Question 1
Question text
Every sprint starts with _________ and ends with ___________ and ______________.
1. Sprint planning 2. Sprint Review 3. Sprint Retrospective
1. Daily Stand Up 2. Sprint Review 3. Sprint retrospective
1. Sprint Review 2. Sprint planning 3. Sprint Retrospective
1. Sprint Retrospective 2. Sprint Review 3. Sprint planning
Feedback
Question 2
Question text
As part of cloud application security, which of the following are the identity and access solutions provided by the cloud service providers?
Role based authentication
Single Sign-On/Off
Federation and Identity Provision
Multifactor Authentication
Feedback
Question 3
Question text
Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration
Item categories that are quoted below -
A. Project Documentation
B. Architectures
C. Interfaces
D. Designs
E. Source code and Executable code.
Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added.
Assume that you are Mr. Vincent and determine few more categories that can be added to the same.
Training materials
Databases that include processed data
Metrics and Status Reports
Requirements
Feedback
Question 4
Question text
Identify the state that refers High degree of Coupling
Adding a functionality to your application is difficult and effects your application
Small change can break your code and this could have a disastrous effect on your application
Big change can break your code and this could have a disastrous effect on your application
Feedback
Question 5
Question text
John is the identified Product Owner of a just commenced Scrum Project. One month into the project, the team don't get enough opportunities to interact with John. The case is that either John can't be reached or even if reached, he spares only very little time with the team. Which of the following can the team adapt to get enough availability of the John - the Product Owner?
i) Identify the REAL Product Owner to do the job
ii) Educate the Product Owner on the expectations
iii) Request the Scrum Master to pitch in for the Product Owner
Only i and iii
Only i and ii
Only ii and iii
All i, ii and iii
Feedback
Question 6
Question text
"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object" Which pattern is it?
Behavioral Pattern
Structural Pattern
Singleton pattern
Feedback
Question 7
Question text
In each daily scrum, within a sub-team, ends by designating one member as an ambassador to go and participate in a daily scrum ceremony with ambassadors from other teams. What is that ceremony called?
Sprint Review
Daily Scrum
Scrum of Scrum
Super Scrum ceremony
Feedback
Question 8
Question text
What are guidelines that needs to be followed for managing bottlenecks during optimization?
Do not cache the result.
Do performance testing on critical methods carrying business logic
Identifying benefits of implementing complex algorithm does not out weigh the time taken to create it.
Increase memory space to make the program efficient in terms of speed.
Feedback
Question 9
Question text
Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?
There are no cyclic dependencies between classes, components or layers.
Components responsibilities are maximized.
The average complexity of classes, programs, methods, procedures, or functions is under control.
Dependencies to external libraries are well known.
Feedback
Question 10
Question text
What is the functionality of Data Cohesion in modules of projects ?
One module may be dependent on another module for data
If a module is independent of data from other modules
Both Option 1 and 2
None of them
Feedback
Question 11
Question text
Kiran needs help in following the rules that must be followed while creating exception handling strategy. Which rules he must consider from below list?
Think of a strategy for logging exceptions
Differentiate between application business and technical exceptions.
Delay till testing to rectify an incorrect exception.
Create meaningful exception messages.
Feedback
Question 12
Question text
What is the function of a federated identity?
Enables users to be certified to use specific applications
Enables users of one secure domain to securely access resources in another domain seamlessly
Enables users to gain access to an application with a federated user name
Enables users of an application to use the same authentication for other application by the same application
Feedback
Question 13
Question text
The Scrum Development Team is getting ready to start their Agile execution. In the current release, 8 sprints have been planned. The team wants to give the product owner, a picture of what are they planning to do in the current release. To start this, they need to decide on the goal of each sprint. When are the Sprint goals identified?
As and when needed. No constraints.
Once before Sprint 1 and another one before Sprint 5
Before the start of Sprint 1
During planning of the respective sprint
Feedback
Question 14
Question text
John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him?
It's okay to have hard-coded values in the same code
Limit the method size between 100 and 150 code lines by refactoring it.
Group logically related statements for easy readability
Name of methods does not matter.
Feedback
Question 15
Question text
What are some of the ways test-driven development can benefit a project compared to other technique?
Compresses the available set of test tools
Reduces the frequency of releases
Supports continuous integration
Enhances collaboration among various stakeholders
Feedback
Question 16
Question text
What happens when the sprint is cancelled?
The completed Sprint Backlog items are evaluated for a release, and incomplete items are discarded.
The complete Sprint Backlog is put back to the Product Backlog.
The completed Sprint Backlog items are evaluated for a release, and incomplete items are put back into the Product Backlog.
The Scrum team disbands immediately.
Feedback
Question 17
Question text
Ms. Julie has to write a project document that proposes the Configuration Management adoption into the project. Which among the below are the benefits you think Ms. Julie can quote in her document?
A. Establishes and maintains the integrity of the items that have been placed under its control
B. Accounts for and reports the progress of development efforts
C. Prevents unauthorized access to assets
D. Coordinates, tracks, and manages change activities
E. Facilitates concurrent development
A, B, C and D
A and B
A,B,D,E
B and C
A,B,C,D and E
Feedback
Question 18
Question text
What are some features a tool should have to facilitate TDD Agile database development
Able to run tests in transactions to keep them independent
Override database errors to track changes between revisions
Implement tests in a built-in database testing language
Provide the ability to fake tables and views
Feedback
Question 19
Question text
In which situation a looping error will not occur?
Loops are terminated incorrectly or not terminated at all.
Loops variables are initialized correctly.
Improper nesting occurs.
Loop conditions are initialized incorrectly or not at all.
Feedback
Question 20
Question text
CIs are the work products within the selected categories that the project wants under configuration control. Imagine you are the person for writing the CM Plan who typically works with the Team Leads to document the CIs for the designated categories. Once the team determines the CM categories and the naming convention for each CI, it must maintain a list of the actual CIs. Which role you are playing from below options.
Product Manager
Project Manager
Configuration Manager
Scrum Master Manager
Feedback
Question 21
Question text
What are the components of Accenture Delivery Suite(ADS)?
Methods & Estimators, Deliverables, Process, Metrics
Methods & Estimators, Tools, Process, Metrics
Methods & Estimators, Tools, Architecture, Metrics
Methods & Estimators, Deliverables, Architecture, Metrics
Feedback
Question 22
Question text
What are the two important objectives when adding testing code to a project?
Run integration tests on the final release to ensure test code is present
Ensure test-related code is isolated
Use normal design criteria to embed test code directly into units
Prevent test code from being compiled into production code
Feedback
Question 23
Question text
George is a project manager handling a software project and suggest their team members to use distributed version control for software configuration management. Guide the team members of George to choose the Distributed Version Control system from the given options.
Choose exactly 2 CORRECT ANSWERS.
Subversion (SVN)
GIT
Mercurial
Perforce
Feedback
Question 24
Question text
Which of the following definitions provided by various personnel's would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate?
EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work.
DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control .
GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way.
JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.
EVANA's definition
JOE's definition
DANIEL's definition
GABRIEL's definition
Feedback
Question 25
Question text
What are the OOP components that is influenced in Design Patterns?
Encapsulation
Inheritance
Polymorphism
Abstraction
Feedback
Question 26
Question text
Which is the task performed as per ADM for Custom Development?
"- Develop and Application prototype and conduct Conference Room Pilot to validate the configuration Design explore configuration gap resolution options - Design reports, interfaces, conversions, extensions, forms and workflow to fill the packaged software functional gaps"
"- Produce an application design pack for the solution consisting of the page specification, domain class model, component/class design, data conversion design, physical database design and, other design deliverables. - Develop and Application prototype and conduct Conference Room Pilot to validate the configuration design, explore configuration gap resolution options"
"- Produce an application design pack for the solution consisting of the page specification, domain class model, component/class design, data conversion design, physical database design and, other design deliverables. - Derive the application design from and ensure the consistency of the design deliverables with the application requirements, the use-cases, business rules, and other requirements-related deliverables"
"- Design Packaged Software configuration to meet the Business Process Design and the Application requirements - Develop and Application prototype and conduct Conference Room Pilot to validate the configuration design, explore configuration gap resolution options"
Feedback
Question 27
Question text
Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?
Speed Optimization
Memory utilization
Memory Optimization
Code Optimization
Feedback
Question 28
Question text
Which of the following could be input or output of a task? (Select all that apply.)
Role
Outcome
Artifact
Deliverable
Feedback
Question 29
Question text
Identify the usage of sandboxes in Cloud Application Security.
Discover the impact of the applied malware
Discover application errors
Discover attack vectors and agents
Discover peek application performance
Discover vulnerabilities
Feedback
Question 30
Question text
Mr. Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.
A. Levels of Control.
B. Selecting CIs
C. Determining categories of CM
D. Naming Conventions
E. Configuration Items(CIs)
D,E,B,A,C
C,A,E,D,B
C,E,D,A,B
C,B,D,A,E
Feedback
Question 31
Question text
Complete the statements- Accenture Delivery Suite (or ADS) is our standard delivery framework designed to help our teams "___________" results.
efficient, predictable, reliable and high-quality results
fast, efficient, predictable, reliable and high-quality results
smooth, efficient, predictable, reliable and high-quality results
workable, smooth, reliable and high-quality results
Feedback
Question 32
Question text
Why are WIP limits important?
Because manager says so
To tie up the system
To make things Complex
To ensure smooth flow of things through the system
Feedback
Question 33
Question text
Which of the following is the description for the Level 1 OWASP threat assessment maturity practice?
Identify and understand the high level threats to the organization and individual projects
Map compensating controls to each threat against the internal and third-party software
Increase the accuracy of the threat assessment and improve granularity of per-project understanding.
Feedback
Question 34
Question text
How did object-oriented programing systems handle complexity better than procedural process?
Tasks were divided into a number of sub tasks
All the procedures were treated as an identifiable behavior of an object.
Handling each task in isolation ensuring that we have the right degree of coupling in cohesion
Feedback
Question 35
Question text
Feedback
Question 36
Question text
What are the benefits of adopting the security-centric approach to develop the applications in the cloud?
