Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > iSQI > AI Testing > CT-GenAI

CT-GenAI ISTQB Certified Tester Testing with Generative AI (CT-GenAI) v1.0 Question and Answers

Question # 4

The model flags anomalies in logs and also proposes partitions for input validation tests. Which metrics BEST evaluate these two outcomes together?

A.

Precision for anomaly identification and recall for coverage of valid/invalid partitions

B.

Time efficiency for anomaly detection and accuracy for coverage of valid/invalid partitions

C.

Diversity for anomaly identification and precision for partitions

D.

Accuracy for anomaly detection and Precision for coverage of valid/invalid partitions

Full Access
Question # 5

You are tasked with applying structured prompting to perform impact analysis on recent code changes. Which of the following improvements would BEST align the prompt with structured prompt engineering best practices for comprehensive impact analysis?

A.

Include references to version control systems like Git in the constraints.

B.

Specify that the role is a test architect specializing in CI/CD pipelines.

C.

Add a step to review the change log for syntax errors before analysis.

D.

Include mapping code changes to affected modules, identifying test cases, prioritizing by risk level and change complexity

Full Access
Question # 6

When an organization uses an AI chatbot for testing, what is the PRIMARY LLMOps concern?

A.

Maximizing scalability by deploying larger cloud-based LLM clusters

B.

Maintaining data privacy and minimizing security risks from external services

C.

Achieving faster responses by reducing model checkpoints and updates

D.

Focusing primarily on user experience improvements and response formatting

Full Access
Question # 7

Who typically defines the system prompt in a testing workflow?

A.

A tester configuring the assistant

B.

End user during normal chat use

C.

CI server automatically without human input

D.

Product owner in user stories only

Full Access
Question # 8

An attacker sends extremely long prompts to overflow context so the model leaks snippets from its training data. Which attack vector is this?

A.

Data poisoning

B.

Malicious code generation

C.

Data exfiltration

D.

Request manipulation

Full Access
Question # 9

Which of the following is NOT a valid form of LLM-driven test data generation?

A.

Creating production database backups

B.

Setting boundary values

C.

Creating combinatorial data (e.g., pairwise)

D.

Generating synthetic datasets

Full Access
Question # 10

Your team needs to generate 500 API test cases for a REST API with 50 endpoints. You have documented 10 exemplar test cases that follow your organization's standard format. You want the LLM to generate test cases following the pattern demonstrated in your examples. Which of the following prompting techniques is BEST suited to achieve your goal in this scenario?

A.

Prompt chaining

B.

Few-shot prompting

C.

Meta prompting

D.

Zero-shot prompting

Full Access
Question # 11

Which technique MOST directly reduces hallucinations by grounding the model in project realities?

A.

Provide detailed context

B.

Randomize prompts each run

C.

Rely on generic examples only

D.

Use longer temperature settings

Full Access
Question # 12

In the context of software testing, which statements (i—v) about foundation, instruction-tuned, and reasoning LLMs are CORRECT?

i. Foundation LLMs are best suited for broad exploratory ideation when test requirements are underspecified.

ii. Instruction-tuned LLMs are strongest at adhering to fixed test case formats (e.g., Gherkin) from clear prompts.

iii. Reasoning LLMs are strongest at multi-step root-cause analysis across logs, defects, and requirements.

iv. Foundation LLMs are optimal for strict policy compliance and template conformance.

v. Instruction-tuned LLMs can follow stepwise reasoning without any additional training or prompting.

A.

i, ii, iii

B.

i, iii, v

C.

i, ii, iii (Duplicate entry in original source)

D.

ii, iii, iv

Full Access