Q91
Q91 A report in JIRA is not reflecting recent updates. What could be the cause?
Lack of data refresh
Insufficient user roles
Test suite limit exceeded
Incorrect project settings
Q92
Q92 What is the primary goal of defect management in software testing?
To document test cases
To monitor and track software defects
To implement automation
To design the software
Q93
Q93 In which phase of the defect life cycle is a defect closed?
Open
Resolved
Rejected
Closed
Q94
Q94 What does it mean when a defect is marked as "Deferred"?
The defect is being fixed
The defect is scheduled to be fixed later
The defect is resolved
The defect is closed
Q95
Q95 Which of the following best describes a "Severity" level in defect management?
Likelihood of occurrence
The impact of the defect on the system
The number of affected users
Time taken to fix the defect
Q96
Q96 What is the role of a defect tracking tool?
To fix software defects
To automate test cases
To report and manage defects
To write software requirements
Q97
Q97 How would you log a defect in JIRA?
Create a test case
Create an issue
Create a story
Create a report
Q98
Q98 In TestRail, how do you link a defect to a failed test case?
Use a story link
Add it to the report
Use the defect field in the test result
Create a dashboard
Q99
Q99 Which field in JIRA would you use to specify the severity of a defect?
Label
Priority
Status
Description
Q100
Q100 A defect is marked as "Rejected" by the developer. What is a possible reason?
The defect was fixed
The defect was not a valid issue
The defect was a duplicate
The defect has high severity
Q101
Q101 A defect is repeatedly reopened after being marked as "Resolved." What could be the cause?
Miscommunication between teams
Tester error
Incomplete fix
Incorrect test case
Q102
Q102 A tester encounters a defect that cannot be consistently reproduced. What should they do?
Log it with detailed steps and environment details
Ignore it
Fix it
Mark it as Closed
Q103
Q103 What is the primary goal of Performance Testing?
To ensure the system meets functional requirements
To test for security vulnerabilities
To validate the system's speed, stability, and scalability
To test user interface design
Q104
Q104 Which of the following is a type of Performance Testing that measures the maximum load a system can handle?
Load Testing
Stress Testing
Scalability Testing
Usability Testing
Q105
Q105 What does "Throughput" mean in Performance Testing?
The number of users
The time to execute a test
The amount of data processed in a given time
The response time of a server
Q106
Q106 Which metric is critical for understanding the user experience in Performance Testing?
Code complexity
Network bandwidth
Response time
Memory usage
Q107
Q107 In JMeter, which element is used to specify the number of virtual users for a Performance Test?
Listener
Timer
Controller
Thread Group
Q108
Q108 How do you set up a load test in JMeter for a specific time duration?
Use the Duration field in Thread Group
Use a Timer element
Set up a Listener
Configure a Controller
Q109
Q109 In LoadRunner, how do you measure response times across multiple transactions?
Use the Analysis tool
Add Response Time Samplers
Configure Load Balancer
Monitor with Task Manager
Q110
Q110 During a performance test, the server experiences high memory usage. What could be a likely cause?
Insufficient server capacity
Excessive network traffic
Memory leak in the application
Slow disk speed
Q111
Q111 A performance test shows increasing response times under constant load. What is a possible explanation?
Optimized server configuration
Network issues
Resource bottleneck or system saturation
Reduction in virtual users
Q112
Q112 What is the main goal of Security Testing?
To ensure the system meets functional requirements
To protect the system from vulnerabilities
To optimize performance
To reduce response time
Q113
Q113 Which type of Security Testing simulates an external attack on a system?
Vulnerability Scanning
Penetration Testing
Risk Assessment
Security Auditing
Q114
Q114 What does "Authentication" mean in the context of Security Testing?
Verifying user credentials
Encrypting data
Testing system response time
Measuring app speed
Q115
Q115 Which type of Security Testing checks how the system protects against data leaks?
Penetration Testing
Network Security Testing
Data Security Testing
Compliance Testing
Q116
Q116 In SQL Injection testing, which symbol is commonly used to exploit vulnerabilities in a query?
Semicolon (;)
Exclamation mark (!)
Colon (:)
Single quote (')
Q117
Q117 How can you prevent Cross-Site Scripting (XSS) in a web application?
By using inline JavaScript
By validating user input and encoding output
By minimizing HTML tags
By blocking pop-ups
Q118
Q118 Which HTTP header helps protect against clickjacking attacks?
Content-Type
Cache-Control
X-Frame-Options
Authorization
Q119
Q119 A web application is vulnerable to SQL Injection. What is the most likely cause?
Inadequate input validation
Excessive user permissions
Strong encryption
Fast database connection
Q120
Q120 During a Penetration Test, the tester is able to bypass authentication. What should be the next step?
Report the vulnerability
Ignore it
Re-run the test
Increase server resources