Skip to main content

Delivery Foundation Academy (DFA) MCQs

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Every sprint starts with _________ and ends with ___________ and ______________.

Select one:
a.

1. Sprint planning 2. Sprint Review 3. Sprint Retrospective

b.

1. Daily Stand Up 2. Sprint Review 3. Sprint retrospective

c.

1. Sprint Review 2. Sprint planning 3. Sprint Retrospective

d.

1. Sprint Retrospective 2. Sprint Review 3. Sprint planning

Feedback

Question 2

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

As part of cloud application security, which of the following are the identity and access solutions provided by the cloud service providers?

Select one or more:
a.

Role based authentication

b.

Single Sign-On/Off

c.

Federation and Identity Provision

d.

Multifactor Authentication

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration

Item categories that are quoted below -

A. Project Documentation

B. Architectures

C. Interfaces

D. Designs

E. Source code and Executable code.

Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added.

Assume that you are Mr. Vincent and determine few more categories that can be added to the same.

Select one or more:
a.

Training materials

b.

Databases that include processed data

c.

Metrics and Status Reports

d.

Requirements

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the state that refers High degree of Coupling

Select one:
a.

Adding a functionality to your application is difficult and effects your application

b.

Small change can break your code and this could have a disastrous effect on your application

c.

Big change can break your code and this could have a disastrous effect on your application

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

John is the identified Product Owner of a just commenced Scrum Project. One month into the project, the team don't get enough opportunities to interact with John. The case is that either John can't be reached or even if reached, he spares only very little time with the team. Which of the following can the team adapt to get enough availability of the John - the Product Owner?

i) Identify the REAL Product Owner to do the job

ii) Educate the Product Owner on the expectations

iii) Request the Scrum Master to pitch in for the Product Owner

Select one:
a.

Only i and iii

b.

Only i and ii

c.

Only ii and iii

d.

All i, ii and iii

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object" Which pattern is it?

Select one:
a.

Behavioral Pattern

b.

Structural Pattern

c.

Singleton pattern

Feedback

Question 7

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

In each daily scrum, within a sub-team, ends by designating one member as an ambassador to go and participate in a daily scrum ceremony with ambassadors from other teams. What is that ceremony called?

Select one:
a.

Sprint Review

b.

Daily Scrum

c.

Scrum of Scrum

d.

Super Scrum ceremony

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are guidelines that needs to be followed for managing bottlenecks during optimization?

Select one or more:
a.

Do not cache the result.

b.

Do performance testing on critical methods carrying business logic

c.

Identifying benefits of implementing complex algorithm does not out weigh the time taken to create it.

d.

Increase memory space to make the program efficient in terms of speed.

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?

Select one or more:
a.

There are no cyclic dependencies between classes, components or layers.

b.

Components responsibilities are maximized.

c.

The average complexity of classes, programs, methods, procedures, or functions is under control.

d.

Dependencies to external libraries are well known.

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the functionality of Data Cohesion in modules of projects ?

Select one:
a.

One module may be dependent on another module for data

b.

If a module is independent of data from other modules

c.

Both Option 1 and 2

d.

None of them

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Kiran needs help in following the rules that must be followed while creating exception handling strategy. Which rules he must consider from below list?

Select one or more:
a.

Think of a strategy for logging exceptions

b.

Differentiate between application business and technical exceptions.

c.

Delay till testing to rectify an incorrect exception.

d.

Create meaningful exception messages.

Feedback

Question 12

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the function of a federated identity?

Select one:
a.

Enables users to be certified to use specific applications

b.

Enables users of one secure domain to securely access resources in another domain seamlessly

c.

Enables users to gain access to an application with a federated user name

d.

Enables users of an application to use the same authentication for other application by the same application

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The Scrum Development Team is getting ready to start their Agile execution. In the current release, 8 sprints have been planned. The team wants to give the product owner, a picture of what are they planning to do in the current release. To start this, they need to decide on the goal of each sprint. When are the Sprint goals identified?

Select one:
a.

As and when needed. No constraints.

b.

Once before Sprint 1 and another one before Sprint 5

c.

Before the start of Sprint 1

d.

During planning of the respective sprint

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him?

Select one or more:
a.

It's okay to have hard-coded values in the same code

b.

Limit the method size between 100 and 150 code lines by refactoring it.

c.

Group logically related statements for easy readability

d.

Name of methods does not matter.

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are some of the ways test-driven development can benefit a project compared to other technique?

Select one or more:
a.

Compresses the available set of test tools

b.

Reduces the frequency of releases

c.

Supports continuous integration

d.

Enhances collaboration among various stakeholders

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What happens when the sprint is cancelled?

Select one:
a.

The completed Sprint Backlog items are evaluated for a release, and incomplete items are discarded.

b.

The complete Sprint Backlog is put back to the Product Backlog.

c.

The completed Sprint Backlog items are evaluated for a release, and incomplete items are put back into the Product Backlog.

d.

The Scrum team disbands immediately.

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Ms. Julie has to write a project document that proposes the Configuration Management adoption into the project. Which among the below are the benefits you think Ms. Julie can quote in her document?

A. Establishes and maintains the integrity of the items that have been placed under its control

B. Accounts for and reports the progress of development efforts

C. Prevents unauthorized access to assets

D. Coordinates, tracks, and manages change activities

E. Facilitates concurrent development

Select one:
a.

A, B, C and D

b.

A and B

c.

A,B,D,E

d.

B and C

e.

A,B,C,D and E

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are some features a tool should have to facilitate TDD Agile database development

Select one or more:
a.

Able to run tests in transactions to keep them independent

b.

Override database errors to track changes between revisions

c.

Implement tests in a built-in database testing language

d.

Provide the ability to fake tables and views

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In which situation a looping error will not occur?

Select one:
a.

Loops are terminated incorrectly or not terminated at all.

b.

Loops variables are initialized correctly.

c.

Improper nesting occurs.

d.

Loop conditions are initialized incorrectly or not at all.

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

CIs are the work products within the selected categories that the project wants under configuration control. Imagine you are the person for writing the CM Plan who typically works with the Team Leads to document the CIs for the designated categories. Once the team determines the CM categories and the naming convention for each CI, it must maintain a list of the actual CIs. Which role you are playing from below options.

Select one:
a.

Product Manager

b.

Project Manager

c.

Configuration Manager

d.

Scrum Master Manager

Feedback

Question 21

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the components of Accenture Delivery Suite(ADS)?

Select one:
a.

Methods & Estimators, Deliverables, Process, Metrics

b.

Methods & Estimators, Tools, Process, Metrics

c.

Methods & Estimators, Tools, Architecture, Metrics

d.

Methods & Estimators, Deliverables, Architecture, Metrics

Feedback

Question 22

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

What are the two important objectives when adding testing code to a project?

Select one or more:
a.

Run integration tests on the final release to ensure test code is present

b.

Ensure test-related code is isolated

c.

Use normal design criteria to embed test code directly into units

d.

Prevent test code from being compiled into production code

Feedback

Question 23

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

George is a project manager handling a software project and suggest their team members to use distributed version control for software configuration management. Guide the team members of George to choose the Distributed Version Control system from the given options.

Choose exactly 2 CORRECT ANSWERS.

Select one or more:
a.

Subversion (SVN)

b.

GIT

c.

Mercurial

d.

Perforce

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following definitions provided by various personnel's would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate?

EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work.

DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control .

GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way.

JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.

Select one:
a.

EVANA's definition

b.

JOE's definition

c.

DANIEL's definition

d.

GABRIEL's definition

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the OOP components that is influenced in Design Patterns?

Select one or more:
a.

Encapsulation

b.

Inheritance

c.

Polymorphism

d.

Abstraction

Feedback

Question 26

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Which is the task performed as per ADM for Custom Development?

Select one:
a.

"- Develop and Application prototype and conduct Conference Room Pilot to validate the configuration Design explore configuration gap resolution options - Design reports, interfaces, conversions, extensions, forms and workflow to fill the packaged software functional gaps"

b.

"- Produce an application design pack for the solution consisting of the page specification, domain class model, component/class design, data conversion design, physical database design and, other design deliverables. - Develop and Application prototype and conduct Conference Room Pilot to validate the configuration design, explore configuration gap resolution options"

c.

"- Produce an application design pack for the solution consisting of the page specification, domain class model, component/class design, data conversion design, physical database design and, other design deliverables. - Derive the application design from and ensure the consistency of the design deliverables with the application requirements, the use-cases, business rules, and other requirements-related deliverables"

d.

"- Design Packaged Software configuration to meet the Business Process Design and the Application requirements - Develop and Application prototype and conduct Conference Room Pilot to validate the configuration design, explore configuration gap resolution options"

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?

Select one:
a.

Speed Optimization

b.

Memory utilization

c.

Memory Optimization

d.

Code Optimization

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following could be input or output of a task? (Select all that apply.)

Select one or more:
a.

Role

b.

Outcome

c.

Artifact

d.

Deliverable

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the usage of sandboxes in Cloud Application Security.

Select one or more:
a.

Discover the impact of the applied malware

b.

Discover application errors

c.

Discover attack vectors and agents

d.

Discover peek application performance

e.

Discover vulnerabilities

Feedback

Question 30

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.

A. Levels of Control.

B. Selecting CIs

C. Determining categories of CM

D. Naming Conventions

E. Configuration Items(CIs)

Select one:
a.

D,E,B,A,C

b.

C,A,E,D,B

c.

C,E,D,A,B

d.

C,B,D,A,E

Feedback

Question 31

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Complete the statements- Accenture Delivery Suite (or ADS) is our standard delivery framework designed to help our teams "___________" results.

Select one:
a.

efficient, predictable, reliable and high-quality results

b.

fast, efficient, predictable, reliable and high-quality results

c.

smooth, efficient, predictable, reliable and high-quality results

d.

workable, smooth, reliable and high-quality results

Feedback

Question 32

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Why are WIP limits important?

Select one:
a.

Because manager says so

b.

To tie up the system

c.

To make things Complex

d.

To ensure smooth flow of things through the system

Feedback

Question 33

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Which of the following is the description for the Level 1 OWASP threat assessment maturity practice?

Select one:
a.

Identify and understand the high level threats to the organization and individual projects

b.

Map compensating controls to each threat against the internal and third-party software

c.

Increase the accuracy of the threat assessment and improve granularity of per-project understanding.

Feedback

Question 34

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How did object-oriented programing systems handle complexity better than procedural process?

Select one:
a.

Tasks were divided into a number of sub tasks

b.

All the procedures were treated as an identifiable behavior of an object.

c.

Handling each task in isolation ensuring that we have the right degree of coupling in cohesion

Feedback

Question 35

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Digital asset management comes in the form of a software or appliance device that can be used on which of the following?
Select one or more:
a.
on-premises
b.
cloud-based model
c.
All electronic gadgets
d.
Mobiles and laptops

Feedback

Question 36

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the benefits of adopting the security-centric approach to develop the applications in the cloud?

Select one:
a.

Early identification and mitigation of security vulnerabilities

b.

Reuse of the security stratergies and tools

c.

Identify system configuration issues

d.

All the above

Feedback

Question 37

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is not the right answer for Packaged or Custom development ?

Select one:
a.

Packaged Software is owned solely by the business who creates it

b.

Custom software maps to the client's business process and contains key features necessary to a specific business function

c.

Packaged Software is typically less expensive due to minimal, If any, development time

d.

Packaged Software is ready-made and available for sale, lease or license to the public

Feedback

Question 38

Not answered
Marked out of 1.00
Flag question

Question text

Prof. Kevin is writing a white paper on a new survey he has made. To support his survey, he has define the statements which are given below in correct order. Arrange the below statements that depicts DevOps process and help Prof. Kevin.

