(30%) (18) 精品文档

7.学习目标 (18) 8.练习题 (20) 第五章:测试管理(20%) (29) 9.学习目标 (29) 10.练习题 (31) 第六章:软件测试工具(10%) (36) 11.学习目标 (36) 22.练习题 (36) 学习目标和认知水平 在课程大纲中,每个章节都会提供相应的认知水平要求: K1:牢记、认知、回想 K2:理解、解释、给出理由、比较、分类、举例、总结 K3:应用 第一章:软件测试基础(18%) 1.学习目标 1.1 为什么需要软件测试? (K2) LO-1.1.1 通过具体的例子,来描述软件中的缺陷会以什么样的方式损害个人、损害环境或者损害公司利益(K2)。 精品文档

LO-1.1.2 区分引起缺陷的根本原因及其影响(K2)。 LO-1.1.3 通过举例的方式说明为什么需要测试(K2)。 LO-1.1.4 描述为什么测试是质量保证(quality assurance)的一部分,通过举例说明测试是如何来提高软件质量的(K2)。 LO-1.1.5 理解术语错误、缺陷、故障、失效的概念以及相应的定义(K1)。 1.2 什么是测试 (K2) LO-1.2.1 认识测试的总体目标(K1)。 LO-1.2.2 描述在软件开发、软件维护和软件运行过程中,测试作为发现缺陷、提供信息和信心以及预防缺陷的一种手段(K2)。 1.3 软件测试的基本原则 (K2) LO-1.3.1 说明测试的基本原则(K2)。 1.4 基本的测试过程 (K1) LO-1.4.1 认识从计划到测试结束过程中测试的基本活动,以及在每个测试活动中的主要任务(K1)。 1.5 测试的心理学 (K2) LO-1.5.1 认识测试的成功与否,会受测试心理因素的影响(K1): 清晰的测试目标决定了测试人员效率; 人们往往会忽视自己的错误; 认识到就事论事的交流方式以及反馈与问题相关信息的重要性。 LO-1.5.2 对比测试人员(tester)和开发人员(developer)的思维方式的差异(K2)。 精品文档

中国移动代维认证考试题库—无线维护

1. 高层小区覆盖采用楼顶天线对打方式,不仅要考虑天线波瓣角度能否满足覆盖要求,还要考虑传播信号与所覆盖建筑的入射角,一般要求入射角a() A.a≧20° B.a≧10° C.a≧30° D.a≧40° 答案:C 重复命题5次 2015年10月20日9点30分无线无线维护诺基亚L1 2015年10月20日9点30分无线无线维护中兴L1 2015年10月20日9点30分无线无线维护爱立信L1 2015年10月20日9点30分无线无线维护贝尔L1 2015年5月29日9点30分无线无线维护大唐L1 2. GRFU支持的增强覆盖方式有() A.塔放 B.PBT C.发分集 D.四分集接收 答案:A 重复命题5次

2015年5月29日9点30分无线无线维护中兴L1 2015年5月29日9点30分无线无线维护华为L1 2015年10月20日9点30分无线无线维护大唐L1 2015年10月20日9点30分无线无线维护贝尔L1 2015年10月20日9点30分无线无线维护爱立信L1 3. 黄色预警(L3):确保重点保障客户的()畅通,最大限度的满足所有用户的基本通信需求。 A.语音、数据业务 B.语音、互联网业务 C.语音、短信业务 D.语音、视频通话业务 答案:C 重复命题5次 2015年5月29日9点30分无线无线维护华为L1 2015年5月29日9点30分无线无线维护贝尔L1 2015年5月29日9点30分无线无线维护诺西L1 2015年5月29日9点30分无线无线维护中兴L1 2015年5月29日9点30分无线无线维护大唐L1 4. ()是用于隧道覆盖的最佳选择。