Early identification and mitigation of security vulnerabilities
Reuse of the security stratergies and tools
Identify system configuration issues
All the above
Feedback
Question 37
Question text
Which of the following is not the right answer for Packaged or Custom development ?
Packaged Software is owned solely by the business who creates it
Custom software maps to the client's business process and contains key features necessary to a specific business function
Packaged Software is typically less expensive due to minimal, If any, development time
Packaged Software is ready-made and available for sale, lease or license to the public
Feedback
Question 38
Question text
Prof. Kevin is writing a white paper on a new survey he has made. To support his survey, he has define the statements which are given below in correct order. Arrange the below statements that depicts DevOps process and help Prof. Kevin.
1. The build software product or feature(s) will be tested thoroughly by the testing team to ensure that the quality build is ready for deployment anytime.
2. Once the deployments is done, the working product would be kept under surveillance to check fitness of the product under different circumstances
3. The code committed by the all the team members is integrated into version control system, automated build process is initiated and finally results in a build whose source code is evaluated thoroughly
4. The deployment may be automated or manual. If the deployment is automated, CD means Continuous Deployment otherwise Continuous Delivery.
3,1,4 and 2
3,4,2 and 1
4,3,2 and 1
3,1,2 and 4
Feedback
Question 39
Question text
Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:
Application Exceptions
Compiler Exceptions
Technical Exceptions
Business Exceptions
Feedback
Question 40
Question text
A team is referring to the latest version of the product backlog to work on the deliverables. Who is responsible for the content, availability and ordering of the items in the product backlog?
Scrum Master
Project Manager
Product Owner
Scrum Development Team
Feedback
Question 41
Question text
How to ensure reusability of code in a project?
No dependable modules
Having highly dependable blocks
Having loosely coupled system
Sometimes you do this by breaking it into multiple independent blocks
Feedback
Question 42
Question text
Which statement best describes the use of Acceptance TDD?
Tests from the user's point of view
Passes acceptance of the tests unto the end-user
Tests from the managers point of overview
Tests from the customer view without requiring the customer
Feedback
Question 43
Question text
David, a developer, is working on login component of an application and dealing with sensitive data. Hence before pushing the code to github.com, he moved the sensitive information in a "logindata.cfg" file and added the file name as "login.cfg" by mistake in .gitignore and also pushed the changed to github.com. Later he identified and removed it from repository before anyone uses that file.
Is there any risk associated with this?
No, the file is a cfg file as most of the team members have their own cfg file
Yes, the file is being modified by other team member
No, there is no risk as he removed from github.com
Yes, the changes will be reflected in the version history.
Feedback
Question 44
Question text
Arrange the following in the right sequence to achieve TDD:
i) Repeat over again until and run the test
ii)Run the unit tests
iii)Write a single unit test describing an aspect of the program
iv)Look at which of those tests should fail
v) Write just enough code
vi) Refactor the code
iv, iii, ii, vi, v, i
iii, ii, iv, v, vi, i
ii, iii, I, iv, v, vi
v, vi, iii, ii, iv, i
Feedback
Question 45
Question text
Consider the identity and access management solutions by various providers as given below.
Google Apps SSO;
Microsoft SQL Server Integrated Security;
Microsoft Office Online;
The above solutions comes under which type of identity and access management solutions?
Federated identity
Multifactor Authentication
Single Sign-On/Off (SSO) identity
Microsoft Active directory
Feedback
Question 46
Question text
Philia, a developer, is worked on a finance project in Accenture. Her Project started moving their Infrastructure to cloud and hence forth all the requirements will be provided as service from cloud provider. Which of the following cloud service model will be helpful for Philia here?
Infrastructure As Service
Code As Service
Software As Service
Platform As Service
Feedback
Question 47
Question text
How does ADM align to the new ?
Extensions and Context
Reputability
Longevity
Vastness
Feedback
Question 48
Question text
For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?
Create new types of exceptions to handle any kind of situation if need be.
Always handle the exception as it is an unusual event that may occur.
Write exceptions in usual flow of program.
No need to document exceptions.
Feedback
Question 49
Question text
What is the logical grouping of elements that have single major outcome/ business result?
Stage
Workstream
Activity or Discipline
Feedback
Your answer is correct.
Question 50
Question text
When you are choosing Custom Vs Package implementation, which factors would you want to consider ?
Criticality of Requirements
Historical Factors
Budget
Product Availability
Feedback
Question 1
Question text
Which statement best describes the use of Acceptance TDD?
Tests from the user's point of view
Tests from the managers point of overview
Tests from the customer view without requiring the customer
Passes acceptance of the tests unto the end-user
Feedback
Question 2
Question text
What is the functionality of Data Cohesion in modules of projects ?
One module may be dependent on another module for data
None of them
Both Option 1 and 2
If a module is independent of data from other modules
Feedback
Question 3
Question text
Which of the following statements are correct about coding best practices and coding standards?
Coding best practices are collection of good programming practices and experiences, which involve the use and improvement of coding standards.
Coding standards improve the consistency and reliability of the code by eliminating personal styles and by bringing symmetry to the application code, irrespective of the developers involved.
Coding best practices and standards are automatically taken care
Deliver High Quality Code
Feedback
Question 4
Question text
What are the major challenges faced when performing test-driven database development?
Layer dependencies being rigid
Schema changes breaking tests
Test framework using mock objects
Record availability causing database failures
Feedback
Question 5
Question text
Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you?
Choose exactly THREE correct options.
Integration Baseline
Architecture Baseline
Testing Baseline
Requirements Baseline
Feedback
Question 6
Question text
Why are policies required for a project?
Make things easy to understand
It helps one understand what needs to be done for that particular column
Everybody is on the same page
All of the above
Feedback
Question 7
Question text
Joshua being a project manager, need to suggest methods to developers of project so that client become high-performance businesses by delivering high-quality code. Which are they?
Adhere to Accenture Delivery Methods best practices and guidelines
Implementing the practice of peer reviews.
Follow the Accenture Code Quality Model
Using automated code review tools, if permitted by client
Feedback
Question 8
Question text
Kiran needs help in following the rules that must be followed while creating exception handling strategy. Which rules he must consider from below list?
Differentiate between application business and technical exceptions.
Delay till testing to rectify an incorrect exception.
Create meaningful exception messages.
Think of a strategy for logging exceptions
Feedback
Question 9
Question text
How does View enhance data security?
None
By creating one common view for all the tables
By letting users create a temporary table with any desired data
By only allowing users access to columns they require instead of entire table
Feedback
Question 10
Question text
What are the OOP components that is influenced in Design Patterns?
Inheritance
Polymorphism
Abstraction
Encapsulation
Feedback
Question 11
Question text
What is the major difference between the Product Backlog and the Sprint Backlog?
The Sprint Backlog is owned by the Product Owner.
The Product Backlog is a subset of the Sprint Backlog.
The Sprint Backlog is a subset of the Product Backlog.
The Product Backlog is equal to the Sprint Backlog.
Feedback
Question 12
Question text
What is SSO in terms of cloud security mean?
Server security online
Single sign on/off
second service ongoing
Security Service organization
Feedback
Question 13
Question text
Alex is addressing the Scrum Development Team and educating them on 'Courage', which is one of the core values of Scrum. Which of the following is an appropriate explanation that Alex can give his team on 'Courage'?
i) Courage in sharing facts as it is
ii) Courage to change direction when needed
iii) Courage to support Scrum Values
iv) Courage to not deliver incomplete deliverables
Only ii, iii and iv
None of the options
Only I, ii and iii
All the options
Feedback
Question 14
Question text
Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?
The average complexity of classes, programs, methods, procedures, or functions is under control.
Dependencies to external libraries are well known.
There are no cyclic dependencies between classes, components or layers.
Components responsibilities are maximized.
Feedback
Question 15
Question text
Question 16
Question text
What are some features a tool should have to facilitate TDD Agile database development
Provide the ability to fake tables and views
Implement tests in a built-in database testing language
Override database errors to track changes between revisions
Able to run tests in transactions to keep them independent
Feedback
Question 17
Question text
Which GRASP principle talks about, who should be responsible for creating new objects or use other objects in your program or your system ?
Creator
High Cohesion
Controller
Low Coupling
Feedback
Question 18
Question text
Let's consider a scenario, when ABC Project team members are developing microservices, and they are checking out their code on tools like GitHub. Which of the following tool helps them to observe any commit into source code management or GitHub and then perform build and test the code automatically?
Maven
Selenium and Maven
Git
Jenkins
Feedback
Question 19
Question text
Which of the following are phases of NIST SDLC model?
A. The initiation phase
B. Functional Specification phase
C. Acquisition and development of the solution
D. The Maintenance phase
E. The operations and maintenance phase
ABCE
ACE
ABE
ABCD
Feedback
Question 20
Question text
In a real-world system where we will hundreds of classes and objects which perform thousands of actions. How will assign the responsibility to each class or object?
Create an Abstract class and implement based on the responsibility
Group the objects into classes which will be giving the information to all the subclasses on their responsibility
Assign a responsibility to the Information Expert, which will have the necessary information to fulfill the responsibilities.
Feedback
Question 21
Question text
How did object-oriented programming systems handle complexity better than procedural process?
Handling each task in isolation ensuring that we have the right degree of coupling in cohesion
All the procedures were treated as an identifiable behavior of an object
Tasks were divided into a number of sub tasks
Feedback
Question 22
Question text
What is the logical grouping of elements that have single major outcome/ business result?
Workstream
Activity or Discipline
Stage
Feedback
Your answer is incorrect.
Question 23
Question text
People if need to change the appearance change the hair style, clothes and appeals but may the person itself. Which SOLID principle does the above quote satisfy?
Single responsibility
Open Closed Principle
Interface segregation
Dependency Inversion Principle
Feedback
Question 24
Question text
Sprints are usually _______________.