1. The build software product or feature(s) will be tested thoroughly by the testing team to ensure that the quality build is ready for deployment anytime.

2. Once the deployments is done, the working product would be kept under surveillance to check fitness of the product under different circumstances

3. The code committed by the all the team members is integrated into version control system, automated build process is initiated and finally results in a build whose source code is evaluated thoroughly

4. The deployment may be automated or manual. If the deployment is automated, CD means Continuous Deployment otherwise Continuous Delivery.

Select one or more:
a.

3,1,4 and 2

b.

3,4,2 and 1

c.

4,3,2 and 1

d.

3,1,2 and 4

Feedback

Question 39

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:

Select one:
a.

Application Exceptions

b.

Compiler Exceptions

c.

Technical Exceptions

d.

Business Exceptions

Feedback

Question 40

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A team is referring to the latest version of the product backlog to work on the deliverables. Who is responsible for the content, availability and ordering of the items in the product backlog?

Select one:
a.

Scrum Master

b.

Project Manager

c.

Product Owner

d.

Scrum Development Team

Feedback

Question 41

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How to ensure reusability of code in a project?

Select one or more:
a.

No dependable modules

b.

Having highly dependable blocks

c.

Having loosely coupled system

d.

Sometimes you do this by breaking it into multiple independent blocks

Feedback

Question 42

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which statement best describes the use of Acceptance TDD?

Select one:
a.

Tests from the user's point of view

b.

Passes acceptance of the tests unto the end-user

c.

Tests from the managers point of overview

d.

Tests from the customer view without requiring the customer

Feedback

Question 43

Correct
Mark 1.00 out of 1.00
Flag question

Question text

David, a developer, is working on login component of an application and dealing with sensitive data. Hence before pushing the code to github.com, he moved the sensitive information in a "logindata.cfg" file and added the file name as "login.cfg" by mistake in .gitignore and also pushed the changed to github.com. Later he identified and removed it from repository before anyone uses that file.

Is there any risk associated with this?

Select one:
a.

No, the file is a cfg file as most of the team members have their own cfg file

b.

Yes, the file is being modified by other team member

c.

No, there is no risk as he removed from github.com

d.

Yes, the changes will be reflected in the version history.

Feedback

Question 44

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Arrange the following in the right sequence to achieve TDD:

i) Repeat over again until and run the test

ii)Run the unit tests

iii)Write a single unit test describing an aspect of the program

iv)Look at which of those tests should fail

v) Write just enough code

vi) Refactor the code

Select one:
a.

iv, iii, ii, vi, v, i

b.

iii, ii, iv, v, vi, i

c.

ii, iii, I, iv, v, vi

d.

v, vi, iii, ii, iv, i

Feedback

Question 45

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Consider the identity and access management solutions by various providers as given below.

Google Apps SSO;

Microsoft SQL Server Integrated Security;

Microsoft Office Online;

The above solutions comes under which type of identity and access management solutions?

Select one:
a.

Federated identity

b.

Multifactor Authentication

c.

Single Sign-On/Off (SSO) identity

d.

Microsoft Active directory

Feedback

Question 46

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Philia, a developer, is worked on a finance project in Accenture. Her Project started moving their Infrastructure to cloud and hence forth all the requirements will be provided as service from cloud provider. Which of the following cloud service model will be helpful for Philia here?

Select one:
a.

Infrastructure As Service

b.

Code As Service

c.

Software As Service

d.

Platform As Service

Feedback

Question 47

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How does ADM align to the new ?

Select one or more:
a.

Extensions and Context

b.

Reputability

c.

Longevity

d.

Vastness

Feedback

Question 48

Correct
Mark 1.00 out of 1.00
Flag question

Question text

For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?

Select one or more:
a.

Create new types of exceptions to handle any kind of situation if need be.

b.

Always handle the exception as it is an unusual event that may occur.

c.

Write exceptions in usual flow of program.

d.

No need to document exceptions.

Feedback

Question 49

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the logical grouping of elements that have single major outcome/ business result?

Select one:
a.

Stage

b.

Workstream

c.

Activity or Discipline

Feedback

Question 50

Partially correct
Mark 0.50 out of 1.00
Remove flag

Question text

When you are choosing Custom Vs Package implementation, which factors would you want to consider ?

Select one or more:
a.

Criticality of Requirements

b.

Historical Factors

c.

Budget

d.

Product Availability

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which statement best describes the use of Acceptance TDD?

Select one:
a.

Tests from the user's point of view

b.

Tests from the managers point of overview

c.

Tests from the customer view without requiring the customer

d.

Passes acceptance of the tests unto the end-user

Feedback

Question 2

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the functionality of Data Cohesion in modules of projects ?

Select one:
a.

One module may be dependent on another module for data

b.

None of them

c.

Both Option 1 and 2

d.

If a module is independent of data from other modules

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following statements are correct about coding best practices and coding standards?

Select one or more:
a.

Coding best practices are collection of good programming practices and experiences, which involve the use and improvement of coding standards.

b.

Coding standards improve the consistency and reliability of the code by eliminating personal styles and by bringing symmetry to the application code, irrespective of the developers involved.

c.

Coding best practices and standards are automatically taken care

d.

Deliver High Quality Code

Feedback

Question 4

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

What are the major challenges faced when performing test-driven database development?

Select one or more:
a.

Layer dependencies being rigid

b.

Schema changes breaking tests

c.

Test framework using mock objects

d.

Record availability causing database failures

Feedback

Question 5

Partially correct
Mark 0.33 out of 1.00
Remove flag

Question text

Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you?

Choose exactly THREE correct options.

Select one or more:
a.

Integration Baseline

b.

Architecture Baseline

c.

Testing Baseline

d.

Requirements Baseline

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Why are policies required for a project?

Select one:
a.

Make things easy to understand

b.

It helps one understand what needs to be done for that particular column

c.

Everybody is on the same page

d.

All of the above

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Joshua being a project manager, need to suggest methods to developers of project so that client become high-performance businesses by delivering high-quality code. Which are they?

Select one or more:
a.

Adhere to Accenture Delivery Methods best practices and guidelines

b.

Implementing the practice of peer reviews.

c.

Follow the Accenture Code Quality Model

d.

Using automated code review tools, if permitted by client

Feedback

Question 8

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Kiran needs help in following the rules that must be followed while creating exception handling strategy. Which rules he must consider from below list?

Select one or more:
a.

Differentiate between application business and technical exceptions.

b.

Delay till testing to rectify an incorrect exception.

c.

Create meaningful exception messages.

d.

Think of a strategy for logging exceptions

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How does View enhance data security?

Select one:
a.

None

b.

By creating one common view for all the tables

c.

By letting users create a temporary table with any desired data

d.

By only allowing users access to columns they require instead of entire table

Feedback

Question 10

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

What are the OOP components that is influenced in Design Patterns?

Select one or more:
a.

Inheritance

b.

Polymorphism

c.

Abstraction

d.

Encapsulation

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the major difference between the Product Backlog and the Sprint Backlog?

Select one:
a.

The Sprint Backlog is owned by the Product Owner.

b.

The Product Backlog is a subset of the Sprint Backlog.

c.

The Sprint Backlog is a subset of the Product Backlog.

d.

The Product Backlog is equal to the Sprint Backlog.

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is SSO in terms of cloud security mean?

Select one:
a.

Server security online

b.

Single sign on/off

c.

second service ongoing

d.

Security Service organization

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Alex is addressing the Scrum Development Team and educating them on 'Courage', which is one of the core values of Scrum. Which of the following is an appropriate explanation that Alex can give his team on 'Courage'?

i) Courage in sharing facts as it is

ii) Courage to change direction when needed

iii) Courage to support Scrum Values

iv) Courage to not deliver incomplete deliverables

Select one:
a.

Only ii, iii and iv

b.

None of the options

c.

Only I, ii and iii

d.

All the options

Feedback

Question 14

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?

Select one or more:
a.

The average complexity of classes, programs, methods, procedures, or functions is under control.

b.

Dependencies to external libraries are well known.

c.

There are no cyclic dependencies between classes, components or layers.

d.

Components responsibilities are maximized.

Feedback

Question 15

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Identify the steps involved in Test-Driven Development Cycle.
Select one:
a.
Write code that should pass the tests or unit tests
b.
Write a test or unit test for some aspect of the program
c.
Run the written tests or unit tests
d.
Look at which tests or unit tests fail

Question 16

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

What are some features a tool should have to facilitate TDD Agile database development

Select one or more:
a.

Provide the ability to fake tables and views

b.

Implement tests in a built-in database testing language

c.

Override database errors to track changes between revisions

d.

Able to run tests in transactions to keep them independent

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which GRASP principle talks about, who should be responsible for creating new objects or use other objects in your program or your system ?

Select one:
a.

Creator

b.

High Cohesion

c.

Controller

d.

Low Coupling

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Let's consider a scenario, when ABC Project team members are developing microservices, and they are checking out their code on tools like GitHub. Which of the following tool helps them to observe any commit into source code management or GitHub and then perform build and test the code automatically?

Select one:
a.

Maven

b.

Selenium and Maven

c.

Git

d.

Jenkins

Feedback

Question 19

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following are phases of NIST SDLC model?

A. The initiation phase

B. Functional Specification phase

C. Acquisition and development of the solution

D. The Maintenance phase

E. The operations and maintenance phase

Select one:
a.

ABCE

b.

ACE

c.

ABE

d.

ABCD

Feedback

Question 20

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In a real-world system where we will hundreds of classes and objects which perform thousands of actions. How will assign the responsibility to each class or object?

Select one:
a.

Create an Abstract class and implement based on the responsibility

b.

Group the objects into classes which will be giving the information to all the subclasses on their responsibility

c.

Assign a responsibility to the Information Expert, which will have the necessary information to fulfill the responsibilities.

Feedback

Question 21

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

How did object-oriented programming systems handle complexity better than procedural process?

Select one:
a.

Handling each task in isolation ensuring that we have the right degree of coupling in cohesion

b.

All the procedures were treated as an identifiable behavior of an object

c.

Tasks were divided into a number of sub tasks

Feedback

Question 22

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the logical grouping of elements that have single major outcome/ business result?

Select one:
a.

Workstream

b.

Activity or Discipline

c.

Stage

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

People if need to change the appearance change the hair style, clothes and appeals but may the person itself. Which SOLID principle does the above quote satisfy?

Select one:
a.

Single responsibility

b.

Open Closed Principle

c.

Interface segregation

d.

Dependency Inversion Principle

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sprints are usually _______________.

Select one:
a.

Feature Boxing

b.

Time Boxing

c.

Epic Boxing

d.

Theme Boxing

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the order of steps for Code review process.

a. Conduct a review

b. Plan for a review

c. Resolve review points

d. Validate resolutions

e. Prepare for a review

f. Baseline a software work product

Select one:
a.

a, c, b, e, f, d

b.

b, e, a, c, d, f

c.

b, f, a, e, c, d

d.

b, f, a, e, c, d

Feedback

Question 26

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.

Select one or more:
a.

GitLab

b.

PVCS(Poly Version Control System)

c.

VSS(Visual SourceSafe)

d.

Mercurial

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.

Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.

A. Determine CI Categories.

B. Determine CM Control Levels.

C. Determine CI Tools.

D. Determine CI Naming Conventions.

E. Audits and Status Reporting

F. Select CIs

Select one:
a.

A,B,C,D,F

b.

A,C,D,E

c.

A,B,C,D

d.

A,B,E,F

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

John, the product owner, in consultation with his stakeholders, has arrived at four features that are of same priority. The stakeholders are of the opinion that all those features are of equal significance. Which of the following can John do, in this context?

Select one:
a.

Consult with the Development Team and still arrive at a priority among these features

b.

Ask the development team to park these features until the stakeholders agree on to a priority order

c.