微软认证模拟试题:NTServer4.0

微软认证模拟试题:NTServer4.0 When you upgrade NT 3.51 to NT 4.0, what should you do? A) Install from NT 4.0 CD-ROM and install NT 4.0 on the same directory of NT 3.51 B) Run winnt32.exe under NT 3.51, and install NT 4.0 on the same directory of NT 3.51 C) Run winnt32.exe under NT 3.51, and install NT 4.0 on the different directory of NT 3.51 D) Install from NT 4.0 CD-ROM and install NT 4.0 the different directory of NT 3.51 Answer: A, B --------------------------------------------------------------------------------------- What is the minimum amount of hard disk space required to install Windows NT Server on an x86-based computer? A) 125MB B) 110MB C) 130MB

D) 135MB Answer: A --------------------------------------------------------------------------------------- You want to upgrade your Windows NT 3.51 Server to 4.0, preserving the existing configuration settings. What are two ways to perform this upgrade? (Choose two) A) Boot from NT 4.0 setup boot disks. Install the Windows NT 4.0 files in a different directory from the one that contains your NT 3.51 files. B) Boot from the NT 4.0 setup boot disks. Install the windows NT 4.0 files in the directory that contains your NT 3.51 files. C) Start Windows NT 3.51 server. Run Winnt.exe from the command prompt. Install the NT 4.0 files in the directory that contains your NT 3.51 files. D) Start Windows NT 3.51 Server. Run winnt32.exe from the command prompt. Install the Windows NT 4.0 files in the directory that contains your NT 3.51 files. Answer: B, D -----------------------------------------------------------

华为LTE认证测试题

一、判断题(每题1分,共20题,总分20分) 1、DCDU_03D中3路12A的空开给RRU供电,6路20A的空开给DBBP530、传输设备和风扇供电.(F) 2、RRU3151e-fae多为分散供电:DC3151e-fae直流空开不得低于12A,AC3151e-fae交流空开不得低于2A(T ) 3、TDS-TDL双模采用LBBPd板组网,既可以从Slot2的L TE基带板出光口,也可以从Slot2的TDS基带板出光口(F ) 4、Hawei eNodeB支持内部自由震荡时钟,因此无法提供时钟方案时,可开启此功能代替GPS.(F ) 5、当进行网络调整的时候,如果调整在PAC之前发生,那eNodeB 所使用的商用license不需要进行失效处理,可以直接进行调整。(F ) 6、UMPT单板为BBU3900的主控传输板,推荐插在6或7号槽位,当6号槽位被UTRP占用时,可插在5号槽位。(F) 7、UMPT上的FE/GE0口只能配置为电口,FE/GE1只能配置为光口。(T) 8、UMPT单板FE/GE光口两端如果协商模式不一致,光口可能会down,一段时候后会恢复自协商。(F ) 9、TDS-TDL双模单BBU场景lr借口光口数超过三个或宏站扇区超过三个需要将UBBPa更换为UBBPb/UBBPc。(T ) 10、LBBPc单板最多6个RRU小区合并,单板只能用于DRRU3158/DRRU3158i/DRRU3158e/RRU3233/RRU3152-e组网场景。(T )

11、TDS-TDL双模BBU框中主控板、基带板数量(含TDS和TDL)超过4pcs或LBBPd板超过2pcs,增加1pcsUPEUc。(T ) 12、EPS30-4815提供1路10A(4pin)给DBBP530供电,3楼12A (OT)可给1pcsDC DRRU3151(e)-fae/DRRU3151-fa/RRU3152-e 供电。(F ) 13、单板L TE新建中主控板UMPTa2可以通过GPS来获取时钟。(F) 14、在原有的BBU框内已开通TDS,并且RRU类型为RRU3151(e)-fae,现需要用RRU3151-e开通L TE单模站点,这样是可以和TDS 公用一个BBU框开通。(T) 15、GPS天线的安装位置,其天空视野要开阔,周围没有高大建筑物阻挡。GPS天线竖直向上的视角应不小于90°.(T) 16、双模基站由TDS和TDL两种制式构成,升级时可以对单制式TDS单独升级,单制式升级时会检查对端制式的版本匹配情况,如果单制式升级后和对端制式的版本不匹配,OMC则不允许升级。(T ) 17、L TE测试终端E323s可以对E频段站点进行拨测。(F ) 18、网管服务器上既可以查询TDS的站点信息也可以查询TDL的站点信息。(F ) 19、通关无线网管查询网元告警信息默认支持上报工程态告警。(F ) 20、同一根管钱的两端光模块需保证为相同的波长和速率,而传输距离可以不同。(F ) 二、选择题