Feature Boxing
Time Boxing
Epic Boxing
Theme Boxing
Feedback
Question 25
Question text
Identify the order of steps for Code review process.
a. Conduct a review
b. Plan for a review
c. Resolve review points
d. Validate resolutions
e. Prepare for a review
f. Baseline a software work product
a, c, b, e, f, d
b, e, a, c, d, f
b, f, a, e, c, d
b, f, a, e, c, d
Feedback
Question 26
Question text
Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.
GitLab
PVCS(Poly Version Control System)
VSS(Visual SourceSafe)
Mercurial
Feedback
Question 27
Question text
Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.
Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.
A. Determine CI Categories.
B. Determine CM Control Levels.
C. Determine CI Tools.
D. Determine CI Naming Conventions.
E. Audits and Status Reporting
F. Select CIs
A,B,C,D,F
A,C,D,E
A,B,C,D
A,B,E,F
Feedback
Question 28
Question text
John, the product owner, in consultation with his stakeholders, has arrived at four features that are of same priority. The stakeholders are of the opinion that all those features are of equal significance. Which of the following can John do, in this context?
Consult with the Development Team and still arrive at a priority among these features
Ask the development team to park these features until the stakeholders agree on to a priority order
Randomly pick and implement one feature after the other since all are of same priority
Tell the Development Team that all features need to be worked on in parallel
Feedback
Question 29
Question text
What relationship(s) can a work product have to task?
Output only
Input and Output
Input only
Optional input, mandatory input, primary output and secondary output.
Feedback
Question 30
Question text
Code Review process involves which of the following steps:
Never conduct a review
Resolve review points
Plan for a review
Prepare for a review
Baseline a software products
Feedback
Question 31
Question text
What are some of the ways test-driven development can benefit a project compared to other technique?
Reduces the frequency of releases
Supports continuous integration
Enhances collaboration among various stakeholders
Compresses the available set of test tools
Feedback
Question 32
Question text
A Scrum Development Team is supposed to be 'Self Organized' that would mean.
They are experts in different technologies
They can identify their own goals and make decisions on their own
They can accept decisions made on their behalf by Scrum Master
They can accept decisions made on their behalf by Product Owner
Feedback
Question 33
Question text
Identify the correct order of risk investigation and rating process.
A. Probability that that risk could be realized against an asset
B. Identification of potential risk areas
C. Risk investigation and rating process
D. Severity level of the risk
E. Defining the risk impact
F. Mitigation listing
BAEDFC
BDECFA
ADFCBE
FDCABE
Feedback
Question 34
Question text
What is considered by the developers in regard to RESTFul API deployment?
Protection Against Injection
Size of the application
Use API Keys
Operation
Use HTTPS identity Authentication
Feedback
Question 35
Question text
George was attending an interview.
He got a question stating - "Which among the below is/are TRUE with respect to DevOps?"
The statements are given as in the options - What could be the answer of Mr. George?
CHOOSE TWO CORRECT ANSWERS.
DevOps is applicable only in certain areas of software development. It is applicable for only few technologies. DevOps means automation.
DevOps is a way to work more predictively, productively to increase the quality of outcomes. This helps to achieve the product early in to the market.
DevOps enables to opt between productivity and quality of the product. If there is pressure of early in to the market, we can compromise on quality of the appilication to an extent
DevOps is establishing of the industrialization. It is a key enabler of Agile. It has ability to move efficiently and rapidly through SDLC phases.
Feedback
Question 36
Question text
Which of the following are not benefits of code optimization techniques?
Improves the compilation time of an application
Improves the system's performance
Improves the organization's performance
Results in code that is easy to understand, reuse, and maintain
Feedback
Question 37
Question text
What are the Kanban Values ?
Complexity, Balance, Customer Focus, Flow, Leadership, Understanding, Agreement, Respect
Transparency, Balance, Customer Focus, Flow, Leadership, Understanding, Agreement, Respect, Collaboration
Transparency, Push, Customer Focus, Flow, Leadership, Understanding, Agreement, Respect
None of these
Feedback
Question 38
Question text
Which of the following tasks will be performed by the Configuration Manager?
Choose exactly THREE correct options.
Makes sure that project complies with CM standards and procedures.
Plans Configuration Management
Tracks and Reports on CM status and audits.
Attends and facilitates CCB meetings.
Feedback
Question 39
Question text
Which of the following is a unit of work that a role may be asked to perform?
Task
Work?ow
Work Unit
Activity
Feedback
Question 40
Question text
A technique to render the untrusted data such as user input into literal text so that when any malicious code is input, it will not be executed and instead be displayed as plain text is called__________and used as a security measure against _________.
Output Encoding, Cross Site scripting
Applying Least Privilege, Insufficient attack protection
Encryption, Cross Site Scripting
Encryption, Insufficient attack protection
Feedback
Question 41
Question text
What are the pitfalls concerning the cloud application development?
Using Open source
Consulting with all Key stakeholders
Using untrusted Third party APIs
Requiring all applications be deployed in the cloud.
Feedback
Question 42
Question text
Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?
A. Use functions in code to read sensitive information from cfg file
B. Copy the sensitive information to a cfg file
C. Add the cfg file to .gitignore file
D. Identify the sensitive information in IDE.
ABDC
DBCA
DBCA
DACB
Feedback
Question 43
Question text
Identify the message protection deployment modes.
Network -to-host
host-to-host
peer-to-peer
network-to-network
Feedback
Question 44
Question text
What are various lines of businesses that Accenture Delivery Suite(ADS) support?
Technology, Digital, Operations, Security, and Cloud
Technology, Digital, Operations, Security, and Strategy
Technology, Digital, Operations, and Strategy
Technology, Industry, Operations, Security, and Strategy
Feedback
Question 45
Question text
Help Mr. Jimmy to install Jenkins on a Windows machine. Below are two suggestions given. What suggestion would you give?
1. Download Jenkins. War file https://jenkins.io and run command java -jar Jenkins. War --HTTP Port = <some-available-port>
2. Download jenkins.msi file from https://jenkins.io and install as we install any other windows software's
Either 1 or 2
Only 1
Neither 1 nor 2
Only 2
Feedback
Question 46
Question text
If we need to apply design patterns, can we do it without the principles of object-oriented programing and standards?
Yes, Design Patterns are logical and comprehensive sequencing of elements with procedural principles
No, Design Patterns are logical and comprehensive sequencing of elements with object-oriented principles only
Yes, Design Patterns can be formed by principles, any programing language and standard
Feedback
Question 47
Question text
Question 48
Question text
The most encouraged time of day to hold a Scrum Daily Meeting is ___________________.
The beginning of the day
At 4:30 PM
Immediately after lunch
At 7:00 PM
Feedback
Question 49
Question text
What are the ADM 5 main focus areas?
Testing
Management
Development
Planning
Operations
Feedback
Question 50
Question text
What are the responsibilities of the Change Control Board?
Choose exactly TWO correct options.
Review and authorize changes to the baselines.
Represent the interests of the Project Manager and any groups who are not affected by changes to the baselines.
Authorize the creation of products from the RTM library.
Monitor changes and updates to the project requirements as part of CM.
Feedback
Question 1
Question text
Identify the right combination of red/green/refactor cycle with its description.
Write unit tests that fail - Red
All of the above
Write code that passes the unit tests - Green
Improve and clean up production code - Refactor
Feedback
Question 2
Question text
What are the three security features match the Server level security ?
Audits
Logins
Server roles
All of them
Feedback
Question 3
Question text
Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:
Compiler Exceptions
Technical Exceptions
Application Exceptions
Business Exceptions
Feedback
Question 4
Question text
CIs are the work products within the selected categories that the project wants under configuration control. Imagine you are the person for writing the CM Plan who typically works with the Team Leads to document the CIs for the designated categories. Once the team determines the CM categories and the naming convention for each CI, it must maintain a list of the actual CIs. Which role you are playing from below options.
Project Manager
Configuration Manager
Product Manager
Scrum Master Manager
Feedback
Question 5
Question text
Who is responsible for conducting Performance Appraisals of Development Team Members in the Scrum?
Scrum Master
None of the above
Both of them
Product Owner
Feedback
Question 6
Question text
What relationship(s) can a work product have to task?
Input only
Input and Output
Output only
Optional input, mandatory input, primary output and secondary output.
Feedback
Question 7
Question text
Mr. Vincent has to write a POC that proposes the DevOps adoption into the project that is currently handled with traditional waterfall model. Which among the below are the benefits you think Mr. Vincent can quote in his POC?
A. Help organizations incrementally adopt DevOps capabilities
B. Improve effectiveness and efficiency of teams working for various features
C. Accelerate development and test feedback cycles
D. Optimized and continuous iterations for improvements
A and B
A, B, C and D
B and C
Only C
Feedback
Question 8
Question text
Which among the following is NOT part of Large Scale Scrum?
a) Sprint Planning
b) Daily Scrum Meeting
c) Overall Retrospection
d) Product Backlog Refinement
None of the options
Only a
Only a and d
Only b and d
Feedback
Question 9
Question text
Linda, an AWS cloud administrator, used to generate a soft token in her mobile every time she used to login to AWS cloud console as part of cloud application security practices.
Which of the following type of Identity access this action refers to?
Federated Identity management
Token based authentication
Multifactor authentication
Single Sign-on/off
Feedback
Question 10
Question text
If any team member, accidently , pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?
Copied code over to Accenture internal repository hence the code can be protected.
Remove the sensitive information from github.com and delete the version history immediately.
Report the issue to ASOC and his/her manager immediately
No action needed as the repository is private and have access to only project team members.
Feedback
Question 11
Question text
If we open a new account with a vendor on the Internet, on their web site, they ask us for our phone number in which we receive a unique code, we then enter into the web site, just to make sure and confirm the identity of ours. What type of confirmation this scenario is mapped in?
out-of-band confirmation
In-band confirmation
OTP Confirmation
Multifactor confirmation
Feedback
Question 12
Question text
What is the website to access Accenture Delivery Suite(ADS)?
https://methodology.accenture.com
https://in.accenture.com/accenturedeliverysuite/
https://ads.acceture.com
https://accenturedeliverysuite.accenture.com
Feedback
Question 13
Question text
Which of the following statements is Valid?
epic and user story are interchanging used terminologies
An epic is the functional specifications, technical specifications, usability requirements specifications of a user story
An epic is a large user story that is made up of smaller, more granular user stories.
