flashcards_QA
Q1: What is the main objective of software testing
A1: To identify and fix defects in the software to ensure it meets the specified requirements and quality standards.
Q2: What are the main types of software testing
A2: Unit testing_ integration testing_ system testing_ acceptance testing_ performance testing_ security testing_ and regression testing.
Q3: What is unit testing
A3: Testing individual components or modules of a software application in isolation to ensure they work correctly.
Q4: What is integration testing
A4: Testing the interaction between integrated units/modules to ensure they work together as expected.
Q5: What is system testing
A5: Testing the complete and integrated software system to verify that it meets specified requirements.
Q6: What is acceptance testing
A6: Testing conducted to determine if the software meets the business requirements and is ready for deployment.
Q7: What is regression testing
A7: Re-testing software after changes to ensure that new defects have not been introduced and existing functionality is not broken.
Q8: What are the main stages of the Software Testing Life Cycle (STLC)
A8: Requirement analysis_ test planning_ test case development_ environment setup_ test execution_ and test closure.
Q9: What is a test plan
A9: A document outlining the scope_ approach_ resources_ and schedule for testing activities.
Q10: What is a test case
A10: A set of conditions and steps to be executed to verify a particular feature or functionality of the software.
Q11: What is a defect or bug
A11: A flaw or error in the software that causes it to produce incorrect or unexpected results.
Q12: What is black-box testing
A12: Testing the software without knowledge of its internal code structure_ focusing on inputs and outputs.
Q13: What is white-box testing
A13: Testing the internal structures or workings of an application_ also known as structural testing.
Q14: What is exploratory testing
A14: An informal testing approach where testers actively explore the application to find defects without predefined test cases.
Q15: What is automated testing
A15: Using software tools to execute pre-scripted tests on the software application before it is released into production.
Q16: What is Active Directory
A16: A directory service developed by Microsoft for Windows domain networks_ providing authentication and authorization.
Q17: What is a domain controller
A17: A server in an Active Directory domain that responds to security authentication requests (logging in_ checking permissions).
Q18: What is Group Policy
A18: A feature of Windows Server that allows administrators to implement specific configurations for users and computers in the domain.
Q19: What are the roles available in Windows Server
A19: Examples include Active Directory Domain Services_ DNS Server_ DHCP Server_ File and Storage Services_ Web Server (IIS)_ and more.
Q20: What is Hyper-V
A20: A native hypervisor developed by Microsoft that allows for creating and managing virtual machines.
Q21: What is DHCP and what does it do
A21: The Dynamic Host Configuration Protocol assigns IP addresses to devices on a network automatically.
Q22: What is the difference between NTFS and ReFS
A22: NTFS (New Technology File System) is a file system that provides performance_ reliability_ and advanced features. ReFS (Resilient File System) is designed to offer improved data integrity_ availability_ and scalability.
Q23: What are FSMO roles
A23: Flexible Single Master Operations roles are specialized domain controller tasks in an Active Directory environment.
Q24: What is WSUS and what is its purpose
A24: Windows Server Update Services (WSUS) is a server role that allows administrators to manage the distribution of updates released through Microsoft Update.
Q25: What is Server Core
A25: A minimal installation option for Windows Server that reduces the disk space_ servicing requirements_ and attack surface by excluding the GUI.
Q26: How do you promote a server to a domain controller
A26: By installing the AD DS role and using the dcpromo command or Server Manager to configure it as a domain controller.
Q27: What is a RODC
A27: A Read-Only Domain Controller holds a read-only copy of Active Directory database and is used in scenarios where security is a concern.
Q28: What is the purpose of Windows Server Backup
A28: To provide backup and recovery solutions for Windows Server environments.
Q29: What is PowerShell and why is it important
A29: PowerShell is a task automation and configuration management framework from Microsoft_ consisting of a command-line shell and associated scripting language. It is important for automating administrative tasks.
Q30: What is a GPO
A30: A Group Policy Object is a collection of settings that control the working environment of user accounts and computer accounts.
Q31: What is the OSI model and what are its layers
A31: The OSI model is a conceptual framework used to understand network interactions. Its layers are: Physical_ Data Link_ Network_ Transport_ Session_ Presentation_ and Application.
Q32: What is an IP address
A32: An IP address is a unique identifier assigned to a device on a network to facilitate communication.
Q33: What is the difference between IPv4 and IPv6
A33: IPv4 uses 32-bit addresses allowing for 4.3 billion unique addresses_ whereas IPv6 uses 128-bit addresses allowing for a vastly larger number of unique addresses.
Q34: What is a subnet
A34: A subnet is a segmented piece of a larger network_ designed to improve performance and security.
Q35: What is a router and what does it do
A35: A router is a networking device that forwards data packets between computer networks_ directing traffic on the Internet.
Q36: What is a switch and what is its function
A36: A switch is a networking device that connects devices within a network and uses MAC addresses to forward data to the correct destination.
Q37: What is a VLAN
A37: A Virtual Local Area Network is a logical subdivision of a network that combines devices from different physical LANs into a single broadcast domain.
Q38: What is DNS and how does it work
A38: The Domain Name System translates human-readable domain names (like www.example.com) into IP addresses that computers use to identify each other on the network.
Q39: What is DHCP and why is it used
A39: The Dynamic Host Configuration Protocol automatically assigns IP addresses and other network configuration parameters to devices on a network.
Q40: What is NAT and why is it important
A40: Network Address Translation allows a single device_ such as a router_ to act as an agent between the Internet and a local network_ which helps to improve security and reduce the number of public IP addresses needed.
Q41: What is a firewall and what is its purpose
A41: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Q42: What is VPN and what is it used for
A42: A Virtual Private Network extends a private network across a public network_ allowing users to send and receive data as if their devices were directly connected to the private network.
Q43: What is the difference between TCP and UDP
A43: TCP (Transmission Control Protocol) is connection-oriented and ensures reliable data transmission_ whereas UDP (User Datagram Protocol) is connectionless and allows faster transmission but without reliability guarantees.
Q44: What is an SSL/TLS and why is it used
A44: Secure Sockets Layer / Transport Layer Security protocols are used to secure communications over a computer network by encrypting the data transmitted between devices.
Q45: What is the function of a network gateway
A45: A network gateway connects different networks_ allowing data to flow between them and translating protocols as necessary.
Q46: What is the function of an access point
A46: An access point allows wireless devices to connect to a wired network using Wi-Fi.
Q47: What is bandwidth
A47: Bandwidth is the maximum rate of data transfer across a network path_ measured in bits per second (bps).
Q48: What is latency in networking
A48: Latency is the time it takes for a data packet to travel from the source to the destination across a network.