ISTQB 测试生命周期与测试 模拟题

第二章软件生命周期中的测试 1.以下选项中,不属于典型的V-模型的测试级别是 a组件/单元测试 b集成测试 c回归测试 d验收测试 2.以下选项中,不属于验收测试典型的类型有 a用户验收测试 b运行验收测试 c合同和法规性验收测试 d维护测试 3.对于商业现货(COTS)产品的系统集成,购买者可能会在系统级别进行集成 测试(integration testing)(与基础设施集成测试,和其他系统的集成测试或系统的商业部署)和验收测试(acceptance testing)(功能/非功能测试,用户或操作测试),这种情况说明 a根据项目的特征或系统的架构,可以对测试级别进行合并或重新进行组合b组件测试测试忽略 c可以使用集成测试替代系统测试 d验收测试只能在系统级别进行 4.关于测试的类型,下面哪个是正确的组合 1.通讯录地址的修改 2.确认测试/再测试 3.语句覆盖 4.压力测试 A.功能测试 B.与变更有关的测试 C.非功能的测试 D.结构性测试 a1-A; 2-B; 3-C; 4-D

b1-A; 2-B; 3-D; 4-C c1-C; 2-A; 3-D; 4-B d1-B; 2-A; 3-D; 4-C 5.关于测试类型的应用范围,下面哪是正确的 a结构测试只能用在组件测试或集成测试 b功能测试只能用在系统测试或验收测试 c白盒测试方法不能用于系统测试 d功能测试和结构性测试可以应用在任何测试级别 6.关于维护测试,下列哪个选项正确 a在软件系统交付给用户真正使用之前必须进行维护测试 b在每个测试级别都需要进行维护测试 c维护测试是在一个现有的运行系统上进行的测试 d在一个现有的运行系统,因为开发已经完成了,所以不再需要测试 7.关于软件确认测试和回归测试的描述,下列哪个选项是错误的 a当修改了缺陷后,应该重新进行测试以确定原来的缺陷已经成功的修改,称之为确认测试 b回归测试是对已被侧过的程序在变更后进行的重复测试,以发现在这些变更后是否有新的缺陷引入 c当软件发生变更或者应用软件的环境发生变化时,需要进行回归测试 d回归测试可以在所有的测试级别上进行,并且只适用于功能测试 8.有一个系统已经在市场上运行了,这种情况对系统进行修改,然后进行的测 试属于 a.维护测试 b.验收测试 c.组件测试 d.系统测试 9.在生命周期模型中,一个好的测试都应具有哪些特点中错误的是 a每个开发活动都有相应的测试活动 b每个测试级别都有其特有的测试目标 c对于每个测试级别,需要在相应的开发活动过程中进行相应的测试分析和设计 d在开发生命周期中,测试员在文档中间阶段就应该参与文档的评审