Randomly pick and implement one feature after the other since all are of same priority

d.

Tell the Development Team that all features need to be worked on in parallel

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

What relationship(s) can a work product have to task?

Select one:
a.

Output only

b.

Input and Output

c.

Input only

d.

Optional input, mandatory input, primary output and secondary output.

Feedback

Question 30

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

Code Review process involves which of the following steps:

Select one or more:
a.

Never conduct a review

b.

Resolve review points

c.

Plan for a review

d.

Prepare for a review

e.

Baseline a software products

Feedback

Question 31

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are some of the ways test-driven development can benefit a project compared to other technique?

Select one or more:
a.

Reduces the frequency of releases

b.

Supports continuous integration

c.

Enhances collaboration among various stakeholders

d.

Compresses the available set of test tools

Feedback

Question 32

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A Scrum Development Team is supposed to be 'Self Organized' that would mean.

Select one:
a.

They are experts in different technologies

b.

They can identify their own goals and make decisions on their own

c.

They can accept decisions made on their behalf by Scrum Master

d.

They can accept decisions made on their behalf by Product Owner

Feedback

Question 33

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the correct order of risk investigation and rating process.

A. Probability that that risk could be realized against an asset

B. Identification of potential risk areas

C. Risk investigation and rating process

D. Severity level of the risk

E. Defining the risk impact

F. Mitigation listing

Select one:
a.

BAEDFC

b.

BDECFA

c.

ADFCBE

d.

FDCABE

Feedback

Question 34

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

What is considered by the developers in regard to RESTFul API deployment?

Select one or more:
a.

Protection Against Injection

b.

Size of the application

c.

Use API Keys

d.

Operation

e.

Use HTTPS identity Authentication

Feedback

Question 35

Correct
Mark 1.00 out of 1.00
Flag question

Question text

George was attending an interview.

He got a question stating - "Which among the below is/are TRUE with respect to DevOps?"

The statements are given as in the options - What could be the answer of Mr. George?

CHOOSE TWO CORRECT ANSWERS.

Select one or more:
a.

DevOps is applicable only in certain areas of software development. It is applicable for only few technologies. DevOps means automation.

b.

DevOps is a way to work more predictively, productively to increase the quality of outcomes. This helps to achieve the product early in to the market.

c.

DevOps enables to opt between productivity and quality of the product. If there is pressure of early in to the market, we can compromise on quality of the appilication to an extent

d.

DevOps is establishing of the industrialization. It is a key enabler of Agile. It has ability to move efficiently and rapidly through SDLC phases.

Feedback

Question 36

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Which of the following are not benefits of code optimization techniques?

Select one or more:
a.

Improves the compilation time of an application

b.

Improves the system's performance

c.

Improves the organization's performance

d.

Results in code that is easy to understand, reuse, and maintain

Feedback

Question 37

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the Kanban Values ?

Select one:
a.

Complexity, Balance, Customer Focus, Flow, Leadership, Understanding, Agreement, Respect

b.

Transparency, Balance, Customer Focus, Flow, Leadership, Understanding, Agreement, Respect, Collaboration

c.

Transparency, Push, Customer Focus, Flow, Leadership, Understanding, Agreement, Respect

d.

None of these

Feedback

Question 38

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Which of the following tasks will be performed by the Configuration Manager?

Choose exactly THREE correct options.

Select one or more:
a.

Makes sure that project complies with CM standards and procedures.

b.

Plans Configuration Management

c.

Tracks and Reports on CM status and audits.

d.

Attends and facilitates CCB meetings.

Feedback

Question 39

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is a unit of work that a role may be asked to perform?

Select one:
a.

Task

b.

Work?ow

c.

Work Unit

d.

Activity

Feedback

Question 40

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A technique to render the untrusted data such as user input into literal text so that when any malicious code is input, it will not be executed and instead be displayed as plain text is called__________and used as a security measure against _________.

Select one:
a.

Output Encoding, Cross Site scripting

b.

Applying Least Privilege, Insufficient attack protection

c.

Encryption, Cross Site Scripting

d.

Encryption, Insufficient attack protection

Feedback

Question 41

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What are the pitfalls concerning the cloud application development?

Select one:
a.

Using Open source

b.

Consulting with all Key stakeholders

c.

Using untrusted Third party APIs

d.

Requiring all applications be deployed in the cloud.

Feedback

Question 42

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?

A. Use functions in code to read sensitive information from cfg file

B. Copy the sensitive information to a cfg file

C. Add the cfg file to .gitignore file

D. Identify the sensitive information in IDE.

Select one:
a.

ABDC

b.

DBCA

c.

DBCA

d.

DACB

Feedback

Question 43

Partially correct
Mark 0.33 out of 1.00
Flag question

Question text

Identify the message protection deployment modes.

Select one or more:
a.

Network -to-host

b.

host-to-host

c.

peer-to-peer

d.

network-to-network

Feedback

Question 44

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are various lines of businesses that Accenture Delivery Suite(ADS) support?

Select one:
a.

Technology, Digital, Operations, Security, and Cloud

b.

Technology, Digital, Operations, Security, and Strategy

c.

Technology, Digital, Operations, and Strategy

d.

Technology, Industry, Operations, Security, and Strategy

Feedback

Question 45

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Help Mr. Jimmy to install Jenkins on a Windows machine. Below are two suggestions given. What suggestion would you give?

1. Download Jenkins. War file https://jenkins.io and run command java -jar Jenkins. War --HTTP Port = <some-available-port>

2. Download jenkins.msi file from https://jenkins.io and install as we install any other windows software's

Select one:
a.

Either 1 or 2

b.

Only 1

c.

Neither 1 nor 2

d.

Only 2

Feedback

Question 46

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

If we need to apply design patterns, can we do it without the principles of object-oriented programing and standards?

Select one:
a.

Yes, Design Patterns are logical and comprehensive sequencing of elements with procedural principles

b.

No, Design Patterns are logical and comprehensive sequencing of elements with object-oriented principles only

c.

Yes, Design Patterns can be formed by principles, any programing language and standard

Feedback

Question 47

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which are the common coding situations that Developers come across frequently from below?
Select one:
a.
code is inconsistent
b.
code is not well commented
c.
code is complex
d.
Code is not well-formatted

Question 48

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The most encouraged time of day to hold a Scrum Daily Meeting is ___________________.

Select one:
a.

The beginning of the day

b.

At 4:30 PM

c.

Immediately after lunch

d.

At 7:00 PM

Feedback

Question 49

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the ADM 5 main focus areas?

Select one or more:
a.

Testing

b.

Management

c.

Development

d.

Planning

e.

Operations

Feedback

Question 50

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the responsibilities of the Change Control Board?

Choose exactly TWO correct options.

Select one or more:
a.

Review and authorize changes to the baselines.

b.

Represent the interests of the Project Manager and any groups who are not affected by changes to the baselines.

c.

Authorize the creation of products from the RTM library.

d.

Monitor changes and updates to the project requirements as part of CM.

Feedback


Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the right combination of red/green/refactor cycle with its description.

Select one:
a.

Write unit tests that fail - Red

b.

All of the above

c.

Write code that passes the unit tests - Green

d.

Improve and clean up production code - Refactor

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the three security features match the Server level security ?

Select one:
a.

Audits

b.

Logins

c.

Server roles

d.

All of them

Feedback

Question 3

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:

Select one:
a.

Compiler Exceptions

b.

Technical Exceptions

c.

Application Exceptions

d.

Business Exceptions

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

CIs are the work products within the selected categories that the project wants under configuration control. Imagine you are the person for writing the CM Plan who typically works with the Team Leads to document the CIs for the designated categories. Once the team determines the CM categories and the naming convention for each CI, it must maintain a list of the actual CIs. Which role you are playing from below options.

Select one:
a.

Project Manager

b.

Configuration Manager

c.

Product Manager

d.

Scrum Master Manager

Feedback

Question 5

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Who is responsible for conducting Performance Appraisals of Development Team Members in the Scrum?

Select one:
a.

Scrum Master

b.

None of the above

c.

Both of them

d.

Product Owner

Feedback

Question 6

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What relationship(s) can a work product have to task?

Select one:
a.

Input only

b.

Input and Output

c.

Output only

d.

Optional input, mandatory input, primary output and secondary output.

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Vincent has to write a POC that proposes the DevOps adoption into the project that is currently handled with traditional waterfall model. Which among the below are the benefits you think Mr. Vincent can quote in his POC?

A. Help organizations incrementally adopt DevOps capabilities

B. Improve effectiveness and efficiency of teams working for various features

C. Accelerate development and test feedback cycles

D. Optimized and continuous iterations for improvements

Select one:
a.

A and B

b.

A, B, C and D

c.

B and C

d.

Only C

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which among the following is NOT part of Large Scale Scrum?

a) Sprint Planning

b) Daily Scrum Meeting

c) Overall Retrospection

d) Product Backlog Refinement

Select one:
a.

None of the options

b.

Only a

c.

Only a and d

d.

Only b and d

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Linda, an AWS cloud administrator, used to generate a soft token in her mobile every time she used to login to AWS cloud console as part of cloud application security practices.

Which of the following type of Identity access this action refers to?

Select one:
a.

Federated Identity management

b.

Token based authentication

c.

Multifactor authentication

d.

Single Sign-on/off

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

If any team member, accidently , pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?

Select one or more:
a.

Copied code over to Accenture internal repository hence the code can be protected.

b.

Remove the sensitive information from github.com and delete the version history immediately.

c.

Report the issue to ASOC and his/her manager immediately

d.

No action needed as the repository is private and have access to only project team members.

Feedback

Question 11

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

If we open a new account with a vendor on the Internet, on their web site, they ask us for our phone number in which we receive a unique code, we then enter into the web site, just to make sure and confirm the identity of ours. What type of confirmation this scenario is mapped in?

Select one:
a.

out-of-band confirmation

b.

In-band confirmation

c.

OTP Confirmation

d.

Multifactor confirmation

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the website to access Accenture Delivery Suite(ADS)?

Select one:
a.

https://methodology.accenture.com

b.

https://in.accenture.com/accenturedeliverysuite/

c.

https://ads.acceture.com

d.

https://accenturedeliverysuite.accenture.com

Feedback

Question 13

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following statements is Valid?

Select one:
a.

epic and user story are interchanging used terminologies

b.

An epic is the functional specifications, technical specifications, usability requirements specifications of a user story

c.

An epic is a large user story that is made up of smaller, more granular user stories.

d.

An user story is a large epic that is made up of smaller, more granular epics.

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Scrum of Scrum meeting is focused on ?

Select one:
a.

Resolving coordination challenges within a team

b.

Progress of every individual

c.

Resolving coordination challenges between teams

d.

Progress within a team

Feedback

Question 15

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Complete the statements- Accenture Delivery Suite (or ADS) is our standard delivery framework designed to help our teams "___________" results.

Select one:
a.

smooth, efficient, predictable, reliable and high-quality results

b.

fast, efficient, predictable, reliable and high-quality results

c.

workable, smooth, reliable and high-quality results

d.

efficient, predictable, reliable and high-quality results

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the responsibilities of the Change Control Board?

Choose exactly TWO correct options.

Select one or more:
a.

Represent the interests of the Project Manager and any groups who are not affected by changes to the baselines.

b.

Monitor changes and updates to the project requirements as part of CM.

c.

Review and authorize changes to the baselines.

d.

Authorize the creation of products from the RTM library.

Feedback

Question 17

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which SOLID principle represents the following statement " the vehicle is an abstract for truck and bike"?

Select one:
a.

Liskov Substitution Principle

b.

Dependency Inversion Principle

c.

Single Responsibility Principle

d.

Open/Closed Principle

Feedback

Question 18

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

Which areas of a code layout must be considered to reduce comments on methods and reduce errors?