An user story is a large epic that is made up of smaller, more granular epics.
Feedback
Question 14
Question text
Scrum of Scrum meeting is focused on ?
Resolving coordination challenges within a team
Progress of every individual
Resolving coordination challenges between teams
Progress within a team
Feedback
Question 15
Question text
Complete the statements- Accenture Delivery Suite (or ADS) is our standard delivery framework designed to help our teams "___________" results.
smooth, efficient, predictable, reliable and high-quality results
fast, efficient, predictable, reliable and high-quality results
workable, smooth, reliable and high-quality results
efficient, predictable, reliable and high-quality results
Feedback
Question 16
Question text
What are the responsibilities of the Change Control Board?
Choose exactly TWO correct options.
Represent the interests of the Project Manager and any groups who are not affected by changes to the baselines.
Monitor changes and updates to the project requirements as part of CM.
Review and authorize changes to the baselines.
Authorize the creation of products from the RTM library.
Feedback
Question 17
Question text
Which SOLID principle represents the following statement " the vehicle is an abstract for truck and bike"?
Liskov Substitution Principle
Dependency Inversion Principle
Single Responsibility Principle
Open/Closed Principle
Feedback
Question 18
Question text
Which areas of a code layout must be considered to reduce comments on methods and reduce errors?
The use of white space
Indentation
Naming conventions
Blocks of code
Feedback
Question 19
Question text
Keith working on configuring Jenkins for his project. He would like to avoid single point of failure of Jenkins Services. Which environmental setup will be suggested to be followed by him?
On-Premises Setup
Master-Slave Jenkins environment setup
One Master Node Jenkins Environment setup
Non Master-Slave Jenkins environment setup
Feedback
Question 20
Question text
Ms. Julie has to write a project document that proposes the Configuration Management adoption into the project. Which among the below are the benefits you think Ms. Julie can quote in her document?
A. Establishes and maintains the integrity of the items that have been placed under its control
B. Accounts for and reports the progress of development efforts
C. Prevents unauthorized access to assets
D. Coordinates, tracks, and manages change activities
E. Facilitates concurrent development
A,B,C,D and E
B and C
A,B,D,E
A and B
A, B, C and D
Feedback
Question 21
Question text
Which of the following is the description for the Level 2 OWASP threat assessment maturity practice?
Identify and understand the high level threats to the organization and individual projects
Increase the accuracy of the threat assessment and improve granularity of per-project understanding.
Map compensating controls to each threat against the internal and third-party software
Feedback
Question 22
Question text
What guidelines should be followed for creating the Accenture coding standards?
Coding Standards should be easy to understand
Multiple developers rewrite each other's code to match their personal styles
Must be created after the build stage
Should be agreed upon across project teams spanning globally.
Feedback
Question 23
Question text
Which of the following are CORRECT related to Secure SDLC?
A . Identifying system configuration issues related to security early.
B . Reveals the identification of shared security services
C . Influence executive decisions due to timely risk management processes.
D . Documenting and then informing management about security considerations during development phase.
A,B,C
A,B,C,D
B,C
B,C,D
Feedback
Question 24
Question text
What are guidelines that needs to be followed for managing bottlenecks during optimization?
Identifying benefits of implementing complex algorithm does not out weigh the time taken to create it.
Do not cache the result.
Increase memory space to make the program efficient in terms of speed.
Do performance testing on critical methods carrying business logic
Feedback
Question 25
Question text
Which of the following is done as part of ''Kanban'?
a) Splitting work into smaller items
b) Deciding the sequence of steps the work items need to go through
c) not imposing any limit on the work in progress
d) Track the lead and cycle time
Only a,b and d
All of the options
Only a,b and c
Only b,c and d
Feedback
Question 26
Question text
What is the best approach in Design Patterns in coding?
Writing codes with the highest possible coupling and the highest possible cohesion.
Writing codes with the lowest possible coupling and the highest possible cohesion.
Writing codes with the highest possible coupling and the Lowest possible cohesion.
Feedback
Question 27
Question text
How to ensure reusability of code in a project?
Having highly dependable blocks
No dependable modules
Having loosely coupled system
Sometimes you do this by breaking it into multiple independent blocks
Feedback
Question 28
Question text
In which situation a looping error will not occur?
Loops variables are initialized correctly.
Loop conditions are initialized incorrectly or not at all.
Improper nesting occurs.
Loops are terminated incorrectly or not terminated at all.
Feedback
Question 29
Question text
Which of the following definitions provided by various personnel's would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate?
EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work.
DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control .
GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way.
JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.
DANIEL's definition
EVANA's definition
GABRIEL's definition
JOE's definition
Feedback
Question 30
Question text
When we try to push the changes into github.com using git, few git commands need to be executed. Identify the right order of execution of the following git commands.
git commit -m "Commenting" ; git push ; git add .
git commit -m "Commenting" ; git add . ; git push
git add . ; git commit -m "Commenting" ; git push
git push ; git add . ; git commit -m "Commenting"
Feedback
Question 31
Question text
Which of the following types of testing and their contribution to overall system documentation are correct.
Unit Tests - Contains working specification of functional code
All of the above
Regression Tests - Becomes detailed executable specification
Acceptance Tests - Specifies and defines critical requirements
Feedback
Question 32
Question text
What is Takt Time?
Customer Demand Rate/Time Available
Customer Demand Rate/Time Already Spend
Customer Request Received/Lead Time
Customer Request Received/Cycle Time
Feedback
Question 33
Question text
Which SOLID principle states that an abstraction should not depend on details, but the details should depend on the abstractions?
Single responsibility
Open Closed Principle
Interface segregation
Dependency Inversion Principle
Feedback
Question 34
Question text
When an user can fall victim of cross site scripting?
All of the above
User fails to identify the forged links/websites
User clicks on some link which then shouldn't be
User's browser is compromised
Feedback
Question 35
Question text
What are the different generic techniques followed in code optimization for independent platform?
Reducing the number of conditions.
Using memory efficient routines
Data-level parallelism
Cache optimization techniques
Feedback
Question 36
Question text
Definition of Done is applicable to which of the following?
User Story
Web Page
All of the options
Feature
Feedback
Question 37
Question text
How does microservices provide small, manageable, and deployable components ?
Micro-service Components
Micro-container Services
Micro-service Containers
Feedback
Question 38
Question text
Identify the cloud application issues when an application id developed.
API calls travel across the internet and are subject to threats
Developer create the APIs when building application
API calls emanate from multiple device types
attack surface has increased
Feedback
Question 39
Question text
Which of the following tasks will be performed by the Configuration Manager?
Choose exactly THREE correct options.
Tracks and Reports on CM status and audits.
Attends and facilitates CCB meetings.
Makes sure that project complies with CM standards and procedures.
Plans Configuration Management
Feedback
Question 40
Question text
"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object" Which pattern is it?
Structural Pattern
Behavioral Pattern
Singleton pattern
Feedback
Question 41
Question text
Question 42
Question text
In a Banking application, we keep the Customer UI logic separate from the backend or the business logic of our application. Which GRASP principle would take the request from the UI and then assign that to the proper object to do the work?
High Cohesion
Low Coupling
Creator
Controller
Feedback
Question 43
Question text
Select the challenges of applying TDD to Agile development projects
Test writing becomes intuitive
Design changes may affect unit tests
Automation of the tests
Developers adaptability
Feedback
Question 44
Question text
What are the ADM 5 main focus areas?
Planning
Testing
Operations
Management
Development
Feedback
Question 45
Question text
Identify the services provided by Microservices when compare to Design Patterns.
Catalog of Solutions
Implementation
Code Access
Environment
Feedback
Question 46
Question text
___________________ helps the design process, whereas ______________ is more suitable for integration and functional testing.
BDD, TDD
TDD, TDD
TDD, BDD
BDD, BDD
Feedback
Question 47
Question text
Which of the following statements are correct about coding best practices and coding standards?
Coding standards improve the consistency and reliability of the code by eliminating personal styles and by bringing symmetry to the application code, irrespective of the developers involved.
Coding best practices are collection of good programming practices and experiences, which involve the use and improvement of coding standards.
Coding best practices and standards are automatically taken care
Deliver High Quality Code
Feedback
Question 48
Question text
Ms. Sunita wants to make container to be accessible using an IpAddress. Which Docker native network driver usage will help her to map ipaddress to a container and make it accessible.?
None
Bridge
Host
MACVLAN
Overlay
Feedback
Question 49
Question text
What is the functionality of Data Cohesion in modules of projects ?
Both Option 1 and 2
If a module is independent of data from other modules
One module may be dependent on another module for data
None of them
Feedback
Question 50
Question text
Which global policy of Accenture does ADS meet?
Policy 1100
Policy 0012
Policy 1200
Policy 0011
Feedback
Question 1
Question text
To secure the http messages in the API calls, its necessary to:
All the above
Use cryptography
implement identity management
avoid hardcoding any sensitive data in the messages
Feedback
Question 2
Question text
A team has completed 10 Sprints and moving to the 11th Sprint. Till Sprint 10, the team has achieved an average of 50 story points per sprint. The same is projected as their velocity for the upcoming sprints with the Client. What is this approach called?
Velocity Driven Sprint Planning
Velocity Driven Commitment
Commitment Driven Velocity
Commitment Driven Sprint Planning
Feedback
Question 3
Question text
Jack is grooming himself to be a potential Product Owner. Knowing the desired qualities of a Product Owner will help him groom well for the role. Which of the following are the desired qualities of a Product Owner?
i) PO should be a Domain Expert
ii) PO should be able to communicate with technical audience
iii) PO should be able to communicate with business audience
iv) PO should be a respectable person by the Scrum Team members
Only i and iv
Only i, iii and iv
Only i and iii
All the options
Feedback
Question 4
Question text
Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration
Item categories that are quoted below -
A. Project Documentation
B. Architectures
C. Interfaces
D. Designs
E. Source code and Executable code.
Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added.