移动代维资格认证试题

资格认证考试(2012-6-30) 一、填空题 1、PTN是()的英文缩写。 2、微波系统通常由()组成。 3、在传统IP网络中,路由器在转发数据包时必须拆解出第3层包头,从中获取()。 4、GPON的标准是由()制定的,EPON的标准是由IEEE制定的。 5、SDH传送网是() 6、OSI参考模型的第二层是()。 7、北京移动本地传输网接入侧业务采用的是()保护 8、基站传输电路是指()至()之间的电路。 9、如果HST-3000的面板上的Data LED 灯不亮,表示()。 10、在2M电路做自发自收测试时,选用的伪随机码为()。做自发自收时,2仪表阻抗应设为(),在线测试时,阻抗应设置为(),基站帧 11、北京移动所使用的METRO 100(V2)配备的主要板卡有()。 二、判断对错 1、Optix 10G设备不支持带纤拔插光板()。 2、在PDH中,允许各支路信号之间不完全同步。 3、SDH设备能根据S1字节来判断时钟信号的质量,S1值越大表示时钟质量越高() 4、PDH中也有网络恢复功能() 5、STM-N的帧结构属于块状帧结构,以STM-1为基础,有9行,270N 列,帧长为125us。() 6、通信网主要有终端设备、传输设备、交换设备组成,从垂直结构分层,分为传送网、业务网和支撑网() 7、我公司基站电路的2M接口为120欧姆() 8、一个SDH设备的155M能开通的2M数一定比PDH 140M多。() 9、SDH测试中,如测试VC-4通道,则选择TSS5信号结构;测试140Mbit/s通道,则选择TSS1信号结构。() 10、SDH设备的结合抖动是支路映射和指针调整结合作用,在设备解复用侧的PDH支路输出口产生的抖动() 11、以太网技术能够支持高速Internet接入以及VPN业务() 12、MSTP支持以太网的点到多点业务不需要二层交换技术。() 13、JDSU HST-3000以太网有双端口配置,可以同时从两个端口分析Ethernet或IP流量()。 14、当外同步定时与提取定时不能正常工作时,设备转入内部定时工作方式() 15、系统的误码性能反映数字信息在传输过程中受到损伤的程度() 16、传输网广义定义是:以光纤、电缆、空间作为媒介的传输光或电信号的 17、华为METRO1000接入设备SP2D有16个2M端口() 18、基站二次下电是为了保证在机房停电时传输设备能够更长时间的工作() 19、光信噪比变化是分析WDM系统传输质量的重要依据() 20、SDH光板光接口类型为S64.2b,该光口为长距光口()。 三、单项选择 1、SDH体系的速率等级中STM-16的速率是:() A、4SM B、622M C、2.5G D、10G

华为认证考试题库-HCNP

1.某公司为其一些远程小站点预留了网段17 2.29.100.0/26,每一个站点有10个IP设备接到网络,下面的那个VLSM掩码能够为该需求提供最小数量的主机数目? A./27 B./28 C./29 D./30 Answer:B 2.网段10.10.4.0/27,可以提供多少主机地址? A.15 B.30 C.32 D.64 Answer:B 3.CIDR使用VLSM技术,突破了传统IP地址分类边界,采用CIDR可以把路由表中的若干条路由汇聚成一条路由,减少了路由表的规模 A. True B. False Answer:A 4.汇总地址172.16.96.0/20包含哪些子网? A.172.16.104.0/21 B.172.16.112.0/21 C.172.16.120.0/21 D.172.16.124.0/21 Answer:A 5.下面那个地址可以配置在主机设备上? A.202.101.1.64/26 B.192.19.11.5/23 C.127.0.0.1 D.224.0.0.2 Answer:B 6.C类地址子网掩码为255.255.255.248,则每个子网可以使用的主机地址数是: A.8 B.6 C.4 D.2 Answer:B 7.一台主机的地址为192.168.9.113/21,则该主机需要发送广播报文,该报文发送的目的地址为: A.192.168.9.255 B.192.168.15.255 C.192.168.255.255 D.192.255.255.255 Answer:B 8.有一个子网网段地址是10.64.0.0,掩码是255.224.0.0,则该网段允许的最大主机IP地址

实用文档之ISTQB初级认证模拟题_中文

1.实用文档之"练习题" ?下列术语中哪一个是ISTQB术语表中缺陷(Defect)的同义词:B a)Incident b)Bug c)Mistake d)Error ?软件测试目的可以是:B A.发现缺陷 B.确认软件能够正常运行 C.预防缺陷 D.直接提高产品的售价 E.减少整个产品开发周期时间 a)A, B b)A, B, C c)A, B, C 和 D d)所有选项 ?根据ISTQB 定义的术语,“风险”是与下列哪一个选项关联的?C a)对测试者否定的反馈意见 b)将产生负面影响及其连锁效应的因素 c)可能产生负面影响及其连锁效应的因素 d)将对被测对象产生负面影响及其连锁效应的因素