Select one or more:
a.

The use of white space

b.

Indentation

c.

Naming conventions

d.

Blocks of code

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Keith working on configuring Jenkins for his project. He would like to avoid single point of failure of Jenkins Services. Which environmental setup will be suggested to be followed by him?

Select one:
a.

On-Premises Setup

b.

Master-Slave Jenkins environment setup

c.

One Master Node Jenkins Environment setup

d.

Non Master-Slave Jenkins environment setup

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Ms. Julie has to write a project document that proposes the Configuration Management adoption into the project. Which among the below are the benefits you think Ms. Julie can quote in her document?

A. Establishes and maintains the integrity of the items that have been placed under its control

B. Accounts for and reports the progress of development efforts

C. Prevents unauthorized access to assets

D. Coordinates, tracks, and manages change activities

E. Facilitates concurrent development

Select one:
a.

A,B,C,D and E

b.

B and C

c.

A,B,D,E

d.

A and B

e.

A, B, C and D

Feedback

Question 21

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Which of the following is the description for the Level 2 OWASP threat assessment maturity practice?

Select one:
a.

Identify and understand the high level threats to the organization and individual projects

b.

Increase the accuracy of the threat assessment and improve granularity of per-project understanding.

c.

Map compensating controls to each threat against the internal and third-party software

Feedback

Question 22

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What guidelines should be followed for creating the Accenture coding standards?

Select one or more:
a.

Coding Standards should be easy to understand

b.

Multiple developers rewrite each other's code to match their personal styles

c.

Must be created after the build stage

d.

Should be agreed upon across project teams spanning globally.

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following are CORRECT related to Secure SDLC?

A . Identifying system configuration issues related to security early.

B . Reveals the identification of shared security services

C . Influence executive decisions due to timely risk management processes.

D . Documenting and then informing management about security considerations during development phase.

Select one:
a.

A,B,C

b.

A,B,C,D

c.

B,C

d.

B,C,D

Feedback

Question 24

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

What are guidelines that needs to be followed for managing bottlenecks during optimization?

Select one or more:
a.

Identifying benefits of implementing complex algorithm does not out weigh the time taken to create it.

b.

Do not cache the result.

c.

Increase memory space to make the program efficient in terms of speed.

d.

Do performance testing on critical methods carrying business logic

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Which of the following is done as part of ''Kanban'?

a) Splitting work into smaller items

b) Deciding the sequence of steps the work items need to go through

c) not imposing any limit on the work in progress

d) Track the lead and cycle time

Select one:
a.

Only a,b and d

b.

All of the options

c.

Only a,b and c

d.

Only b,c and d

Feedback

Question 26

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the best approach in Design Patterns in coding?

Select one:
a.

Writing codes with the highest possible coupling and the highest possible cohesion.

b.

Writing codes with the lowest possible coupling and the highest possible cohesion.

c.

Writing codes with the highest possible coupling and the Lowest possible cohesion.

Feedback

Question 27

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

How to ensure reusability of code in a project?

Select one or more:
a.

Having highly dependable blocks

b.

No dependable modules

c.

Having loosely coupled system

d.

Sometimes you do this by breaking it into multiple independent blocks

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

In which situation a looping error will not occur?

Select one:
a.

Loops variables are initialized correctly.

b.

Loop conditions are initialized incorrectly or not at all.

c.

Improper nesting occurs.

d.

Loops are terminated incorrectly or not terminated at all.

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following definitions provided by various personnel's would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate?

EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work.

DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control .

GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way.

JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.

Select one:
a.

DANIEL's definition

b.

EVANA's definition

c.

GABRIEL's definition

d.

JOE's definition

Feedback

Question 30

Correct
Mark 1.00 out of 1.00
Flag question

Question text

When we try to push the changes into github.com using git, few git commands need to be executed. Identify the right order of execution of the following git commands.

Select one:
a.

git commit -m "Commenting" ; git push ; git add .

b.

git commit -m "Commenting" ; git add . ; git push

c.

git add . ; git commit -m "Commenting" ; git push

d.

git push ; git add . ; git commit -m "Commenting"

Feedback

Question 31

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following types of testing and their contribution to overall system documentation are correct.

Select one:
a.

Unit Tests - Contains working specification of functional code

b.

All of the above

c.

Regression Tests - Becomes detailed executable specification

d.

Acceptance Tests - Specifies and defines critical requirements

Feedback

Question 32

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is Takt Time?

Select one:
a.

Customer Demand Rate/Time Available

b.

Customer Demand Rate/Time Already Spend

c.

Customer Request Received/Lead Time

d.

Customer Request Received/Cycle Time

Feedback

Question 33

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which SOLID principle states that an abstraction should not depend on details, but the details should depend on the abstractions?

Select one:
a.

Single responsibility

b.

Open Closed Principle

c.

Interface segregation

d.

Dependency Inversion Principle

Feedback

Question 34

Correct
Mark 1.00 out of 1.00
Flag question

Question text

When an user can fall victim of cross site scripting?

Select one:
a.

All of the above

b.

User fails to identify the forged links/websites

c.

User clicks on some link which then shouldn't be

d.

User's browser is compromised

Feedback

Question 35

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

What are the different generic techniques followed in code optimization for independent platform?

Select one or more:
a.

Reducing the number of conditions.

b.

Using memory efficient routines

c.

Data-level parallelism

d.

Cache optimization techniques

Feedback

Question 36

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Definition of Done is applicable to which of the following?

Select one:
a.

User Story

b.

Web Page

c.

All of the options

d.

Feature

Feedback

Question 37

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How does microservices provide small, manageable, and deployable components ?

Select one:
a.

Micro-service Components

b.

Micro-container Services

c.

Micro-service Containers

Feedback

Question 38

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Identify the cloud application issues when an application id developed.

Select one or more:
a.

API calls travel across the internet and are subject to threats

b.

Developer create the APIs when building application

c.

API calls emanate from multiple device types

d.

attack surface has increased

Feedback

Question 39

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Which of the following tasks will be performed by the Configuration Manager?

Choose exactly THREE correct options.

Select one or more:
a.

Tracks and Reports on CM status and audits.

b.

Attends and facilitates CCB meetings.

c.

Makes sure that project complies with CM standards and procedures.

d.

Plans Configuration Management

Feedback

Question 40

Correct
Mark 1.00 out of 1.00
Flag question

Question text

"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object" Which pattern is it?

Select one:
a.

Structural Pattern

b.

Behavioral Pattern

c.

Singleton pattern

Feedback

Question 41

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Identify the important levels for Optimization from the following.
Select one:
a.
Run time Level
b.
Compile Level
c.
Assembly Level
d.
Design Level

Question 42

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In a Banking application, we keep the Customer UI logic separate from the backend or the business logic of our application. Which GRASP principle would take the request from the UI and then assign that to the proper object to do the work?

Select one:
a.

High Cohesion

b.

Low Coupling

c.

Creator

d.

Controller

Feedback

Question 43

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Select the challenges of applying TDD to Agile development projects

Select one or more:
a.

Test writing becomes intuitive

b.

Design changes may affect unit tests

c.

Automation of the tests

d.

Developers adaptability

Feedback

Question 44

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the ADM 5 main focus areas?

Select one or more:
a.

Planning

b.

Testing

c.

Operations

d.

Management

e.

Development

Feedback

Question 45

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Identify the services provided by Microservices when compare to Design Patterns.

Select one or more:
a.

Catalog of Solutions

b.

Implementation

c.

Code Access

d.

Environment

Feedback

Question 46

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

___________________ helps the design process, whereas ______________ is more suitable for integration and functional testing.

Select one:
a.

BDD, TDD

b.

TDD, TDD

c.

TDD, BDD

d.

BDD, BDD

Feedback

Question 47

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following statements are correct about coding best practices and coding standards?

Select one or more:
a.

Coding standards improve the consistency and reliability of the code by eliminating personal styles and by bringing symmetry to the application code, irrespective of the developers involved.

b.

Coding best practices are collection of good programming practices and experiences, which involve the use and improvement of coding standards.

c.

Coding best practices and standards are automatically taken care

d.

Deliver High Quality Code

Feedback

Question 48

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Ms. Sunita wants to make container to be accessible using an IpAddress. Which Docker native network driver usage will help her to map ipaddress to a container and make it accessible.?

Select one:
a.

None

b.

Bridge

c.

Host

d.

MACVLAN

e.

Overlay

Feedback

Question 49

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the functionality of Data Cohesion in modules of projects ?

Select one:
a.

Both Option 1 and 2

b.

If a module is independent of data from other modules

c.

One module may be dependent on another module for data

d.

None of them

Feedback

Question 50

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Which global policy of Accenture does ADS meet?

Select one:
a.

Policy 1100

b.

Policy 0012

c.

Policy 1200

d.

Policy 0011

Feedback


Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To secure the http messages in the API calls, its necessary to:

Select one:
a.

All the above

b.

Use cryptography

c.

implement identity management

d.

avoid hardcoding any sensitive data in the messages

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

A team has completed 10 Sprints and moving to the 11th Sprint. Till Sprint 10, the team has achieved an average of 50 story points per sprint. The same is projected as their velocity for the upcoming sprints with the Client. What is this approach called?

Select one:
a.

Velocity Driven Sprint Planning

b.

Velocity Driven Commitment

c.

Commitment Driven Velocity

d.

Commitment Driven Sprint Planning

Feedback

Question 3

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Jack is grooming himself to be a potential Product Owner. Knowing the desired qualities of a Product Owner will help him groom well for the role. Which of the following are the desired qualities of a Product Owner?

i) PO should be a Domain Expert

ii) PO should be able to communicate with technical audience

iii) PO should be able to communicate with business audience

iv) PO should be a respectable person by the Scrum Team members

Select one:
a.

Only i and iv

b.

Only i, iii and iv

c.

Only i and iii

d.

All the options

Feedback

Question 4

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration

Item categories that are quoted below -

A. Project Documentation

B. Architectures

C. Interfaces

D. Designs

E. Source code and Executable code.

Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added.

Assume that you are Mr. Vincent and determine few more categories that can be added to the same.

Select one or more:
a.

Requirements

b.

Training materials

c.

Databases that include processed data

d.

Metrics and Status Reports

Feedback

Question 5

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Mr. Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.

A. Levels of Control.

B. Selecting CIs

C. Determining categories of CM

D. Naming Conventions

E. Configuration Items(CIs)

Select one:
a.

C,A,E,D,B

b.

C,B,D,A,E

c.

D,E,B,A,C

d.

C,E,D,A,B

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following action to be taken before pushing the code into github.com when we have sensitive information in the source code ?

Select one:
a.

Replace the sensitive data with mock data

b.

Delete all the sensitive information

c.

No change needed as the information is needed for application functionality

d.

Move the sensitive information to .gitignore file

Feedback

Question 7

Partially correct
Mark 0.33 out of 1.00
Remove flag

Question text

Identify the services provided by Microservices when compare to Design Patterns.

Select one or more:
a.

Code Access

b.

Implementation

c.

Environment

d.

Catalog of Solutions

Feedback

Question 8

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

What was seen in application over time, which creates the need of solutions which could also be used in other projects?

Select one:
a.

Faster time to market

b.

More effective and efficient process

c.

Complexity of application and managing business

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is a unit of work that a role may be asked to perform?

Select one:
a.

Work?ow

b.

Work Unit

c.

Activity

d.

Task

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.

Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.

A. Determine CI Categories.

B. Determine CM Control Levels.

C. Determine CI Tools.

D. Determine CI Naming Conventions.

E. Audits and Status Reporting

F. Select CIs

Select one:
a.

A,B,C,D

b.

A,B,E,F

c.

A,B,C,D,F

d.

