Question 1
Question text
To secure the http messages in the API calls, its necessary to:
All the above
Use cryptography
implement identity management
avoid hardcoding any sensitive data in the messages
Feedback
Question 2
Question text
A team has completed 10 Sprints and moving to the 11th Sprint. Till Sprint 10, the team has achieved an average of 50 story points per sprint. The same is projected as their velocity for the upcoming sprints with the Client. What is this approach called?
Velocity Driven Sprint Planning
Velocity Driven Commitment
Commitment Driven Velocity
Commitment Driven Sprint Planning
Feedback
Question 3
Question text
Jack is grooming himself to be a potential Product Owner. Knowing the desired qualities of a Product Owner will help him groom well for the role. Which of the following are the desired qualities of a Product Owner?
i) PO should be a Domain Expert
ii) PO should be able to communicate with technical audience
iii) PO should be able to communicate with business audience
iv) PO should be a respectable person by the Scrum Team members
Only i and iv
Only i, iii and iv
Only i and iii
All the options
Feedback
Question 4
Question text
Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration
Item categories that are quoted below -
A. Project Documentation
B. Architectures
C. Interfaces
D. Designs
E. Source code and Executable code.
Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added.
Assume that you are Mr. Vincent and determine few more categories that can be added to the same.
Requirements
Training materials
Databases that include processed data
Metrics and Status Reports
Feedback
Question 5
Question text
Mr. Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.
A. Levels of Control.
B. Selecting CIs
C. Determining categories of CM
D. Naming Conventions
E. Configuration Items(CIs)
C,A,E,D,B
C,B,D,A,E
D,E,B,A,C
C,E,D,A,B
Feedback
Question 6
Question text
Which of the following action to be taken before pushing the code into github.com when we have sensitive information in the source code ?
Replace the sensitive data with mock data
Delete all the sensitive information
No change needed as the information is needed for application functionality
Move the sensitive information to .gitignore file
Feedback
Question 7
Question text
Identify the services provided by Microservices when compare to Design Patterns.
Code Access
Implementation
Environment
Catalog of Solutions
Feedback
Question 8
Question text
What was seen in application over time, which creates the need of solutions which could also be used in other projects?
Faster time to market
More effective and efficient process
Complexity of application and managing business
Feedback
Question 9
Question text
Which of the following is a unit of work that a role may be asked to perform?
Work?ow
Work Unit
Activity
Task
Feedback
Question 10
Question text
Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.
Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.
A. Determine CI Categories.
B. Determine CM Control Levels.
C. Determine CI Tools.
D. Determine CI Naming Conventions.
E. Audits and Status Reporting
F. Select CIs
A,B,C,D
A,B,E,F
A,B,C,D,F
A,C,D,E
Feedback
Question 11
Question text
In Scrum ban, impediments are
hidden
avoided
fixed
attended
Feedback
Question 12
Question text
What practices should be used when building a complex system ?
Designing for testability
Using a modular design
Using components with tight coupling
Maximizing cohesion between components
Feedback
Question 13
Question text
Which are the external application-oriented devices that provide application security?
HTTPS
API Gateway
Citrix
DAM
WAF
Feedback
Question 14
Question text
Which of the following statement is not CORRECT about code quality metrics?
Tight coupling and low cohesion indicates high quality of code
Cyclomatic complexity measures the complexity of a program.
Comment density is measured by dividing the number of comment lines by the total lines of code.
Checking code duplication.
Feedback
Question 15
Question text
Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?
Memory Optimization
Code Optimization
Memory utilization
Speed Optimization
Feedback
Question 16
Question text
Ms. Tina working in a development of an application. She would like to trigger Jenkins job whenever there is a change detected either in the code or branches or any where in the code repository. Which build trigger option will be more suitable.
GitHub hook trigger for GitSCM polling
Poll SCM
Facilitates periodic build
Trigger builds remotely using scripts
Feedback
Question 17
Question text
Identify the order of steps for Code review process.
a. Conduct a review
b. Plan for a review
c. Resolve review points
d. Validate resolutions
e. Prepare for a review
f. Baseline a software work product
b, f, a, e, c, d
b, e, a, c, d, f
a, c, b, e, f, d
b, f, a, e, c, d
Feedback
Question 18
Question text
For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?
Create new types of exceptions to handle any kind of situation if need be.
Always handle the exception as it is an unusual event that may occur.
Write exceptions in usual flow of program.
No need to document exceptions.
Feedback
Question 19
Question text
Which of the following could be input or output of a task? (Select all that apply.)
Artifact
Outcome
Role
Deliverable
Feedback
Question 20
Question text
Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you?
Choose exactly THREE correct options.
Requirements Baseline
Integration Baseline
Architecture Baseline
Testing Baseline
Feedback
Question 21
Question text
Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.
VSS(Visual SourceSafe)
PVCS(Poly Version Control System)
Mercurial
GitLab
Feedback
Question 22
Question text
How does ADM align to the new ?
Extensions and Context
Vastness
Longevity
Reputability
Feedback
Question 23
Question text
What is the work / assets grouped by business area?
Stage
Activity or Discipline
Workstream
Feedback
Your answer is correct.
Question 24
Question text
Accenture DevOps Platform (ADOP) is a cloud-hosted development and operations environment that can be used for which of the following continuous process. Choose three most appropriate options.
Release
Planning
Monitoring
Testing
Feedback
Question 25
Question text
What is the key benefit of the least privilege approach to security?
Ensures modular, reusable output
it minimized the level of compromise in the event of a security breech
it results in the tasks being completed quicker
Feedback
Question 26
Question text
Identify the state that refers High degree of Coupling.