?确认系统是否按照预期工作,从而在系统是否满足系统需求方面获取信心。这样的测试目的最可能适用下面的哪个测试阶段:C组件测试 b)集成测试 c)系统测试 d)回归测试 ?识别测试的任务、定义测试的目标以及为实现测试目标和任务的测试活动规格说明。上述行为主要发生在: A a)计划和控制 b)分析和设计 c)实现和执行 d)测试结束活动 ?ISTQB术语中的回归测试的目的是:C a)验证修改的成功 b)预防功能编写的不完善或疏漏 c)确保修正过程中没有引入新的缺陷 d)帮助程序员更好地进行单元测试 ?下列方式可以提高和改善测试人员和开发人员关系的是:B a)理解项目经理工作的重要性 b)对所发现的可能的缺陷以一种中立的方式进行沟通 c)单元测试、集成测试和系统测试都由同一批测试人员来完成 d)测试人员参加代码调试

?基本的测试过程主要由下面哪些活动组成:D 计划和控制(control) B.分析和设计 C.实现和执行 D.评估出口准则和测试报告 E.测试结束活动 a)A, B 和 C b)A, B, C 和 D c)除 E 以外所有选项 d)所有选项 ?对实现软件测试组的独立的方式,可以采用的是:B A.测试的设计由开发队伍的其他开发人员完成; B.测试的设计由开发人员自己完成; C.测试的设计独立于本项目的开发队伍; D.测试的设计独立于本开发企业,来自于独立的第三方测试机构。 E.所有测试活动由开发人员来完成 a)A, B, C b)A, B, C, D c)A, C, E d)所有选项 ?以下关于测试原则的描述,正确的是: B a)所有的软件测试不需要追溯到用户需求; b)完全测试是不可能的;

移动L1认证考试代维集客题库三

代维集客L1 1. 代维服务规范服务语言要求中对使用专业术语的要求是 A.尽量使用术语 B.没有要求 C.把握好分寸,表现得体,尽量避免使用,如需使用则需向服务对象明确解释 D.不允许使用术语 答案:C 2. 路由复测是按()规定路由进行复核测量。 A.设计施工图 B.竣工图 C.可研报告 答案:A 3. 客户侧传输设备的组网方式() A.用户---交换机---路由器---客户侧传输设备---客户侧传输设备的上联基站 B.交换机---用户---路由器---客户侧传输设备---客户侧传输设备的上联基站 C.用户---交换机---客户侧传输设备----路由器---客户侧传输设备的上联基站

D.交换机---路由器---客户侧传输设备---客户侧传输设备的上联基站---用户 答案:A 4. 若现网在运行设备的软件升级工作需要总部网络部和其他省公司配合,省公司应向()提交软件升级申请 A.总部网络部 B.集团公司 C.配合省公司网络部 D.设备厂家 答案:A 5. 业务的维护管理工作包括投诉处理、业务日常测试、业务优化等,侧重于( ) A.从客服人员感知的角度提高端到端业务质量 B.从用户感知的角度提高端到端业务质量 C.提供高质量的通信业务 D.提高处理投诉的效率 答案:B 6. 下列POS设备属性要求唯一的是() A.分光器名称 B.归属OLT C.上级分光器名称 D.生命周期状态

答案:A 7. 某GPON局点采用二级分光组网,一级采用1:4分光,二级采用1:8分光,则该局点的分光比为() A.1:4 B.1:8 C.1:12 D.1:32 答案:D 8. OTDR屏幕上显示的曲线是()。 A.前向散射曲线 B.背向散射曲线 C.散射曲线 答案:B 9. 故障投诉处理时长的计算方法是什么 A.客户业务恢复时间-故障投诉工单回复时间 B.故障投诉受理时间-故障投诉工单派发时间 C.客户业务恢复时间-故障投诉工单受理时间 D.客户业务恢复时间-故障投诉工单派发时间 答案:D 10. 集团专线交维环节中,建设方不一定需要提供的报表为:()