A,C,D,E

Feedback

Question 11

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In Scrum ban, impediments are

Select one:
a.

hidden

b.

avoided

c.

fixed

d.

attended

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

What practices should be used when building a complex system ?

Select one or more:
a.

Designing for testability

b.

Using a modular design

c.

Using components with tight coupling

d.

Maximizing cohesion between components

Feedback

Question 13

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

Which are the external application-oriented devices that provide application security?

Select one or more:
a.

HTTPS

b.

API Gateway

c.

Citrix

d.

DAM

e.

WAF

Feedback

Question 14

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following statement is not CORRECT about code quality metrics?

Select one:
a.

Tight coupling and low cohesion indicates high quality of code

b.

Cyclomatic complexity measures the complexity of a program.

c.

Comment density is measured by dividing the number of comment lines by the total lines of code.

d.

Checking code duplication.

Feedback

Question 15

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?

Select one:
a.

Memory Optimization

b.

Code Optimization

c.

Memory utilization

d.

Speed Optimization

Feedback

Question 16

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Ms. Tina working in a development of an application. She would like to trigger Jenkins job whenever there is a change detected either in the code or branches or any where in the code repository. Which build trigger option will be more suitable.

Select one:
a.

GitHub hook trigger for GitSCM polling

b.

Poll SCM

c.

Facilitates periodic build

d.

Trigger builds remotely using scripts

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the order of steps for Code review process.

a. Conduct a review

b. Plan for a review

c. Resolve review points

d. Validate resolutions

e. Prepare for a review

f. Baseline a software work product

Select one:
a.

b, f, a, e, c, d

b.

b, e, a, c, d, f

c.

a, c, b, e, f, d

d.

b, f, a, e, c, d

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?

Select one or more:
a.

Create new types of exceptions to handle any kind of situation if need be.

b.

Always handle the exception as it is an unusual event that may occur.

c.

Write exceptions in usual flow of program.

d.

No need to document exceptions.

Feedback

Question 19

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Which of the following could be input or output of a task? (Select all that apply.)

Select one or more:
a.

Artifact

b.

Outcome

c.

Role

d.

Deliverable

Feedback

Question 20

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you?

Choose exactly THREE correct options.

Select one or more:
a.

Requirements Baseline

b.

Integration Baseline

c.

Architecture Baseline

d.

Testing Baseline

Feedback

Question 21

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.

Select one or more:
a.

VSS(Visual SourceSafe)

b.

PVCS(Poly Version Control System)

c.

Mercurial

d.

GitLab

Feedback

Question 22

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

How does ADM align to the new ?

Select one or more:
a.

Extensions and Context

b.

Vastness

c.

Longevity

d.

Reputability

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the work / assets grouped by business area?

Select one:
a.

Stage

b.

Activity or Discipline

c.

Workstream

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Accenture DevOps Platform (ADOP) is a cloud-hosted development and operations environment that can be used for which of the following continuous process. Choose three most appropriate options.

Select one or more:
a.

Release

b.

Planning

c.

Monitoring

d.

Testing

Feedback

Question 25

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the key benefit of the least privilege approach to security?

Select one:
a.

Ensures modular, reusable output

b.

it minimized the level of compromise in the event of a security breech

c.

it results in the tasks being completed quicker

Feedback

Question 26

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the state that refers High degree of Coupling.

Select one:
a.

Big change can break your code and this could have a disastrous effect on your application

b.

Small change can break your code and this could have a disastrous effect on your application

c.

Adding a functionality to your application is difficult and effects your application

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

At home we replace an old CFL bulb to a new LED bulb. Although we change the bulb, we donā€™t change the functionality. which SOLID principle does it satisfy?

Select one:
a.

Dependency Inversion Principle

b.

Liskov substitution

c.

Open Closed Principle

d.

Interface segregation

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the responsibilities of a DBA which includes.

Select one:
a.

Creating user accounts and assigning passwords

b.

Classifying data

c.

All of the above

d.

Granting and Denying user privileges

Feedback

Question 29

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

In Accenture Code Quality Model, fundamental area of Performance and Scalability, select the important considerations from below -

Select one or more:
a.

Sensitive data not being used or passed unnecessarily

b.

Object pooling and recycling patterns

c.

Data Encryption and encoding implementation

d.

Parallel processing and concurrency

Feedback

Question 30

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

While doing TDD, Which of the following is recommended?

Select one:
a.

Writing Large or course-grained tests

b.

Writing trivial tests that are too small

c.

Writing exhaustive test cases upfront

d.

Tests to be frequently run for effectiveness

Feedback

Question 31

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Digital asset management comes in the form of a software or appliance device that can be used on which of the following?
Select one or more:
a.
cloud-based model
b.
Mobiles and laptops
c.
All electronic gadgets
d.
on-premises

Feedback

Question 32

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is NOT one of the 9 key principles of GRASP?

Select one:
a.

High Cohesion

b.

Inheritance

c.

Low Coupling

d.

Creator

Feedback

Question 33

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Manoj from network and Infrastructure team was to update the firewall rules on Saturday night to disable any requests coming from EU region into the banking application as the business was recently closed in EU. However, Manoj missed doing this update while working on other requests. What kind of security threat is the bank now vulnerable to?

Select one:
a.

Insufficient attack protection

b.

Cross site scripting

c.

Broken Authentication

d.

Security Misconfiguration

Feedback

Question 34

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

While doing the daily scrum ceremony, the true spirit of the ceremony should be?

Select one:
a.

sharing updates among team members

b.

reporting updates to scrum master

c.

sharing updates among scrum masters

d.

reporting updates to product owner

Feedback

Question 35

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which are the common coding situations that Developers come across frequently from below?
Select one:
a.
code is inconsistent
b.
code is not well commented
c.
Code is not well-formatted
d.
code is complex

Question 36

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is feature integration sprint?

Select one:
a.

A sprint outside release for performing cutover activities

b.

First sprint of the release dedicated for planning

c.

A final sprint within the release for performing integration & regression testing

d.

Sprint that can be conducted as and when required for adhoc tasks

Feedback

Question 37

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Joshua being a project manager, need to suggest methods to developers of project so that client become high-performance businesses by delivering high-quality code. Which are they?

Select one or more:
a.

Using automated code review tools, if permitted by client

b.

Adhere to Accenture Delivery Methods best practices and guidelines

c.

Implementing the practice of peer reviews.

d.

Follow the Accenture Code Quality Model

Feedback

Question 38

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which SOLID principle helps the use to develop less coupled code by ensuring the high level modules depend on abstraction rather than concrete implementations of lower level modules?

Select one:
a.

Interface segregation

b.

Open Closed Principle

c.

Single responsibility

d.

Dependency Inversion Principle

Feedback

Question 39

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What are the three security features match the Database level security ?

Select one:
a.

Schemas, users, roles

b.

Schemas, users, logins

c.

Logins, Users, Audits

d.

Server Roles, schemas, Audits

Feedback

Question 40

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What are the components of Accenture Delivery Suite(ADS)?

Select one:
a.

Methods & Estimators, Deliverables, Architecture, Metrics

b.

Methods & Estimators, Deliverables, Process, Metrics

c.

Methods & Estimators, Tools, Architecture, Metrics

d.

Methods & Estimators, Tools, Process, Metrics

Feedback

Question 41

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Swiss Knife is capable enough to perform multiple tasks but if you want to change one of the blade or component of the Swiss Knife, all other components need to be removed as well, meaning has impact. Which SOLID principle does the above quote does not satisfy?

Select one:
a.

Open Closed Principle

b.

Single responsibility

c.

Interface segregation

d.

Dependency Inversion Principle

Feedback

Question 42

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following mitigation techniques can be adopted to avoid Broken Authentication & Session Management problems?

1. Encryption

2. Output Encoding

3. Hardening user account management

4. Configuring the appropriate session timeout values

Select one:
a.

1 and 2

b.

2 and 3

c.

1 and 4

d.

3 and 4

Feedback

Question 43

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him?

Select one or more:
a.

Name of methods does not matter.

b.

Limit the method size between 100 and 150 code lines by refactoring it.

c.

Group logically related statements for easy readability

d.

It's okay to have hard-coded values in the same code

Feedback

Question 44

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

A malicious or unexpected data is somehow programmatically fed into the application leading to compromise of security. What kind of hacking is this?

Select one:
a.

Injection - Correct

b.

Insecure Direct Object Reference

c.

Broken security or authentication

d.

Cross site scripting

Feedback

Question 45

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In a Build Triggers section of a Jenkins job, Build Periodically is selected and the corresponding value is provided as "2 15 * * 3". What does that mean? Choose the most appropriate answer.

Select one:
a.

Build Triggers periodically every Wednesday in a week at 2:15 AM as per the local time

b.

Build Triggers periodically every 3rd day of month at 2:15 AM as per the local time

c.

Build Triggers periodically every Wednesday in a week at 3:02 PM as per the local time

d.

Build Triggers periodically for every 3 minutes of every hour on 15th February of every year

Feedback

Question 46

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?

Select one:
a.

People

b.

Process

c.

All of the options

d.

Tools

Feedback

Question 47

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the best approach in Design Patterns in coding?

Select one:
a.

Writing codes with the highest possible coupling and the Lowest possible cohesion.

b.

Writing codes with the lowest possible coupling and the highest possible cohesion.

c.

Writing codes with the highest possible coupling and the highest possible cohesion.

Feedback

Question 48

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.

Select one:
a.

Component testing

b.

Integration Testing

c.

Module Testing

d.

API Testing

Feedback

Question 49

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the state that refers High degree of Coupling

Select one:
a.

Big change can break your code and this could have a disastrous effect on your application

b.

Adding a functionality to your application is difficult and effects your application

c.

Small change can break your code and this could have a disastrous effect on your application

Feedback

Question 50

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Who is responsible for analyzing the project performance and identifying the corrective and preventive actions?

Select one:
a.

Scrum Master

b.

Development Team

c.

Project Manager

d.

Product Owner

Feedback

Question 1

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.

Select one or more:
a.

PVCS(Poly Version Control System)

b.

Mercurial

c.

VSS (Visual SourceSafe)

d.

GitLab

Feedback

Question 2

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him ?

Select one or more:
a.

Name of methods does not matter.

b.

Group logically related statements for easy readability.

c.

Limit the method size between 100 and 150 code lines by refactoring it.

d.

It's okay to have hard-coded values in the same code.

Feedback

Question 3

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

What are the OOP components that is influenced in Design Patterns?

Select one or more:
a.

Encapsulation

b.

Inheritance

c.

Abstraction

d.

Polymorphism

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

When we try to push the changes into github.com using git, few git commands need to be executed. Identify the right order of execution of the following git commands.

Select one:
a.

git pushgit addgit commit -m "Commenting"

b.

git commit -m "Commenting"git pushgit add

c.

git commit -m "Commenting"git addgit push

d.

git addgit commit -m "Commenting"git push

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of these options go well with Feature Boxing?

a) It can span multiple sprints and does not require prioritization of user stories.

b) Lack of prioritization creates the risk that important features may not make it into the sprint.

c) It also means that lower priority items can be completed early and then deemed not as important later.

Select one:
a.

All a,b and c

b.

Only a and c

c.

Only b and c

d.

Only a and b

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr Robin is supporting a web application which processes 500 requests daily. Suddenly one night when Robin was in night shift he got a P1 ticket. Customer complaining that application is not accessible. Robin and his team started doing analysis and found that approximately 600 requests came in the night and his application was not capable for handling the load. What should team ensure from given and which type of testing needs to be performed.

Select one or more:
a.

Accept only minimal request

b.

Load Balancing

c.

Setting Threshold limit on Performance

d.

Auto scaling configurations

Feedback

Question 7

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Who is responsible for analyzing the project performance and identifying the corrective and preventive actions?