Assume that you are Mr. Vincent and determine few more categories that can be added to the same.
Requirements
Training materials
Databases that include processed data
Metrics and Status Reports
Feedback
Question 5
Question text
Mr. Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.
A. Levels of Control.
B. Selecting CIs
C. Determining categories of CM
D. Naming Conventions
E. Configuration Items(CIs)
C,A,E,D,B
C,B,D,A,E
D,E,B,A,C
C,E,D,A,B
Feedback
Question 6
Question text
Which of the following action to be taken before pushing the code into github.com when we have sensitive information in the source code ?
Replace the sensitive data with mock data
Delete all the sensitive information
No change needed as the information is needed for application functionality
Move the sensitive information to .gitignore file
Feedback
Question 7
Question text
Identify the services provided by Microservices when compare to Design Patterns.
Code Access
Implementation
Environment
Catalog of Solutions
Feedback
Question 8
Question text
What was seen in application over time, which creates the need of solutions which could also be used in other projects?
Faster time to market
More effective and efficient process
Complexity of application and managing business
Feedback
Question 9
Question text
Which of the following is a unit of work that a role may be asked to perform?
Work?ow
Work Unit
Activity
Task
Feedback
Question 10
Question text
Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.
Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.
A. Determine CI Categories.
B. Determine CM Control Levels.
C. Determine CI Tools.
D. Determine CI Naming Conventions.
E. Audits and Status Reporting
F. Select CIs
A,B,C,D
A,B,E,F
A,B,C,D,F
A,C,D,E
Feedback
Question 11
Question text
In Scrum ban, impediments are
hidden
avoided
fixed
attended
Feedback
Question 12
Question text
What practices should be used when building a complex system ?
Designing for testability
Using a modular design
Using components with tight coupling
Maximizing cohesion between components
Feedback
Question 13
Question text
Which are the external application-oriented devices that provide application security?
HTTPS
API Gateway
Citrix
DAM
WAF
Feedback
Question 14
Question text
Which of the following statement is not CORRECT about code quality metrics?
Tight coupling and low cohesion indicates high quality of code
Cyclomatic complexity measures the complexity of a program.
Comment density is measured by dividing the number of comment lines by the total lines of code.
Checking code duplication.
Feedback
Question 15
Question text
Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?
Memory Optimization
Code Optimization
Memory utilization
Speed Optimization
Feedback
Question 16
Question text
Ms. Tina working in a development of an application. She would like to trigger Jenkins job whenever there is a change detected either in the code or branches or any where in the code repository. Which build trigger option will be more suitable.
GitHub hook trigger for GitSCM polling
Poll SCM
Facilitates periodic build
Trigger builds remotely using scripts
Feedback
Question 17
Question text
Identify the order of steps for Code review process.
a. Conduct a review
b. Plan for a review
c. Resolve review points
d. Validate resolutions
e. Prepare for a review
f. Baseline a software work product
b, f, a, e, c, d
b, e, a, c, d, f
a, c, b, e, f, d
b, f, a, e, c, d
Feedback
Question 18
Question text
For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?
Create new types of exceptions to handle any kind of situation if need be.
Always handle the exception as it is an unusual event that may occur.
Write exceptions in usual flow of program.
No need to document exceptions.
Feedback
Question 19
Question text
Which of the following could be input or output of a task? (Select all that apply.)
Artifact
Outcome
Role
Deliverable
Feedback
Question 20
Question text
Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you?
Choose exactly THREE correct options.
Requirements Baseline
Integration Baseline
Architecture Baseline
Testing Baseline
Feedback
Question 21
Question text
Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.
VSS(Visual SourceSafe)
PVCS(Poly Version Control System)
Mercurial
GitLab
Feedback
Question 22
Question text
How does ADM align to the new ?
Extensions and Context
Vastness
Longevity
Reputability
Feedback
Question 23
Question text
What is the work / assets grouped by business area?
Stage
Activity or Discipline
Workstream
Feedback
Your answer is correct.
Question 24
Question text
Accenture DevOps Platform (ADOP) is a cloud-hosted development and operations environment that can be used for which of the following continuous process. Choose three most appropriate options.
Release
Planning
Monitoring
Testing
Feedback
Question 25
Question text
What is the key benefit of the least privilege approach to security?
Ensures modular, reusable output
it minimized the level of compromise in the event of a security breech
it results in the tasks being completed quicker
Feedback
Question 26
Question text
Identify the state that refers High degree of Coupling.
Big change can break your code and this could have a disastrous effect on your application
Small change can break your code and this could have a disastrous effect on your application
Adding a functionality to your application is difficult and effects your application
Feedback
Question 27
Question text
At home we replace an old CFL bulb to a new LED bulb. Although we change the bulb, we donāt change the functionality. which SOLID principle does it satisfy?
Dependency Inversion Principle
Liskov substitution
Open Closed Principle
Interface segregation
Feedback
Question 28
Question text
Identify the responsibilities of a DBA which includes.
Creating user accounts and assigning passwords
Classifying data
All of the above
Granting and Denying user privileges
Feedback
Question 29
Question text
In Accenture Code Quality Model, fundamental area of Performance and Scalability, select the important considerations from below -
Sensitive data not being used or passed unnecessarily
Object pooling and recycling patterns
Data Encryption and encoding implementation
Parallel processing and concurrency
Feedback
Question 30
Question text
While doing TDD, Which of the following is recommended?
Writing Large or course-grained tests
Writing trivial tests that are too small
Writing exhaustive test cases upfront
Tests to be frequently run for effectiveness
Feedback
Question 31
Question text
Feedback
Question 32
Question text
Which of the following is NOT one of the 9 key principles of GRASP?
High Cohesion
Inheritance
Low Coupling
Creator
Feedback
Question 33
Question text
Manoj from network and Infrastructure team was to update the firewall rules on Saturday night to disable any requests coming from EU region into the banking application as the business was recently closed in EU. However, Manoj missed doing this update while working on other requests. What kind of security threat is the bank now vulnerable to?
Insufficient attack protection
Cross site scripting
Broken Authentication
Security Misconfiguration
Feedback
Question 34
Question text
While doing the daily scrum ceremony, the true spirit of the ceremony should be?
sharing updates among team members
reporting updates to scrum master
sharing updates among scrum masters
reporting updates to product owner
Feedback
Question 35
Question text
Question 36
Question text
What is feature integration sprint?
A sprint outside release for performing cutover activities
First sprint of the release dedicated for planning
A final sprint within the release for performing integration & regression testing
Sprint that can be conducted as and when required for adhoc tasks
Feedback
Question 37
Question text
Joshua being a project manager, need to suggest methods to developers of project so that client become high-performance businesses by delivering high-quality code. Which are they?
Using automated code review tools, if permitted by client
Adhere to Accenture Delivery Methods best practices and guidelines
Implementing the practice of peer reviews.
Follow the Accenture Code Quality Model
Feedback
Question 38
Question text
Which SOLID principle helps the use to develop less coupled code by ensuring the high level modules depend on abstraction rather than concrete implementations of lower level modules?
Interface segregation
Open Closed Principle
Single responsibility
Dependency Inversion Principle
Feedback
Question 39
Question text
What are the three security features match the Database level security ?
Schemas, users, roles
Schemas, users, logins
Logins, Users, Audits
Server Roles, schemas, Audits
Feedback
Question 40
Question text
What are the components of Accenture Delivery Suite(ADS)?
Methods & Estimators, Deliverables, Architecture, Metrics
Methods & Estimators, Deliverables, Process, Metrics
Methods & Estimators, Tools, Architecture, Metrics
Methods & Estimators, Tools, Process, Metrics
Feedback
Question 41
Question text
Swiss Knife is capable enough to perform multiple tasks but if you want to change one of the blade or component of the Swiss Knife, all other components need to be removed as well, meaning has impact. Which SOLID principle does the above quote does not satisfy?
Open Closed Principle
Single responsibility
Interface segregation
Dependency Inversion Principle
Feedback
Question 42
Question text
Which of the following mitigation techniques can be adopted to avoid Broken Authentication & Session Management problems?
1. Encryption
2. Output Encoding
3. Hardening user account management
4. Configuring the appropriate session timeout values
1 and 2
2 and 3
1 and 4
3 and 4
Feedback
Question 43
Question text
John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him?
Name of methods does not matter.
Limit the method size between 100 and 150 code lines by refactoring it.
Group logically related statements for easy readability
It's okay to have hard-coded values in the same code
Feedback
Question 44
Question text
A malicious or unexpected data is somehow programmatically fed into the application leading to compromise of security. What kind of hacking is this?
Injection - Correct
Insecure Direct Object Reference
Broken security or authentication
Cross site scripting
Feedback
Question 45
Question text
In a Build Triggers section of a Jenkins job, Build Periodically is selected and the corresponding value is provided as "2 15 * * 3". What does that mean? Choose the most appropriate answer.
Build Triggers periodically every Wednesday in a week at 2:15 AM as per the local time
Build Triggers periodically every 3rd day of month at 2:15 AM as per the local time
Build Triggers periodically every Wednesday in a week at 3:02 PM as per the local time
Build Triggers periodically for every 3 minutes of every hour on 15th February of every year
Feedback
Question 46
Question text
Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?
People
Process
All of the options
Tools
Feedback
Question 47
Question text
What is the best approach in Design Patterns in coding?
Writing codes with the highest possible coupling and the Lowest possible cohesion.
Writing codes with the lowest possible coupling and the highest possible cohesion.
Writing codes with the highest possible coupling and the highest possible cohesion.
Feedback
Question 48
Question text
Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.
Component testing
Integration Testing
Module Testing
API Testing
Feedback
Question 49
Question text
Identify the state that refers High degree of Coupling
Big change can break your code and this could have a disastrous effect on your application
Adding a functionality to your application is difficult and effects your application
Small change can break your code and this could have a disastrous effect on your application
Feedback
Question 50
Question text
Who is responsible for analyzing the project performance and identifying the corrective and preventive actions?