微软认证题库

Same type as the certification exams, 70-660 exam preparation is in multiple-choice questions (MCQs). Tested by multiple times before publishing Try free 70-660 exam demo before you decide to buy it in https://www.sodocs.net/doc/b017120317.html,. Note:This pdf demo do not include the question's picture. Exam : Microsoft 70-660 Title : TS: Windows(r) Internals 1. You are writing an I/O dispatch routine for a Windows device driver. The device driver supports buffered I/O. The dispatch routine transfers 1 KB of data to the user process. You need to retrieve the kernel address of the 1-KB buffer from the I/O request packet (IRP). Which field of the IRP contains the kernel address? A. Irp->AssociatedIrp.SystemBuffer B. Irp->https://www.sodocs.net/doc/b017120317.html,erApcContext C. Irp->Tail.Overlay.DriverContext[0] D. Irp->UserBuffer Answer: A 2. You are developing an application. You need to ensure that the application can read from COM port 10 by using the CreateFile function. Which device name should you open? A. "COM10" B. "%COM10%" C. "\COM10" D. "\\.\COM10" Answer: D 3. You develop a Windows device driver for a hardware device. The hardware device uses a simple direct memory access (DMA) controller. The hardware device does not perform virtual address translation. You need to allocate a 64-KB buffer in Windows that accepts a DMA transfer of 64 KB from the hardware device. Which routine should you use? A. AllocateHeap(655536) B. ExAllocatePoolWithTag(PagePool, 65536, 'abcd') C. ExAllocatePoolWithTag(NonPagePool, 65536, 'abcd') D. MmAllocateContiguousMemory(65536, 0xFFFFFFFF) Answer: D 4. You have a device driver that has one monitoring thread named Thread1. The device driver has three worker threads named Thread2, Thread3, and Thread4. The worker threads run every 10 seconds and complete within 1 second. If any worker thread does not run at least once every 30 seconds, Thread1 calls KeBugCheckEx, and then a complete kernel crash dump is generated. The computer generates a bug check and a complete kernel dump is generated. You review the complete kernel dump and notice the following: You need to identify the root cause of the bug check. What caused the bug check to occur? A. the priority of Thread1 B. the priority of Thread4 C. the state of Thread1 D. the state of Thread2 and Thread3 Answer: B

中国移动认证代维认证传输线路L2考试题二十六考试卷模拟考试题.doc

中国移动认证代维认证传输线路L2考试题二十六考 试卷模拟考试题 考试时间:120分钟 考试总分:100分 遵守考场纪律,维护知识尊严,杜绝违纪行为,确保考试结果公正。 1、在U31网管上PTN 网元的业务配置典型流程是 ( ) A.业务基本配置,隧道配置,伪线配置,业务配置 B.隧道配置,伪线配置,业务基本配置,业务配置 C.隧道配置,伪线配置,业务配置,业务基本配置 D.业务基本配置,伪线配置,隧道配置,业务配置 2、ZXCTN 6100设备高( ) A.1.2U B.2U C.1.5U D.1U 3、中兴ZXCTN 设备在U31网管上对网元进行基础配置的操作过程中,下列哪项在ZXCTN6100上不需进行配置 ( ) A.静态MAC 配置 B.IP 接口 C.VLAN 接口 D.永久ARP 配置 4、路由器的主要功能不包括( ) A.子网协议转换 B.速率适配 姓名:________________ 班级:________________ 学号:________________ --------------------密----------------------------------封 ----------------------------------------------线----------------------