Big change can break your code and this could have a disastrous effect on your application
Small change can break your code and this could have a disastrous effect on your application
Adding a functionality to your application is difficult and effects your application
Feedback
Question 27
Question text
At home we replace an old CFL bulb to a new LED bulb. Although we change the bulb, we don’t change the functionality. which SOLID principle does it satisfy?
Dependency Inversion Principle
Liskov substitution
Open Closed Principle
Interface segregation
Feedback
Question 28
Question text
Identify the responsibilities of a DBA which includes.
Creating user accounts and assigning passwords
Classifying data
All of the above
Granting and Denying user privileges
Feedback
Question 29
Question text
In Accenture Code Quality Model, fundamental area of Performance and Scalability, select the important considerations from below -
Sensitive data not being used or passed unnecessarily
Object pooling and recycling patterns
Data Encryption and encoding implementation
Parallel processing and concurrency
Feedback
Question 30
Question text
While doing TDD, Which of the following is recommended?
Writing Large or course-grained tests
Writing trivial tests that are too small
Writing exhaustive test cases upfront
Tests to be frequently run for effectiveness
Feedback
Question 31
Question text
Feedback
Question 32
Question text
Which of the following is NOT one of the 9 key principles of GRASP?
High Cohesion
Inheritance
Low Coupling
Creator
Feedback
Question 33
Question text
Manoj from network and Infrastructure team was to update the firewall rules on Saturday night to disable any requests coming from EU region into the banking application as the business was recently closed in EU. However, Manoj missed doing this update while working on other requests. What kind of security threat is the bank now vulnerable to?
Insufficient attack protection
Cross site scripting
Broken Authentication
Security Misconfiguration
Feedback
Question 34
Question text
While doing the daily scrum ceremony, the true spirit of the ceremony should be?
sharing updates among team members
reporting updates to scrum master
sharing updates among scrum masters
reporting updates to product owner
Feedback
Question 35
Question text
Question 36
Question text
What is feature integration sprint?
A sprint outside release for performing cutover activities
First sprint of the release dedicated for planning
A final sprint within the release for performing integration & regression testing
Sprint that can be conducted as and when required for adhoc tasks
Feedback
Question 37
Question text
Joshua being a project manager, need to suggest methods to developers of project so that client become high-performance businesses by delivering high-quality code. Which are they?
Using automated code review tools, if permitted by client
Adhere to Accenture Delivery Methods best practices and guidelines
Implementing the practice of peer reviews.
Follow the Accenture Code Quality Model
Feedback
Question 38
Question text
Which SOLID principle helps the use to develop less coupled code by ensuring the high level modules depend on abstraction rather than concrete implementations of lower level modules?
Interface segregation
Open Closed Principle
Single responsibility
Dependency Inversion Principle
Feedback
Question 39
Question text
What are the three security features match the Database level security ?
Schemas, users, roles
Schemas, users, logins
Logins, Users, Audits
Server Roles, schemas, Audits
Feedback
Question 40
Question text
What are the components of Accenture Delivery Suite(ADS)?
Methods & Estimators, Deliverables, Architecture, Metrics
Methods & Estimators, Deliverables, Process, Metrics
Methods & Estimators, Tools, Architecture, Metrics
Methods & Estimators, Tools, Process, Metrics
Feedback
Question 41
Question text
Swiss Knife is capable enough to perform multiple tasks but if you want to change one of the blade or component of the Swiss Knife, all other components need to be removed as well, meaning has impact. Which SOLID principle does the above quote does not satisfy?
Open Closed Principle
Single responsibility
Interface segregation
Dependency Inversion Principle
Feedback
Question 42
Question text
Which of the following mitigation techniques can be adopted to avoid Broken Authentication & Session Management problems?
1. Encryption
2. Output Encoding
3. Hardening user account management
4. Configuring the appropriate session timeout values
1 and 2
2 and 3
1 and 4
3 and 4
Feedback
Question 43
Question text
John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him?
Name of methods does not matter.
Limit the method size between 100 and 150 code lines by refactoring it.
Group logically related statements for easy readability
It's okay to have hard-coded values in the same code
Feedback
Question 44
Question text
A malicious or unexpected data is somehow programmatically fed into the application leading to compromise of security. What kind of hacking is this?
Injection - Correct
Insecure Direct Object Reference
Broken security or authentication
Cross site scripting
Feedback
Question 45
Question text
In a Build Triggers section of a Jenkins job, Build Periodically is selected and the corresponding value is provided as "2 15 * * 3". What does that mean? Choose the most appropriate answer.
Build Triggers periodically every Wednesday in a week at 2:15 AM as per the local time
Build Triggers periodically every 3rd day of month at 2:15 AM as per the local time
Build Triggers periodically every Wednesday in a week at 3:02 PM as per the local time
Build Triggers periodically for every 3 minutes of every hour on 15th February of every year
Feedback
Question 46
Question text
Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?
People
Process
All of the options
Tools
Feedback
Question 47
Question text
What is the best approach in Design Patterns in coding?
Writing codes with the highest possible coupling and the Lowest possible cohesion.
Writing codes with the lowest possible coupling and the highest possible cohesion.
Writing codes with the highest possible coupling and the highest possible cohesion.
Feedback
Question 48
Question text
Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.
Component testing
Integration Testing
Module Testing
API Testing
Feedback
Question 49
Question text
Identify the state that refers High degree of Coupling
Big change can break your code and this could have a disastrous effect on your application
Adding a functionality to your application is difficult and effects your application
Small change can break your code and this could have a disastrous effect on your application
Feedback
Question 50
Question text
Who is responsible for analyzing the project performance and identifying the corrective and preventive actions?
Scrum Master
Development Team
Project Manager
Product Owner
Comments
Post a Comment