Select one:
a.

Project Manager

b.

Product Owner

c.

Scrum Master

d.

Development Team

Feedback

Question 8

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Shyam created container images considering his project environment requirement. Which cloud based registry enables capability of hosting private and public content(images).

Select one:
a.

Docker Volumes

b.

Docker Repositories

c.

Docker Container

d.

Docker Hub

Feedback

Question 9

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

How does ADM align to the new?

Select one or more:
a.

Extensions and Context

b.

Vastness

c.

Longevity

d.

Repeatability

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?

Select one:
a.

All of the options

b.

People

c.

Process

d.

Tools

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How does microservices provide small, manageable, and deployable components ?

Select one:
a.

Micro-service Containers

b.

Micro-service Components

c.

Micro-container Services

Feedback

Question 12

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Which of the following could be input or output of a task? (Select all that apply).

Select one or more:
a.

Artifact

b.

Role

c.

Outcome

d.

Deliverable

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following statements are correct about coding best practices and coding standards?

Select one or more:
a.

Coding best practices and standards are automatically taken care

b.

Deliver High Quality Code

c.

Coding standards improve the consistency and reliability of the code by eliminating personal styles and by bringing symmetry to the application code, irrespective of the developers involved.

d.

Coding best practices are collection of good programming practices and experiences, which involve the use and improvement of coding standards.

Feedback

Question 14

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

What are the responsibilities of the Change Control Board? Choose exactly TWO correct options.

Select one or more:
a.

Review and authorize changes to the baselines.

b.

Authorize the creation of products from the RTM library.

c.

Represent the interests of the Project Manager and any groups who are not affected by changes to the baselines.

d.

Monitor changes and updates to the project requirements as part of CM.

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the functionality of Data Cohesion in modules of projects ?

Select one:
a.

If a module is independent of data from other modules

b.

One module may be dependent on another module for data

c.

Both Option 1 and 2

d.

None of them

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?

Select one or more:
a.

There are no cyclic dependencies between classes, components or layers.

b.

Dependencies to external libraries are well known.

c.

The average complexity of classes, programs, methods, procedures, or functions is under control.

d.

Components responsibilities are maximized.

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mrs. Ana is trying to install Jenkins on a Windows machine. Which among the statements in the options are CORRECT with respect to Jenkins installation.

Select one:
a.

Both of the above are correct

b.

Neither of the statements are CORRECT

c.

Download jenkins.war file https://jenkins.io and run command java -jar jenkins.war --httpPort = <some-available-port>This is a general approach for installing Jenkins on any operating system.

d.

Download jenkins.msi file from https://jenkins.io and install as we install any other windows softwareThis is a specific approach for installing Jenkins only on Windows Operating System.

Feedback

Question 18

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

A graph that shows the progress of work toward a goal line associated with a value on the vertical axis is called?

Select one:
a.

Progress Bar

b.

Task Chart

c.

Burnup Chart

d.

Burndown Chart

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the state that refers High degree of Coupling

Select one:
a.

Adding a functionality to your application is difficult and effects your application

b.

Big change can break your code and this could have a disastrous effect on your application

c.

Small change can break your code and this could have a disastrous effect on your application

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following action to be taken before pushing the code into github.com when we have sensitive information in the source code?

Select one:
a.

No change needed as the information is needed for application functionality

b.

Move the sensitive information to .gitignore file

c.

Replace the sensitive data with mock data

d.

Delete all the sensitive information

Feedback

Question 21

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Complete the statements- Accenture Delivery Suite (or ADS) is our standard delivery framework designed to help our teams "___________" results.

Select one:
a.

All of the above

b.

smooth, efficient, predictable, reliable and high-quality results

c.

efficient, predictable, reliable and high-quality results

d.

fast, efficient, predictable, reliable and high-quality results

Feedback

Question 22

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration Item categories that are quoted below -

A. Project Documentation

B. Architectures

C. Interfaces

D. Designs

E. Source code and Executable code.

Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added. Assume that you are Mr. Vincent and determine few more categories that can be added to the same.

Select one or more:
a.

Requirements

b.

Training materials

c.

Metrics and Status Reports

d.

A,B,C,D and E

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Why are policies required for a project?

Select one:
a.

Make things easy to understand

b.

All of the above

c.

It helps one understand what needs to be done for that particular column

d.

Everybody is on the same page

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Flag question

Question text

David, a developer, is working on login component of an application and dealing with sensitive data. Hence before pushing the code to github.com, he moved the sensitive information in a "logindata.cfg" file and added the file name as "login.cfg" by mistake in .gitignore and also pushed the changed to github.com. Later he identified and removed it from repository before anyone uses that file. Is there any risk associated with this?

Select one:
a.

No, there is no risk as he removed from github.com

b.

Yes, the changes will be reflected in the version history.

c.

All of the Above

d.

Yes, the file is being modified by other team member

Feedback

Question 25

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

John is the identified Product Owner of a just commenced Scrum Project. One month into the project, the team don't get enough opportunities to interact with John. The case is that either John can't be reached or even if reached, he spares only very little time with the team. Which of the following can the team adapt to get enough availability of the John - the Product Owner?

i) Identify the REAL Product Owner to do the job

ii) Educate the Product Owner on the expectations

iii) Request the Scrum Master to pitch in for the Product Owner

Select one:
a.

Only ii and iii

b.

Only i and ii

c.

All of the above

d.

Only i and iii

Feedback

Question 26

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following are the examples of Headless Web Browser?

Select one:
a.

Chrome version 59

b.

All of the above

c.

Chrome 60

d.

Nightmare JS

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items. Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.

A. Determine CI Categories.

B. Determine CM Control Levels.

C. Determine CI Tools.

D. Determine CI Naming Conventions.

E. Audits and Status Reporting

F. Select CIs

Select one:
a.

A,B,E,F

b.

A,B,C,D

c.

A,B,C,D,F

d.

A,C,D,E

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Peter a Software Professional, is attending DevOps training. The trainer has written some statements that are as listed below. He asked the participants to identify the challenges the DevOps is facing predominantly. Help Peter to identify and answer the question.

A. Developer Vs Operations mindset

B. Transition from legacy infrastructure for deployments to micro-services

C. Resistance to the changes

Select one:
a.

Both B and C

b.

A, B and C

c.

Only B

d.

Only A

Feedback

Question 29

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

________________________________ is a set of technologies, tools and processes that enable enterprises to move into the paradigm of seamless interactivity. Choose the appropriate option.

Select one:
a.

Accenture Origin Web Platform

b.

Accenture Open Web Platform

c.

Accenture Operations Web Platform

d.

Accenture Operating Web Platform

Feedback

Question 30

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the key benefit of the least privilege approach to security?

Select one:
a.

Ensures modular, reusable output

b.

It minimizes the level of compromise in the event of a security breech

c.

It results in the tasks being completed quicker

Feedback

Question 31

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

TrustComm is a telephone network that is in need of bringing up communication infrastructure on Cloud Service Provider's equipment to offer VoIP to their customers. This telephone network must be fault-tolerant.If you are a cloud solution architect, which XaaS you suggest to TrustComm ?

Select one:
a.

DaaS

b.

BPaaS

c.

STaaS

d.

CaaS

Feedback

Question 32

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following statement is NOT CORRECT about code quality metrics?

Select one:
a.

Cyclomatic complexity measures the complexity of a program.

b.

Tight coupling and low cohesion indicates high quality of code

c.

Comment density is measured by dividing the number of comment lines by the total lines of code.

Feedback

Question 33

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Which of the following are not benefits of code optimization techniques?

Select one or more:
a.

Improves the organization's performance

b.

Improves the compilation time of an application

c.

Results in code that is easy to understand, reuse, and maintain

d.

Improves the system's performance

Feedback

Question 34

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How does View enhance data security?

Select one:
a.

By creating one common view for all the tables

b.

By letting users to create a temporary table with any desired data

c.

By only allowing users to access to columns they require instead of entire table

d.

None

Feedback

Question 35

Correct
Mark 1.00 out of 1.00
Flag question

Question text

After what activity we should raise a Change Request(CR)? (Choose the best option)

Select one:
a.

Any changes to the requirements which is realized in any stage

b.

Any changes to the requirements which come after entering the Design Stage. Since the requirements gets base lined at the end of Analyze stage.

c.

Only functional requirement change needs CR

d.

Any changes made after the design is complete

Feedback

Question 36

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Manoj from network and Infrastructure team was to update the firewall rules on Saturday night to disable any requests coming from EU region into the banking application as the business was recently closed in EU. However, Manoj missed doing this update while working on other requests. What kind of security threat is the bank now vulnerable to?

Select one:
a.

Broken Authentication

b.

Security Misconfiguration

c.

Cross site scripting

d.

Insufficient attack protection

Feedback

Question 37

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following mitigation techniques can be adopted to avoid Broken Authentication & Session Management problems?

1. Encryption

2. Output Encoding

3. Hardening user account management

4. Configuring the appropriate session timeout values

Select one:
a.

1 and 2

b.

2 and 3

c.

3 and 4

d.

1 and 4

Feedback

Question 38

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

When you are choosing Custom Vs Package implementation, which factors would you want to consider ?

Select one or more:
a.

Budget

b.

Criticality of Requirements

c.

Historical Factors

d.

Product Availability

Feedback

Question 39

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which global policy of Accenture does ADS meet?

Select one:
a.

Policy 1100

b.

Policy 1200

c.

Policy 0011

d.

Policy 0012

Feedback

Question 40

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

CIs are the work products within the selected categories that the project wants under configuration control. Imagine you are the person for writing the CM Plan who typically works with the Team Leads to document the CIs for the designated categories. Once the team determines the CM categories and the naming convention for each CI, it must maintain a list of the actual CIs. Which role you are playing from below options.

Select one:
a.

Product Manager

b.

Configuration Manager

c.

Project Manager

d.

Scrum Master Manager

Feedback

Question 41

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

While doing the daily scrum ceremony, the true spirit of the ceremony should be?

Select one:
a.

reporting updates to product owner

b.

reporting updates to scrum master

c.

sharing updates among team members

d.

sharing updates among scrum masters

Feedback

Question 42

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is a unit of work that a role may be asked to perform ?

Select one:
a.

Task

b.

Workflow

c.

Work Unit

d.

Activity

Feedback

Question 43

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What was seen in application over time, which creates the need of solutions which could also be used in other projects?

Select one:
a.

Complexity of application and managing business

b.

Faster time to market

c.

More effective and efficient process

Feedback

Question 44

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?

A. Use functions in code to read sensitive information from cfg file

B. Copy the sensitive information to a cfg file

C. Add the cfg file to .gitignore file

D. Identify the sensitive information in IDE.

Select one:
a.

DACB

b.

ABDC

c.

DBCA

d.

DBCA

Feedback

Question 45

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which are the common coding situations that Developers come across frequently from below?

Select one:
a.

All Of the above

b.

code is inconsistent

c.

Code is not well-formatted

d.

code is not well commented

Feedback

Question 46

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.

Select one:
a.

Integration Testing

b.

Module Testing

c.

API Testing

d.

Component testing

Feedback

Question 47

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:

Select one:
a.

Business Exceptions

b.

Compiler Exceptions

c.

Application Exceptions

d.

Technical Exceptions

Feedback

Question 48

Correct
Mark 1.00 out of 1.00
Flag question

Question text

If any team member, accidentally, pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?

Select one or more:
a.

Copied code over to Accenture internal repository hence the code can be protected.

b.

No action needed as the repository is private and have access to only project team members.

c.

Remove the sensitive information from github.com and delete the version history immediately.

d.

Report the issue to ASOC and his/her manager immediately.

Feedback

Question 49

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

How to handle alternatives based on the type or how to create plug-gable software components?