C.报文分片与重组 D.七层协议转换 5、下列哪项不是中兴PTN设备具备的保护功能() A.steering环网保护 B.PP保护 C.LSP 1:1/1+1保护 D.wrapping 环网保护 6、P90S1-12GE1XGET-SFPXFP 单板不支持的功能是() A.控制模块 B.时钟模块 C.以太网光接口模块 D.业务处理模块 E.交换模块 7、MPLS-TP 隧道OAM帧结构中不包含的字段有() A.隧道标签 B.OAM PDU C.PW伪线标签 D.L2层MAC地址 8、MPLS-TP技术全称是() A.MPLS trend packet B.MPLS Transport Profile C.MPLS transport packet D.MPLS transport platform 9、生成树协议在检测链路故障时,会采用三个时间间隔。下面四个生成树时间间隔中哪个与生成树链路故障的检测无关() A.MessageAge B.ForwardDelay C.MaxAge D.HelloTime 10、综合资源管理系统中,传输网元及电路数据来源于()系统。() A.传输网管系统

70219考题中文翻译版(一)_微软认证模拟题库(1)-微软认证试题

70219考题中文翻译版(一)_微软认证模拟题库(1)-微软认证试题 70-219 考题中文翻译版 Your company is asked to provide consulting, development, and integration services for a company named Contoso Research. As a part of this project you will implement Windows 2000. All client computers that currently run Windows will be upgraded to Windows 2000 Professional. Wherever possible, the Windows NT 4.0 domain controller environment will be fully upgraded to Windows 2000 Server. Background: Contoso Research is a military research company that operates from several locations in the United States. Most of the company's business comes from contracts from the United States government and military. Its headquarters and primary IT center is in Washington, D.C. The company is distributed as follows Research facilities Boston, Massachusetts Denver, Colorado San Diego, California San Francisco, California Seattle, Washington St. Petersburg, Florida St. Petersburg, Florida Washington, D.C. The Denver, San Diego, San Francisco, and Seattle facilities were originally a separate company named Parnell Aerospace. These facilities became a part of Contoso Research when they were purchased in 1997. These facilities still use the Parnell Aerospace name, and Parnell Aerospace still maintains its identity as a separate company. Contoso Research is likely to acquire another company in the near future. Problem Statement: Chief Executive Officer (CEO): Because we are primarily a military research contractor working on a variety of classified projects, our primary concern is security. We purchased Parnell Aerospace in 1997, but in many respects it still operates as a separate company. We are attempting to eliminate duplicated work within the two companies as much as possible. We are also in the process of developing common operating practices. For the purposes of shared research, we allow our government and military customers to access some of our data. When we bought Parnell Aerospace, we needed to restructure our entire network security structure. We need to be able to support our growth plans without needing to perform this type

HN华为认证网络工程师HCNP-UC模拟试题(中级含答案)

华为认证网络工程师– 统一通信HCNP-UC(Fast-Track) 模拟考试 华为认证网络工程师HCNP-UC(Fast-Track)模拟考试,共20题,总分1000分。 1、(题型:多选)以下说法正确的是:()ABD A. eSpace U1910支持100个以下内部用户的业务需求 B. eSpace U1930支持100个以上、300个以下内部用户的业务需求 C. eSpace U1930支持300个以上、1000个以下内部用户的业务需求。 D. eSpace U1980支持300个以上、10000个以下内部用户的业务需求 2、(题型:多选)eSpace U19xx支持以下哪几种转VMS的方式() A. 遇忙转语音邮箱 B. 无条件转语音邮箱 C. 离线转语音邮箱 D. 无应答转语音邮箱 3、(题型:多选)若对中继做如下配置:config add office no 1 officeselectcode 1 userpriorlevel advanced 那么以下说法正确的是:()BD A. A的用户等级为normal,A可以从局向1出局 B. A的用户等级为super,A可以从局向1出局 C. A的用户等级为default,A可以从局向1出局 D. A的用户等级为advanced,A可以从局向1出局 4、(题型:单选)IP-PBX接入IMS的方式是:()A A. SIP中继 B. 中继 C. E1中继 D. 不需要中继,直接注册到IMS即可