Scrum Master
Development Team
Project Manager
Product Owner
Feedback
Question 1
Question text
Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.
PVCS(Poly Version Control System)
Mercurial
VSS (Visual SourceSafe)
GitLab
Feedback
Question 2
Question text
John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him ?
Name of methods does not matter.
Group logically related statements for easy readability.
Limit the method size between 100 and 150 code lines by refactoring it.
It's okay to have hard-coded values in the same code.
Feedback
Question 3
Question text
What are the OOP components that is influenced in Design Patterns?
Encapsulation
Inheritance
Abstraction
Polymorphism
Feedback
Question 4
Question text
When we try to push the changes into github.com using git, few git commands need to be executed. Identify the right order of execution of the following git commands.
git pushgit addgit commit -m "Commenting"
git commit -m "Commenting"git pushgit add
git commit -m "Commenting"git addgit push
git addgit commit -m "Commenting"git push
Feedback
Question 5
Question text
Which of these options go well with Feature Boxing?
a) It can span multiple sprints and does not require prioritization of user stories.
b) Lack of prioritization creates the risk that important features may not make it into the sprint.
c) It also means that lower priority items can be completed early and then deemed not as important later.
All a,b and c
Only a and c
Only b and c
Only a and b
Feedback
Question 6
Question text
Mr Robin is supporting a web application which processes 500 requests daily. Suddenly one night when Robin was in night shift he got a P1 ticket. Customer complaining that application is not accessible. Robin and his team started doing analysis and found that approximately 600 requests came in the night and his application was not capable for handling the load. What should team ensure from given and which type of testing needs to be performed.
Accept only minimal request
Load Balancing
Setting Threshold limit on Performance
Auto scaling configurations
Feedback
Question 7
Question text
Who is responsible for analyzing the project performance and identifying the corrective and preventive actions?
Project Manager
Product Owner
Scrum Master
Development Team
Feedback
Question 8
Question text
Shyam created container images considering his project environment requirement. Which cloud based registry enables capability of hosting private and public content(images).
Docker Volumes
Docker Repositories
Docker Container
Docker Hub
Feedback
Question 9
Question text
How does ADM align to the new?
Extensions and Context
Vastness
Longevity
Repeatability
Feedback
Question 10
Question text
Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?
All of the options
People
Process
Tools
Feedback
Question 11
Question text
How does microservices provide small, manageable, and deployable components ?
Micro-service Containers
Micro-service Components
Micro-container Services
Feedback
Question 12
Question text
Which of the following could be input or output of a task? (Select all that apply).
Artifact
Role
Outcome
Deliverable
Feedback
Question 13
Question text
Which of the following statements are correct about coding best practices and coding standards?
Coding best practices and standards are automatically taken care
Deliver High Quality Code
Coding standards improve the consistency and reliability of the code by eliminating personal styles and by bringing symmetry to the application code, irrespective of the developers involved.
Coding best practices are collection of good programming practices and experiences, which involve the use and improvement of coding standards.
Feedback
Question 14
Question text
What are the responsibilities of the Change Control Board? Choose exactly TWO correct options.
Review and authorize changes to the baselines.
Authorize the creation of products from the RTM library.
Represent the interests of the Project Manager and any groups who are not affected by changes to the baselines.
Monitor changes and updates to the project requirements as part of CM.
Feedback
Question 15
Question text
What is the functionality of Data Cohesion in modules of projects ?
If a module is independent of data from other modules
One module may be dependent on another module for data
Both Option 1 and 2
None of them
Feedback
Question 16
Question text
Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?
There are no cyclic dependencies between classes, components or layers.
Dependencies to external libraries are well known.
The average complexity of classes, programs, methods, procedures, or functions is under control.
Components responsibilities are maximized.
Feedback
Question 17
Question text
Mrs. Ana is trying to install Jenkins on a Windows machine. Which among the statements in the options are CORRECT with respect to Jenkins installation.
Both of the above are correct
Neither of the statements are CORRECT
Download jenkins.war file https://jenkins.io and run command java -jar jenkins.war --httpPort = <some-available-port>This is a general approach for installing Jenkins on any operating system.
Download jenkins.msi file from https://jenkins.io and install as we install any other windows softwareThis is a specific approach for installing Jenkins only on Windows Operating System.
Feedback
Question 18
Question text
A graph that shows the progress of work toward a goal line associated with a value on the vertical axis is called?
Progress Bar
Task Chart
Burnup Chart
Burndown Chart
Feedback
Question 19
Question text
Identify the state that refers High degree of Coupling
Adding a functionality to your application is difficult and effects your application
Big change can break your code and this could have a disastrous effect on your application
Small change can break your code and this could have a disastrous effect on your application
Feedback
Question 20
Question text
Which of the following action to be taken before pushing the code into github.com when we have sensitive information in the source code?
No change needed as the information is needed for application functionality
Move the sensitive information to .gitignore file
Replace the sensitive data with mock data
Delete all the sensitive information
Feedback
Question 21
Question text
Complete the statements- Accenture Delivery Suite (or ADS) is our standard delivery framework designed to help our teams "___________" results.
All of the above
smooth, efficient, predictable, reliable and high-quality results
efficient, predictable, reliable and high-quality results
fast, efficient, predictable, reliable and high-quality results
Feedback
Question 22
Question text
Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration Item categories that are quoted below -
A. Project Documentation
B. Architectures
C. Interfaces
D. Designs
E. Source code and Executable code.
Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added. Assume that you are Mr. Vincent and determine few more categories that can be added to the same.
Requirements
Training materials
Metrics and Status Reports
A,B,C,D and E
Feedback
Question 23
Question text
Why are policies required for a project?
Make things easy to understand
All of the above
It helps one understand what needs to be done for that particular column
Everybody is on the same page
Feedback
Question 24
Question text
David, a developer, is working on login component of an application and dealing with sensitive data. Hence before pushing the code to github.com, he moved the sensitive information in a "logindata.cfg" file and added the file name as "login.cfg" by mistake in .gitignore and also pushed the changed to github.com. Later he identified and removed it from repository before anyone uses that file. Is there any risk associated with this?
No, there is no risk as he removed from github.com
Yes, the changes will be reflected in the version history.
All of the Above
Yes, the file is being modified by other team member
Feedback
Question 25
Question text
John is the identified Product Owner of a just commenced Scrum Project. One month into the project, the team don't get enough opportunities to interact with John. The case is that either John can't be reached or even if reached, he spares only very little time with the team. Which of the following can the team adapt to get enough availability of the John - the Product Owner?
i) Identify the REAL Product Owner to do the job
ii) Educate the Product Owner on the expectations
iii) Request the Scrum Master to pitch in for the Product Owner
Only ii and iii
Only i and ii
All of the above
Only i and iii
Feedback
Question 26
Question text
Which of the following are the examples of Headless Web Browser?
Chrome version 59
All of the above
Chrome 60
Nightmare JS
Feedback
Question 27
Question text
Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items. Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.
A. Determine CI Categories.
B. Determine CM Control Levels.
C. Determine CI Tools.
D. Determine CI Naming Conventions.
E. Audits and Status Reporting
F. Select CIs
A,B,E,F
A,B,C,D
A,B,C,D,F
A,C,D,E
Feedback
Question 28
Question text
Peter a Software Professional, is attending DevOps training. The trainer has written some statements that are as listed below. He asked the participants to identify the challenges the DevOps is facing predominantly. Help Peter to identify and answer the question.
A. Developer Vs Operations mindset
B. Transition from legacy infrastructure for deployments to micro-services
C. Resistance to the changes
Both B and C
A, B and C
Only B
Only A
Feedback
Question 29
Question text
________________________________ is a set of technologies, tools and processes that enable enterprises to move into the paradigm of seamless interactivity. Choose the appropriate option.
Accenture Origin Web Platform
Accenture Open Web Platform
Accenture Operations Web Platform
Accenture Operating Web Platform
Feedback
Question 30
Question text
What is the key benefit of the least privilege approach to security?
Ensures modular, reusable output
It minimizes the level of compromise in the event of a security breech
It results in the tasks being completed quicker
Feedback
Question 31
Question text
TrustComm is a telephone network that is in need of bringing up communication infrastructure on Cloud Service Provider's equipment to offer VoIP to their customers. This telephone network must be fault-tolerant.If you are a cloud solution architect, which XaaS you suggest to TrustComm ?
DaaS
BPaaS
STaaS
CaaS
Feedback
Question 32
Question text
Which of the following statement is NOT CORRECT about code quality metrics?
Cyclomatic complexity measures the complexity of a program.
Tight coupling and low cohesion indicates high quality of code
Comment density is measured by dividing the number of comment lines by the total lines of code.
Feedback
Question 33
Question text
Which of the following are not benefits of code optimization techniques?
Improves the organization's performance
Improves the compilation time of an application
Results in code that is easy to understand, reuse, and maintain
Improves the system's performance
Feedback
Question 34
Question text
How does View enhance data security?
By creating one common view for all the tables
By letting users to create a temporary table with any desired data
By only allowing users to access to columns they require instead of entire table
None
Feedback
Question 35
Question text
After what activity we should raise a Change Request(CR)? (Choose the best option)
Any changes to the requirements which is realized in any stage
Any changes to the requirements which come after entering the Design Stage. Since the requirements gets base lined at the end of Analyze stage.
Only functional requirement change needs CR
Any changes made after the design is complete
Feedback
Question 36
Question text
Manoj from network and Infrastructure team was to update the firewall rules on Saturday night to disable any requests coming from EU region into the banking application as the business was recently closed in EU. However, Manoj missed doing this update while working on other requests. What kind of security threat is the bank now vulnerable to?
Broken Authentication
Security Misconfiguration
Cross site scripting
Insufficient attack protection
Feedback
Question 37
Question text
Which of the following mitigation techniques can be adopted to avoid Broken Authentication & Session Management problems?
1. Encryption
2. Output Encoding
3. Hardening user account management
4. Configuring the appropriate session timeout values
1 and 2
2 and 3
3 and 4
1 and 4
Feedback
Question 38
Question text
When you are choosing Custom Vs Package implementation, which factors would you want to consider ?