Select one:
a.

All of the above

b.

None of the above

c.

Identity Classes/Types which would have the behavior changing slightly.Assign responsibility to a type for which the behavior varies

d.

Assign responsibility for the behavior using polymorphic operations to the types for which the behavior varies

Feedback

Question 50

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What are the three security features match the Database level security ?

Select one:
a.

Logins, Users, Audits

b.

Schemas, Users, Roles

c.

Server Roles, Schemas, Audits

d.

Schemas, Users, Logins

Feedback

Question 1

Complete
Mark 1.00 out of 1.00
Flag question

Question text

If any team member, accidentally, pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?

Select one or more:
a.

Remove the sensitive information from github.com and delete the version history immediately.

b.

Copied code over to Accenture internal repository hence the code can be protected.

c.

Report the issue to ASOC and his/her manager immediately.

d.

No action needed as the repository is private and have access to only project team members.

Question 2

Complete
Mark 0.50 out of 1.00
Flag question

Question text

Which of the following are not benefits of code optimization techniques?

Select one or more:
a.

Improves the organization's performance

b.

Results in code that is easy to understand, reuse, and maintain

c.

Improves the system's performance

d.

Improves the compilation time of an application

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Mr.Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.

A. Levels of Control

B. Selecting CIs

C. Determining categories of CM

D. Naming Conventions

E. Configuration Items(CIs)

Select one:
a.

C,E,D,A,B

b.

C,A,E,D,B

c.

D,E,B,A,C

d.

C,B,D,A,E

Question 4

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.

Select one:
a.

Module Testing

b.

Integration Testing

c.

API Testing

d.

Component testing

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Mark works in a cloud service provider firm. He gathers requirement from a customer. Customer stated that "On demand based computing resources has to be provisioned and de-provisioned rapidly" Which property of cloud computing helps Mr. Mark to address this requirement.

Select one:
a.

Elasticity

b.

Coupling and Decoupling

c.

Enhancement

d.

Abstraction

Question 6

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling errors that may occur because of non availability of product in a cart already added earlier. Her first task is to define these issue under a suitable category. Identify the correct category from the following options:

Select one:
a.

Technical Exceptions

b.

Compiler Exceptions

c.

Business Exceptions

d.

Application Exceptions

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?

Select one:
a.

All of the options

b.

Tools

c.

People

d.

Process

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following are the examples of Headless Web Browser?

Select one:
a.

Nightmare JS

b.

Chrome 60

c.

All of the above

d.

Chrome version 59

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What was seen in application over time, which creates the need of solutions which could also be used in other projects?

Select one:
a.

Faster time to market

b.

Complexity of application and managing business

c.

More effective and efficient process

Question 10

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?

A. Use functions in code to read sensitive information from cfg file

B. Copy the sensitive information to a cfg file

C. Add the cfg file to .gitignore file

D. Identify the sensitive information in IDE.

Select one:
a.

ABDC

b.

DBCA

c.

DACB

d.

DBCA

Question 1

Complete
Mark 1.00 out of 1.00
Flag question

Question text

When an user can fall victim of cross site scripting?

Select one:
a.

All of the above

b.

User fails to identify the forged links/websites

c.

User clicks on some link which then shouldn't be

d.

User's browser is compromised

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Sujata a senior developer of project has been assigned a task to look at the code structure and decoupling component wherever deemed necessary. What points she should keep in mind while checking?

Select one or more:
a.

Components responsibilities are maximized.

b.

Dependencies to external libraries are well known.

c.

The average complexity of classes, programs, methods, procedures, or functions is under control.

d.

There are no cyclic dependencies between classes, components or layers.

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following definitions provided by various personnel would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate? EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work. DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control. GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way. JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.

Select one:
a.

DANIEL's definition

b.

JOE's definition

c.

EVANA's definition

d.

GABRIEL's definition

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Identify the responsibilities of a DBA which includes

Select one:
a.

Granting and Denying user privileges

b.

Classifying data

c.

Creating user accounts and assigning passwords

d.

All of the above

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the best approach in Design Patterns in coding?

Select one:
a.

Writing codes with the highest possible coupling and the highest possible cohesion.

b.

Writing codes with the highest possible coupling and the Lowest possible cohesion.

c.

Writing codes with the lowest possible coupling and the highest possible cohesion.

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What are the three security features match the Server level security ?

Select one:
a.

Server roles

b.

All of them

c.

Logins

d.

Audits

Question 7

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Alex is addressing the Scrum Development Team and educating them on 'Courage', which is one of the core values of Scrum. Which of the following is an appropriate explanation that Alex can give his team on 'Courage' ?

i) Courage in sharing facts as it is

ii) Courage to change direction when needed

iii) Courage to support Scrum Values

iv) Courage to not deliver incomplete deliverables

Select one:
a.

None of the options

b.

Only i, ii and iii

c.

All the options

d.

Only ii, iii and iv

Question 8

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Ms. Tina working in a development of an application. She would like to trigger Jenkins job whenever there is a change detected either in the code or branches or any where in the code repository. Which build trigger option will be more suitable.

Select one:
a.

Poll SCM

b.

Facilitates periodic build

c.

GitHub hook trigger for GitSCM polling

d.

Trigger builds remotely using scripts

Question 9

Complete
Mark 0.50 out of 1.00
Flag question

Question text

In Accenture Code Quality Model, fundamental area of Performance and Scalability, select the important considerations from below -

Select one or more:
a.

Object pooling and recycling patterns

b.

Parallel processing and concurrency

c.

Sensitive data not being used or passed unnecessarily

d.

Data Encryption and encoding implementation

Question 10

Complete
Mark 1.00 out of 1.00
Flag question

Question text

After what activity we should raise a Change Request(CR)? (Choose the best option)

Select one:
a.

Any changes made after the design is complete

b.

Only functional requirement change needs CR

c.

Any changes to the requirements which come after entering the Design Stage. Since the requirements gets base lined at the end of Analyze stage.

d.

Any changes to the requirements which is realized in any stage

Question 1

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What are the three security features match the Database level security ?

Select one:
a.

Schemas, Users, Logins

b.

Logins, Users, Audits

c.

Schemas, Users, Roles

d.

Server Roles, Schemas, Audits

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What are various lines of businesses that Accenture Delivery Suite (ADS) support?

Select one:
a.

Technology, Industry, Operations, Security, and Strategy

b.

Technology, Digital, Operations, Security, and Cloud

c.

Technology, Digital, Operations, Security, and Strategy

d.

Technology, Digital, Operations, and Strategy

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

If we need to apply design patterns, can we do it without the principles of object-oriented programing and standards?

Select one:
a.

Yes, Design Patterns can be formed by principles, any programing language and standard

b.

Yes, Design Patterns are logical and comprehensive sequencing of elements with procedural principles

c.

No, Design Patterns are logical and comprehensive sequencing of elements with object-oriented principles only

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What are the three security features match the Server level security ?

Select one:
a.

Server roles

b.

Audits

c.

Logins

d.

All of them

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How does View enhance data security?

Select one:
a.

None

b.

By letting users to create a temporary table with any desired data

c.

By only allowing users to access to columns they require instead of entire table

d.

By creating one common view for all the tables

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which steps are recommended to be performed by Development team to optimize testing?

Select one or more:
a.

Overwirte the process

b.

Properly report risk

c.

Identify risk areas

d.

Exclude Test plan execution

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

If any team member, accidentally, pushed the sensitive information in their project's private github.com repository, what should be the step he/she has to take immediately?

Select one or more:
a.

Report the issue to ASOC and his/her manager immediately.

b.

Remove the sensitive information from github.com and delete the version history immediately.

c.

Copied code over to Accenture internal repository hence the code can be protected.

d.

No action needed as the repository is private and have access to only project team members.

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which SOLID principle represents the following statement " the vehicle is an abstract for truck and bike"?

Select one:
a.

Dependency Inversion Principle

b.

Liskov Substitution Principle

c.

Open/Closed Principle

d.

Single Responsibility Principle

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Ms. Julie has to write a project document that proposes the Configuration Management adoption into the project. Which among the below are the benefits you think Ms. Julie can quote in her document?

A. Establishes and maintains the integrity of the items that have been placed under its control

B. Accounts for and reports the progress of development efforts

C. Prevents unauthorized access to assets

D. Coordinates, tracks, and manages change activities

E. Facilitates concurrent development

Select one:
a.

A and B

b.

A,B,D,E

c.

B and C

d.

All of the above

Question 10

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Mr. John, a project manager wants to trigger the Jenkins pipeline everyday at 10 PM Only if that repository is modified/added with new code. What is the suitable build trigger for the above scenario?

Select one:
a.

Event-Driven

b.

Post Project Build

c.

Periodic

d.

Poll-Based

Question 11

Complete
Mark 1.00 out of 1.00
Flag question

Question text

"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object"Which pattern is it?

Select one:
a.

Behavioural Pattern

b.

Structural Pattern

c.

Singleton pattern

Question 12

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Kiran needs help in following the rules that must be followed while creating exception handling strategy. Which rules he must consider from below list ?

Select one or more:
a.

Delay till testing to rectify an incorrect exception.

b.

Differentiate between application business and technical exceptions.

c.

Think of a strategy for logging exceptions.

d.

Create meaningful exception messages.

Question 13

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Before using the "git commit" command, in the source code, if sensitive information is identified, in which order the actions to be performed to secure those sensitive data?

A. Use functions in code to read sensitive information from cfg file

B. Copy the sensitive information to a cfg file

C. Add the cfg file to .gitignore file

D. Identify the sensitive information in IDE.

Select one:
a.

DBCA

b.

DACB

c.

ABDC

d.

DBCA

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

When an user can fall victim of cross site scripting?

Select one:
a.

User's browser is compromised

b.

User clicks on some link which then shouldn't be

c.

User fails to identify the forged links/websites

d.

All of the above

Question 15

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A team has completed 10 Sprints and moving to the 11th Sprint. Till Sprint 10, the team has achieved an average of 50 story points per sprint. The same is projected as their velocity for the upcoming sprints with the Client. What is this approach called?

Select one:
a.

Commitment Driven Velocity

b.

Commitment Driven Sprint Planning

c.

Velocity Driven Sprint Planning

d.

Velocity Driven Commitment

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What are the different generic techniques followed in code optimization for independent platform?

Select one or more:
a.

Using memory efficient routines

b.

Cache optimization techniques

c.

Data-level parallelism

d.

Reducing the number of conditions.

Question 17

Complete
Mark 0.00 out of 1.00
Flag question

Question text

While designing the application, what is used to graphically represent application components and services; depicts the application boundaries and layering of components ?

Select one:
a.

Architecture Blueprint

b.

Interfaces

c.

Service Design

d.

Design Pattern

Question 18

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Code Review process involves which of the following steps:

Select one or more:
a.

Resolve review points

b.

Plan for a review

c.

Prepare for a review

d.

Baseline a software products

Question 19

Complete
Mark 0.50 out of 1.00
Flag question

Question text

What is the First Step in the process of Implementing Kanban?
Select one or more:
a.
WIP
b.
Kanban Board
c.
Queing the Stories
d.
Define Components

Question 20

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which areas of a code layout must be considered to reduce comments on methods and reduce errors?

Select one or more:
a.

Naming conventions

b.

Blocks of code

c.

Indentation

d.

The use of white space

Question 21

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is feature integration sprint?

Select one:
a.

A final sprint within the release for performing integration & regression testing

b.

First sprint of the release dedicated for planning

c.

Sprint that can be conducted as and when required for adhoc tasks

d.

A sprint outside release for performing cutover activities

Question 22

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Identify the responsibilities of a DBA which includes

Select one:
a.

Granting and Denying user privileges

b.

Creating user accounts and assigning passwords

c.