5、(题型:单选)堆叠场景下,主设备SIP用户A呼叫局外PSTN用户(主设备E1对接PSTN),通话建立后的RTP流情况为:()A A. A<->主设备 B. 主设备<->主设备 C. A<->主设备<->主设备 D. 以上都不对 6、(题型:单选)U1980和运营商A、B对接,如果到A的链路满了后走B运营商出局,采用何种方式()C A. 普通路由 B. 中继承载 C. 失败路由 D. 呼叫源分析 7、(题型:多选)U1930web中可以配置的有:() A. 预定会议 B. 一号通 C. 无条件呼叫前转 D. license加载 8、(题型:多选)LMT工具可以图形化实现的功能有:()abcd A. 加载版本 B. 跟踪信令 C. 配置智能路由 D. 配置号长路由 9、(题型:多选)SS7信令协议有哪两种()ac A. ISUP B. SIGTRAN C. TUP D. BICC 10、(题型:多选)假如要实现不同的号码拨同一个字冠可以路由到不同的中继,我们需要()。AC A. 呼叫源功能 B. 黑白名单功能 C. 路由重分析功能 D. 失败路由功能 11、(题型:单选)UC支持的数据会议功能说法不对的是()。 A. 电子白板 B. 文档共享 C. 4×5路视频 D. 文字交流 12、(题型:多选)执行安全加固后对windows操作系统的影响()

ISTQB模拟试题

“第一章测试基础测试基础” 1.(K1) 下列关于错误、缺陷与失效的观点正确的就是: A)人都会犯错误,因此在由人设计的程序也会引入缺陷; B)所有的缺陷都会产生失效; C)失效主要就是由人的错误造成的,与环境条件没有关系; D)当存在缺陷的代码被执行时,才可能引发软件错误。 2.(K1) 以下不属于软件测试的作用的就是: A)可以减少软件系统在运行环境中的风险 B) 可以提高软件系统的质量 C) 可能就是为了满足合同或法律法规的要求 D) 可以用于评价开发团队的能力 3.(K1) 在判断测试就是否足够时,下列哪些方面就是不需要考虑的? A) 风险; B) 项目在时间上的限制; C) 项目在预算上的限制; D) 投入的测试人员的数量; 4.(K1) 以下哪个不就是软件测试的目标? A)发现缺陷; B) 增加对质量的信心; C) 为决策提供信息; D) 改进测试流程; 5.(K2) 下列关于不同的测试阶段的描述错误的就是: A)维护测试通常就是为了验证开发过程发现的缺陷就是否被正确修复。 B) 组件测试的主要目标就是尽可能的发现失效,从而识别与修正尽可能多的缺陷。 C) 测试的主要目标就是确认系统就是否按照预期工作,就是建立满足了需求的信心。 D) 不同测试阶段,其测试目标就是不同的。 6.(K2) 软件测试基本过程有哪些主要活动组成? (1)计划与控制(2) 分析与设计(3) 实现与执行(4) 评估出口准则与报告(5) 测试结束活动 (A) 1,3,5 (B) 1,2,3 (C) 2,3,4,5 (D) 1,2,3,4,5 7.(K2) 规划测试环境的搭建与确定测试需要的基础设施与工具属于下面的哪个活动? (A)计划与控制(B) 分析与设计(C) 实现与执行(D) 评估出口准则与报告 “第二章软件生命周期中的测试软件生命周期中的测试”” 8.(K1) V模型的测试级别分别就是什么? (1)组件测试(2) 集成测试(3) 系统测试(4) 系统集成测试(5) 验收测试 (A) 1,2,3 (B) 2,3,4,5 (C) 1,2,3,4 (D) 1,2,3,4,5 9.(K1) 下列关于迭代-增量开发模型描述错误的就是? (A)在每次迭代过程中,对迭代产生的系统可能需要在不同的测试级别上进行测试 (B) 迭代-增量开发模型由于发布周期更短,所以要优于V模型 (C) 在完成第一次迭代后,对所有的迭代进行回归测试会变得越来越重要 (D) 验证与确认可以在每个增量模块中进行 10.(K1) 以下哪个不属于良好的测试应该具有的特点? (A)每个开发活动都有相对应的测试活动 (B) 每个测试级别都有其特有的测试目标 (C) 对于每个测试级别,需要在相应的开发活动过程中进行相应的测试分析与设计

相关主题