Budget
Criticality of Requirements
Historical Factors
Product Availability
Feedback
Question 39
Question text
Which global policy of Accenture does ADS meet?
Policy 1100
Policy 1200
Policy 0011
Policy 0012
Feedback
Question 40
Question text
CIs are the work products within the selected categories that the project wants under configuration control. Imagine you are the person for writing the CM Plan who typically works with the Team Leads to document the CIs for the designated categories. Once the team determines the CM categories and the naming convention for each CI, it must maintain a list of the actual CIs. Which role you are playing from below options.
Product Manager
Configuration Manager
Project Manager
Scrum Master Manager
Feedback
Question 41
Question text
While doing the daily scrum ceremony, the true spirit of the ceremony should be?
reporting updates to product owner
reporting updates to scrum master
sharing updates among team members
sharing updates among scrum masters
Feedback
Question 42
Question text
Which of the following is a unit of work that a role may be asked to perform ?
Task
Workflow
Work Unit
Activity
Feedback
Question 43
Question text
What was seen in application over time, which creates the need of solutions which could also be used in other projects?
Complexity of application and managing business
Faster time to market
More effective and efficient process
Feedback
Question 44
Question text
Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?
A. Use functions in code to read sensitive information from cfg file
B. Copy the sensitive information to a cfg file
C. Add the cfg file to .gitignore file
D. Identify the sensitive information in IDE.
DACB
ABDC
DBCA
DBCA
Feedback
Question 45
Question text
Which are the common coding situations that Developers come across frequently from below?
All Of the above
code is inconsistent
Code is not well-formatted
code is not well commented
Feedback
Question 46
Question text
Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.
Integration Testing
Module Testing
API Testing
Component testing
Feedback
Question 47
Question text
Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:
Business Exceptions
Compiler Exceptions
Application Exceptions
Technical Exceptions
Feedback
Question 48
Question text
If any team member, accidentally, pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?
Copied code over to Accenture internal repository hence the code can be protected.
No action needed as the repository is private and have access to only project team members.
Remove the sensitive information from github.com and delete the version history immediately.
Report the issue to ASOC and his/her manager immediately.
Feedback
Question 49
Question text
How to handle alternatives based on the type or how to create plug-gable software components?
All of the above
None of the above
Identity Classes/Types which would have the behavior changing slightly.Assign responsibility to a type for which the behavior varies
Assign responsibility for the behavior using polymorphic operations to the types for which the behavior varies
Feedback
Question 50
Question text
What are the three security features match the Database level security ?
Logins, Users, Audits
Schemas, Users, Roles
Server Roles, Schemas, Audits
Schemas, Users, Logins
Feedback
Question 1
Question text
If any team member, accidentally, pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?
Remove the sensitive information from github.com and delete the version history immediately.
Copied code over to Accenture internal repository hence the code can be protected.
Report the issue to ASOC and his/her manager immediately.
No action needed as the repository is private and have access to only project team members.
Question 2
Question text
Which of the following are not benefits of code optimization techniques?
Improves the organization's performance
Results in code that is easy to understand, reuse, and maintain
Improves the system's performance
Improves the compilation time of an application
Question 3
Question text
Mr.Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.
A. Levels of Control
B. Selecting CIs
C. Determining categories of CM
D. Naming Conventions
E. Configuration Items(CIs)
C,E,D,A,B
C,A,E,D,B
D,E,B,A,C
C,B,D,A,E
Question 4
Question text
Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.
Module Testing
Integration Testing
API Testing
Component testing
Question 5
Question text
Mr. Mark works in a cloud service provider firm. He gathers requirement from a customer. Customer stated that "On demand based computing resources has to be provisioned and de-provisioned rapidly" Which property of cloud computing helps Mr. Mark to address this requirement.
Elasticity
Coupling and Decoupling
Enhancement
Abstraction
Question 6
Question text
Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:
Technical Exceptions
Compiler Exceptions
Business Exceptions
Application Exceptions
Question 7
Question text
Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?
All of the options
Tools
People
Process
Question 8
Question text
Which of the following are the examples of Headless Web Browser?
Nightmare JS
Chrome 60
All of the above
Chrome version 59
Question 9
Question text
What was seen in application over time, which creates the need of solutions which could also be used in other projects?
Faster time to market
Complexity of application and managing business
More effective and efficient process
Question 10
Question text
Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?
A. Use functions in code to read sensitive information from cfg file
B. Copy the sensitive information to a cfg file
C. Add the cfg file to .gitignore file
D. Identify the sensitive information in IDE.
ABDC
DBCA
DACB
DBCA
Question 1
Question text
When an user can fall victim of cross site scripting?
All of the above
User fails to identify the forged links/websites
User clicks on some link which then shouldn't be
User's browser is compromised
Question 2
Question text
Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?
Components responsibilities are maximized.
Dependencies to external libraries are well known.
The average complexity of classes, programs, methods, procedures, or functions is under control.
There are no cyclic dependencies between classes, components or layers.
Question 3
Question text
Which of the following definitions provided by various personnel would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate? EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work. DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control. GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way. JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.
DANIEL's definition
JOE's definition
EVANA's definition
GABRIEL's definition
Question 4
Question text
Identify the responsibilities of a DBA which includes
Granting and Denying user privileges
Classifying data
Creating user accounts and assigning passwords
All of the above
Question 5
Question text
What is the best approach in Design Patterns in coding?
Writing codes with the highest possible coupling and the highest possible cohesion.
Writing codes with the highest possible coupling and the Lowest possible cohesion.
Writing codes with the lowest possible coupling and the highest possible cohesion.
Question 6
Question text
What are the three security features match the Server level security ?
Server roles
All of them
Logins
Audits
Question 7
Question text
Alex is addressing the Scrum Development Team and educating them on 'Courage', which is one of the core values of Scrum. Which of the following is an appropriate explanation that Alex can give his team on 'Courage' ?
i) Courage in sharing facts as it is
ii) Courage to change direction when needed
iii) Courage to support Scrum Values
iv) Courage to not deliver incomplete deliverables
None of the options
Only i, ii and iii
All the options
Only ii, iii and iv
Question 8
Question text
Ms. Tina working in a development of an application. She would like to trigger Jenkins job whenever there is a change detected either in the code or branches or any where in the code repository. Which build trigger option will be more suitable.
Poll SCM
Facilitates periodic build
GitHub hook trigger for GitSCM polling
Trigger builds remotely using scripts
Question 9
Question text
In Accenture Code Quality Model, fundamental area of Performance and Scalability, select the important considerations from below -
Object pooling and recycling patterns
Parallel processing and concurrency
Sensitive data not being used or passed unnecessarily
Data Encryption and encoding implementation
Question 10
Question text
After what activity we should raise a Change Request(CR)? (Choose the best option)
Any changes made after the design is complete
Only functional requirement change needs CR
Any changes to the requirements which come after entering the Design Stage. Since the requirements gets base lined at the end of Analyze stage.
Any changes to the requirements which is realized in any stage
Question 1
Question text
What are the three security features match the Database level security ?
Schemas, Users, Logins
Logins, Users, Audits
Schemas, Users, Roles
Server Roles, Schemas, Audits
Question 2
Question text
What are various lines of businesses that Accenture Delivery Suite (ADS) support?
Technology, Industry, Operations, Security, and Strategy
Technology, Digital, Operations, Security, and Cloud
Technology, Digital, Operations, Security, and Strategy
Technology, Digital, Operations, and Strategy
Question 3
Question text
If we need to apply design patterns, can we do it without the principles of object-oriented programing and standards?
Yes, Design Patterns can be formed by principles, any programing language and standard
Yes, Design Patterns are logical and comprehensive sequencing of elements with procedural principles
No, Design Patterns are logical and comprehensive sequencing of elements with object-oriented principles only
Question 4
Question text
What are the three security features match the Server level security ?
Server roles
Audits
Logins
All of them
Question 5
Question text
How does View enhance data security?
None
By letting users to create a temporary table with any desired data
By only allowing users to access to columns they require instead of entire table
By creating one common view for all the tables
Question 6
Question text
Which steps are recommended to be performed by Development team to optimize testing?
Overwirte the process
Properly report risk
Identify risk areas
Exclude Test plan execution
Question 7
Question text
If any team member, accidentally, pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?
Report the issue to ASOC and his/her manager immediately.
Remove the sensitive information from github.com and delete the version history immediately.
Copied code over to Accenture internal repository hence the code can be protected.
No action needed as the repository is private and have access to only project team members.
Question 8
Question text
Which SOLID principle represents the following statement " the vehicle is an abstract for truck and bike"?
Dependency Inversion Principle
Liskov Substitution Principle
Open/Closed Principle
Single Responsibility Principle
Question 9
Question text
Ms. Julie has to write a project document that proposes the Configuration Management adoption into the project. Which among the below are the benefits you think Ms. Julie can quote in her document?
A. Establishes and maintains the integrity of the items that have been placed under its control
B. Accounts for and reports the progress of development efforts
C. Prevents unauthorized access to assets
D. Coordinates, tracks, and manages change activities
E. Facilitates concurrent development
A and B
A,B,D,E
B and C
All of the above
Question 10
Question text
Mr. John, a project manager wants to trigger the Jenkins pipeline everyday at 10 PM Only if that repository is modified/added with new code. What is the suitable build trigger for the above scenario?
Event-Driven
Post Project Build
Periodic
Poll-Based
Question 11
Question text
"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object"Which pattern is it?
Behavioural Pattern
Structural Pattern
Singleton pattern
Question 12
Question text
Kiran needs help in following the rules that must be followed while creating exception handling strategy. Which rules he must consider from below list ?
Delay till testing to rectify an incorrect exception.
Differentiate between application business and technical exceptions.
Think of a strategy for logging exceptions.
Create meaningful exception messages.
Question 13
Question text
Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?