Classifying data

d.

All of the above

Question 23

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?

Select one:
a.

Code Optimization

b.

Memory Utilization

c.

Speed Optimization

d.

Memory Optimization

Question 24

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following tasks will be performed by the Configuration Manager?

Choose exactly THREE correct options.

Select one or more:
a.

Attends and facilitates CCB meetings.

b.

Tracks and Reports on CM status and audits.

c.

Makes sure that project complies with CM standards and procedures.

d.

Plans Configuration Management

Question 25

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How did object-oriented programming systems handle complexity better than procedural process?

Select one:
a.

Handling each task in isolation ensuring that we have the right degree of coupling in cohesion

b.

All the procedures were treated as an identifiable behavior of an object

c.

Tasks were divided into a number of sub tasks

Question 26

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following definitions provided by various personnel would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate? EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work. DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control. GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way. JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.

Select one:
a.

EVANA's definition

b.

JOE's definition

c.

GABRIEL's definition

d.

DANIEL's definition

Question 27

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Alex is addressing the Scrum Development Team and educating them on 'Courage', which is one of the core values of Scrum. Which of the following is an appropriate explanation that Alex can give his team on 'Courage' ?

i) Courage in sharing facts as it is

ii) Courage to change direction when needed

iii) Courage to support Scrum Values

iv) Courage to not deliver incomplete deliverables

Select one:
a.

Only i, ii and iii

b.

Only ii, iii and iv

c.

None of the options

d.

All the options

Question 28

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Mr Alex is required to do API testing for his application. Since Alex does have access to source code and know about how source code was implemented - kind of white box testing. Which of the following factors needs to be ensured by Alex while performing API testing?

Select one or more:
a.

Kind of data, or parameters, or arguments that API function requires as input

b.

API Data Flow

c.

API testing needs Sandbox Environments

d.

Valid datatype supported

Question 29

Complete
Mark 1.00 out of 1.00
Flag question

Question text

For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?

Select one or more:
a.

Always handle the exception as it is an unusual event that may occur.

b.

Write exceptions in usual flow of program.

c.

Create new types of exceptions to handle any kind of situation if need be.

d.

No need to document exceptions.

Question 30

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you? Choose exactly THREE correct options.

Select one or more:
a.

Integration Baseline

b.

Testing Baseline

c.

Requirements Baseline

d.

Architecture Baseline

Question 31

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What guidelines should be followed for creating the Accenture coding standards?

Select one or more:
a.

Must be created after the build stage

b.

Coding Standards should be easy to understand

c.

Should be agreed upon across project teams spanning globally.

d.

Multiple developers rewrite each other's code to match their personal styles

Question 32

Complete
Mark 1.00 out of 1.00
Flag question

Question text

In a Build Triggers section of a Jenkins job, Build Periodically is selected and the corresponding value is provided as "2 15 * * 3". What does that mean?

Choose the most appropriate answer.

Select one:
a.

Build Triggers periodically every Wednesday in a week at 3:02 PM as per the local time

b.

Build Triggers periodically every 3rd day of month at 2:15 AM as per the local time

c.

Build Triggers periodically every Wednesday in a week at 2:15 AM as per the local time

d.

Build Triggers periodically for every 3 minutes of every hour on 15th February of every year

Question 33

Complete
Mark 1.00 out of 1.00
Flag question

Question text

When we try to push the changes into github.com using git, few git commands need to be executed. Identify the right order of execution of the following git commands.

Select one:
a.

git commit -m "Commenting"git pushgit add

b.

git addgit commit -m "Commenting"git push

c.

git commit -m "Commenting"git addgit push

d.

git pushgit addgit commit -m "Commenting"

Question 34

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Mr.Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.

A. Levels of Control

B. Selecting CIs

C. Determining categories of CM

D. Naming Conventions

E. Configuration Items(CIs)

Select one:
a.

C,A,E,D,B

b.

C,E,D,A,B

c.

C,B,D,A,E

d.

D,E,B,A,C

Question 35

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the key benefit of the least privilege approach to security?

Select one:
a.

It results in the tasks being completed quicker

b.

Ensures modular, reusable output

c.

It minimizes the level of compromise in the event of a security breech

Question 36

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What are the components of Accenture Delivery Suite (ADS)?

Select one:
a.

Methods & Estimators, Tools, Architecture, Metrics

b.

Methods & Estimators, Deliverables, Architecture, Metrics

c.

Methods & Estimators, Tools, Process, Metrics

d.

Baseline a software products

Question 37

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What are the ADM 5 main focus areas?

Select one or more:
a.

Planning

b.

Operations

c.

Management

d.

Development

Question 38

Complete
Mark 1.00 out of 1.00
Flag question

Question text

ADOP is built on a ___________ infrastructure

Select one:
a.

Ansible

b.

Kubernetes

c.

Docker

d.

SaltStack

Question 39

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Swiss Knife is capable enough to perform multiple tasks but if you want to change one of the blade or components of the Swiss Knife, all other components need to be removed as well, meaning has impact. Which SOLID principle does the above quote does not satisfy?
Select one:
a.
Interface segregation
b.
Dependency Inversion Principle
c.
Open Closed Principle
d.
Single responsibility

Question 40

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What relationship(s) can a work product have to task?

Select one:
a.

Optional input, mandatory input, primary output and secondary output.

b.

Input only

c.

Input and Output

d.

Output only

Question 41

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which type of risk analysis agile team uses to rank risks by evaluating their probability of occurrence and impact?

Select one:
a.

Quantitative analysis

b.

Assumptions analysis

c.

Risk Burndown Chart

d.

Qualitative analysis

Question 42

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which factors we should consider during Regression Testing?A. Code changes are Inevitable over time B. Code changes can have unintended negative consequencesC. Code Changes includes code/plugin/dependency additions D. All of the above E. None
Select one:
a.
D
b.
A and B
c.
E
d.
A, B and C

Question 43

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is CORRECT about a Proxy Product Owner?i) Proxy PO comes into picture when PO is absentii) Proxy PO has all the power and authority as that of a POiii) Proxy PO can make 'Go' or 'No-Go' decisions with the teams

Select one:
a.

Only ii and iii

b.

Only iii

c.

Only i

d.

All the options

Question 44

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Identify the services provided by Microservices when compare to Design Patterns.

Select one or more:
a.

Code Access

b.

Catalog of Solutions

c.

Implementation

d.

Environment

Question 45

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The most encouraged time of day to hold a Scrum Daily Meeting is ___________________.

Select one:
a.

Immediately after lunch

b.

The beginning of the day

c.

At 7:00 PM

d.

At 4:30 PM

Question 46

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following is a set of automated processes that allows developers and operations to reliably and efficiently compile, build and deploy applications or services to production environments or platforms?

Select one:
a.

Accenture DevOps Platform

b.

DevOps Environment Pipeline

c.

Continuous Integration

d.

DevOps Delivery Pipeline

Question 47

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How to ensure reusability of code in a project?

Select one or more:
a.

No dependable modules

b.

Having highly dependable blocks

c.

Having loosely coupled system

d.

Sometimes you do this by breaking it into multiple independent blocks

Question 48

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the best approach in Design Patterns in coding?

Select one:
a.

Writing codes with the highest possible coupling and the Lowest possible cohesion.

b.

Writing codes with the highest possible coupling and the highest possible cohesion.

c.

Writing codes with the lowest possible coupling and the highest possible cohesion.

Question 49

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Complete the statement: Application Design can be done using ______

Select one:
a.

Packaged Only

b.

Always Both

c.

Custom Only

d.

Custom/Packaged/Both

Question 50

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the website to access Accenture Delivery Suite(ADS)?

Select one:
a.

https://ads.acceture.com

b.

https://in.accenture.com/accenturedeliverysuite/

c.

https://accenturedeliverysuite.accenture.com

d.

https://methodology.accenture.com

Question 1

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Cameroon is a Middle African country. The government of this country has lot of data on paper media and it is very crucial and essential data. It must be retained for centuries. The country has decided to go for Cloud services and taken a service from very well-known cloud service platform. If you are a cloud solution architect, which XaaS you suggest to the governament of Cameroon?

Select one:
a.

CaaS

b.

BPaaS

c.

DaaS

d.

STaaS

Feedback

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

In which situation a looping error will not occur?

Select one:
a.

Loops are terminated incorrectly or not terminated at all.

b.

Loop conditions are initialized incorrectly or not at all.

c.

Improper nesting occurs.

d.

Loops variables are initialized correctly.

Feedback

Question 3

Complete
Mark 0.00 out of 1.00
Flag question

Question text

How did object-oriented programing systems handle complexity better than procedural process?

Select one:
a.

Tasks were divided into a number of sub tasks

b.

Handling each task in isolation ensuring that we have the right degree of coupling in cohesion

c.

All the procedures were treated as an identifiable behavior of an object.

Feedback

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.

Select one:
a.

Integration Testing

b.

Component testing

c.

Module Testing

d.

API Testing

Feedback

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A malicious or unexpected data is somehow programmatically fed into the application leading to compromise of security. What kind of hacking is this?

Select one:
a.

Broken security or authentication

b.

Insecure Direct Object Reference

c.

Cross site scripting

d.

Injection - Correct

Feedback

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

"This pattern evaluates scenarios where you need just one object and you don't want to create multiple objects of that particular class. Or simply put restricting construction of more than one object" Which pattern is it?

Select one:
a.

Singleton pattern

b.

Structural Pattern

c.

Behavioral Pattern

Feedback

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.

Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.

A. Determine CI Categories.

B. Determine CM Control Levels.

C. Determine CI Tools.

D. Determine CI Naming Conventions.

E. Audits and Status Reporting

F. Select CIs

Select one:
a.

A,C,D,E

b.

A,B,E,F

c.

A,B,C,D,F

d.

A,B,C,D

Feedback

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following definitions provided by various personnel's would correctly depicts CONFIGURATION MANAGEMENT and is the most appropriate?

EVANA defines CONFIGURATION MANAGEMENT as what we do to make sure we have backed up our work.

DANIEL defines CONFIGURATION MANAGEMENT as same thing as version control .

GABRIEL defines CONFIGURATION MANAGEMENT as the process of identifying, communicating, implementing, documenting, and managing work products in a structured and repeatable way.

JOE defines CONFIGURATION MANAGEMENT is just for code, making sure right code gets into the project at right time.

Select one:
a.

JOE's definition

b.

GABRIEL's definition

c.

EVANA's definition

d.

DANIEL's definition

Feedback

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

To secure the http messages in the API calls, its necessary to:

Select one:
a.

All the above

b.

implement identity management

c.

Use cryptography

d.

avoid hardcoding any sensitive data in the messages

Feedback

Question 10

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is not a Scrum Artifact?

Select one:
a.

Release Backlog

b.

Sprint Backlog

c.

Product Backlog

d.

Definition of Done

Feedback

+

++ Coming more...

Comments

Popular posts from this blog

What is Apache Hive?

Apache Hive is one of Apache's top-level projects. Hive is a data warehouse and ETL for a large dataset in distributed storage. Hive supports different types of storage formats like CSV, TSV, Parquet, ORC (Optimized Row Column), and others. It is used for the analytical processing of structured data using an SQL-like interface. Hive is built on top of Hadoop. Apache Hive      ~ https://hive.apache.org/ Hive is a software project that provided data querying and analysis. It facilitates the reading, writing, and handling of a wide dataset that is stored in distributed storage and queried by SQL syntax, HiveQL.  Hive provides the necessary abstraction to the Hadoop environment by projecting structure on data in HDFS storage so that SQL queries can be integrated with the low-level Java API.  Hive also provides a command-line tool and Java Database Connectivity (JDBC) driver that can be used to connect to Hive.  Hive was co-created by Joydeep Sen Sarma and ...