Unit test is incorrect because its purpose is to verify that the smallest defined module of software (i.e., individual subprograms, subroutines, or procedures) works as intended. These modules are internal to an organization. Integration test is incorrect because its purpose is to verify that units of software, when combined, work together as intended. Typically, a number of software units are integrated or linked together to form an application. Again, this test is performed internally in an organization. System acceptance test is incorrect because its purpose is to verify that the complete system satisfies specified requirements and is acceptable to end users.
170. Which of the following can give a false sense of security?
a. A test tool that requires planning.
b. A test tool that produces error-free software.
c. A test tool that requires time and effort.
d. A test tool that requires experience to use
171. Which of the following software configuration-management capabilities available for client/server systems can help to detect and correct errors?
a. Install check-in/check-out modules.
b. Archive source code.
c. Allow backtracking.
d. Assemble new builds.
172. Which of the following requires a higher level of security protection in terms of security controls?
a. Test procedures
b. Test cases
c. Test repository
d. Test plans
173. From a security viewpoint, which of the following pose a severe security problem?
a. Unattended computer operations
b. Unattended computer terminal
c. Unattended software testing
d. Unattended facsimile machine
Unattended computer operations are incorrect because they represent a situation where most of computer operational tasks are performed by machines (robots) and less with people.
Unattended software testing is incorrect because testing is conducted by automated test tools without a person watching the testing process. The test tool continues running the test sessions by replaying one or more test scripts. It handles unforeseen circumstances gracefully.
Unattended facsimile machine is incorrect because it can lead to social engineering attacks. The unattended computer operations, software testing, and facsimile machine pose less risk than the unattended computer terminal.
174. What does the most commonly used application program design structure metrics include?
a. Check-in and check-out indicators
b. Fan-in and check-out indicators
c. Fan-in and fan-out metrics
d. Fan-out metrics and check-in indicators