A. Use functions in code to read sensitive information from cfg file
B. Copy the sensitive information to a cfg file
C. Add the cfg file to .gitignore file
D. Identify the sensitive information in IDE.
DBCA
DACB
ABDC
DBCA
Question 14
Question text
When an user can fall victim of cross site scripting?
User's browser is compromised
User clicks on some link which then shouldn't be
User fails to identify the forged links/websites
All of the above
Question 15
Question text
A team has completed 10 Sprints and moving to the 11th Sprint. Till Sprint 10, the team has achieved an average of 50 story points per sprint. The same is projected as their velocity for the upcoming sprints with the Client. What is this approach called?
Commitment Driven Velocity
Commitment Driven Sprint Planning
Velocity Driven Sprint Planning
Velocity Driven Commitment
Question 16
Question text
What are the different generic techniques followed in code optimization for independent platform?
Using memory efficient routines
Cache optimization techniques
Data-level parallelism
Reducing the number of conditions.
Question 17
Question text
While designing the application, what is used to graphically represent application components and services; depicts the application boundaries and layering of components ?
Architecture Blueprint
Interfaces
Service Design
Design Pattern
Question 18
Question text
Code Review process involves which of the following steps:
Resolve review points
Plan for a review
Prepare for a review
Baseline a software products
Question 19
Question text
Question 20
Question text
Which areas of a code layout must be considered to reduce comments on methods and reduce errors?
Naming conventions
Blocks of code
Indentation
The use of white space
Question 21
Question text
What is feature integration sprint?
A final sprint within the release for performing integration & regression testing
First sprint of the release dedicated for planning
Sprint that can be conducted as and when required for adhoc tasks
A sprint outside release for performing cutover activities
Question 22
Question text
Identify the responsibilities of a DBA which includes
Granting and Denying user privileges
Creating user accounts and assigning passwords
Classifying data
All of the above
Question 23
Question text
Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?
Code Optimization
Memory Utilization
Speed Optimization
Memory Optimization
Question 24
Question text
Which of the following tasks will be performed by the Configuration Manager?
Choose exactly THREE correct options.
Attends and facilitates CCB meetings.
Tracks and Reports on CM status and audits.
Makes sure that project complies with CM standards and procedures.
Plans Configuration Management
Question 25
Question text
How did object-oriented programming systems handle complexity better than procedural process?
Handling each task in isolation ensuring that we have the right degree of coupling in cohesion
All the procedures were treated as an identifiable behavior of an object
Tasks were divided into a number of sub tasks
Question 26
Question text
Which of the following definitions provided by various personnel would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate? EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work. DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control. GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way. JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.
EVANA's definition
JOE's definition
GABRIEL's definition
DANIEL's definition
Question 27
Question text
Alex is addressing the Scrum Development Team and educating them on 'Courage', which is one of the core values of Scrum. Which of the following is an appropriate explanation that Alex can give his team on 'Courage' ?
i) Courage in sharing facts as it is
ii) Courage to change direction when needed
iii) Courage to support Scrum Values
iv) Courage to not deliver incomplete deliverables
Only i, ii and iii
Only ii, iii and iv
None of the options
All the options
Question 28
Question text
Mr Alex is required to do API testing for his application. Since Alex does have access to source code and know about how source code was implemented - kind of white box testing. Which of the following factors needs to be ensured by Alex while performing API testing?
Kind of data, or parameters, or arguments that API function requires as input
API Data Flow
API testing needs Sandbox Environments
Valid datatype supported
Question 29
Question text
For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?
Always handle the exception as it is an unusual event that may occur.
Write exceptions in usual flow of program.
Create new types of exceptions to handle any kind of situation if need be.
No need to document exceptions.
Question 30
Question text
Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you? Choose exactly THREE correct options.
Integration Baseline
Testing Baseline
Requirements Baseline
Architecture Baseline
Question 31
Question text
What guidelines should be followed for creating the Accenture coding standards?
Must be created after the build stage
Coding Standards should be easy to understand
Should be agreed upon across project teams spanning globally.
Multiple developers rewrite each other's code to match their personal styles
Question 32
Question text
In a Build Triggers section of a Jenkins job, Build Periodically is selected and the corresponding value is provided as "2 15 * * 3". What does that mean?
Choose the most appropriate answer.
Build Triggers periodically every Wednesday in a week at 3:02 PM as per the local time
Build Triggers periodically every 3rd day of month at 2:15 AM as per the local time
Build Triggers periodically every Wednesday in a week at 2:15 AM as per the local time
Build Triggers periodically for every 3 minutes of every hour on 15th February of every year
Question 33
Question text
When we try to push the changes into github.com using git, few git commands need to be executed. Identify the right order of execution of the following git commands.
git commit -m "Commenting"git pushgit add
git addgit commit -m "Commenting"git push
git commit -m "Commenting"git addgit push
git pushgit addgit commit -m "Commenting"
Question 34
Question text
Mr.Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.
A. Levels of Control
B. Selecting CIs
C. Determining categories of CM
D. Naming Conventions
E. Configuration Items(CIs)
C,A,E,D,B
C,E,D,A,B
C,B,D,A,E
D,E,B,A,C
Question 35
Question text
What is the key benefit of the least privilege approach to security?
It results in the tasks being completed quicker
Ensures modular, reusable output
It minimizes the level of compromise in the event of a security breech
Question 36
Question text
What are the components of Accenture Delivery Suite (ADS)?
Methods & Estimators, Tools, Architecture, Metrics
Methods & Estimators, Deliverables, Architecture, Metrics
Methods & Estimators, Tools, Process, Metrics
Baseline a software products
Question 37
Question text
What are the ADM 5 main focus areas?
Planning
Operations
Management
Development
Question 38
Question text
ADOP is built on a ___________ infrastructure
Ansible
Kubernetes
Docker
SaltStack
Question 39
Question text
Question 40
Question text
What relationship(s) can a work product have to task?
Optional input, mandatory input, primary output and secondary output.
Input only
Input and Output
Output only
Question 41
Question text
Which type of risk analysis agile team uses to rank risks by evaluating their probability of occurrence and impact?
Quantitative analysis
Assumptions analysis
Risk Burndown Chart
Qualitative analysis
Question 42
Question text
Question 43
Question text
Which of the following is CORRECT about a Proxy Product Owner?i) Proxy PO comes into picture when PO is absentii) Proxy PO has all the power and authority as that of a POiii) Proxy PO can make 'Go' or 'No-Go' decisions with the teams
Only ii and iii
Only iii
Only i
All the options
Question 44
Question text
Identify the services provided by Microservices when compare to Design Patterns.
Code Access
Catalog of Solutions
Implementation
Environment
Question 45
Question text
The most encouraged time of day to hold a Scrum Daily Meeting is ___________________.
Immediately after lunch
The beginning of the day
At 7:00 PM
At 4:30 PM
Question 46
Question text
Which of the following is a set of automated processes that allows developers and operations to reliably and efficiently compile, build and deploy applications or services to production environments or platforms?
Accenture DevOps Platform
DevOps Environment Pipeline
Continuous Integration
DevOps Delivery Pipeline
Question 47
Question text
How to ensure reusability of code in a project?
No dependable modules
Having highly dependable blocks
Having loosely coupled system
Sometimes you do this by breaking it into multiple independent blocks
Question 48
Question text
What is the best approach in Design Patterns in coding?
Writing codes with the highest possible coupling and the Lowest possible cohesion.
Writing codes with the highest possible coupling and the highest possible cohesion.
Writing codes with the lowest possible coupling and the highest possible cohesion.
Question 49
Question text
Complete the statement: Application Design can be done using ______
Packaged Only
Always Both
Custom Only
Custom/Packaged/Both
Question 50
Question text
What is the website to access Accenture Delivery Suite(ADS)?
https://ads.acceture.com
https://in.accenture.com/accenturedeliverysuite/
https://accenturedeliverysuite.accenture.com
https://methodology.accenture.com
Question 1
Question text
Cameroon is a Middle African country. The government of this country has lot of data on paper media and it is very crucial and essential data. It must be retained for centuries. The country has decided to go for Cloud services and taken a service from very well-known cloud service platform. If you are a cloud solution architect, which XaaS you suggest to the governament of Cameroon?
CaaS
BPaaS
DaaS
STaaS
Feedback
Question 2
Question text
In which situation a looping error will not occur?
Loops are terminated incorrectly or not terminated at all.
Loop conditions are initialized incorrectly or not at all.
Improper nesting occurs.
Loops variables are initialized correctly.
Feedback
Question 3
Question text
How did object-oriented programing systems handle complexity better than procedural process?
Tasks were divided into a number of sub tasks
Handling each task in isolation ensuring that we have the right degree of coupling in cohesion
All the procedures were treated as an identifiable behavior of an object.
Feedback
Question 4
Question text
Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.
Integration Testing
Component testing
Module Testing
API Testing
Feedback
Question 5
Question text
A malicious or unexpected data is somehow programmatically fed into the application leading to compromise of security. What kind of hacking is this?
Broken security or authentication
Insecure Direct Object Reference
Cross site scripting
Injection - Correct
Feedback
Question 6
Question text
"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object" Which pattern is it?
Singleton pattern
Structural Pattern
Behavioral Pattern
Feedback
Question 7
Question text
Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.
Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.
A. Determine CI Categories.
B. Determine CM Control Levels.
C. Determine CI Tools.
D. Determine CI Naming Conventions.
E. Audits and Status Reporting
F. Select CIs
A,C,D,E
A,B,E,F
A,B,C,D,F
A,B,C,D
Feedback
Question 8
Question text
Which of the following definitions provided by various personnel's would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate?
EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work.
DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control .
GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way.
JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.
JOE's definition
GABRIEL's definition
EVANA's definition
DANIEL's definition
Feedback
Question 9
Question text
To secure the http messages in the API calls, its necessary to:
All the above
implement identity management
Use cryptography
avoid hardcoding any sensitive data in the messages
Feedback
Question 10
Question text
Which of the following is not a Scrum Artifact?
Release Backlog
Sprint Backlog
Product Backlog
Definition of Done
Feedback
+
++ Coming more...
Comments
Post a Comment