Skip to main content

DFA Solutions

 

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To secure the http messages in the API calls, its necessary to:

Select one:
a.

All the above

b.

Use cryptography

c.

implement identity management

d.

avoid hardcoding any sensitive data in the messages

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

A team has completed 10 Sprints and moving to the 11th Sprint. Till Sprint 10, the team has achieved an average of 50 story points per sprint. The same is projected as their velocity for the upcoming sprints with the Client. What is this approach called?

Select one:
a.

Velocity Driven Sprint Planning

b.

Velocity Driven Commitment

c.

Commitment Driven Velocity

d.

Commitment Driven Sprint Planning

Feedback

Question 3

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Jack is grooming himself to be a potential Product Owner. Knowing the desired qualities of a Product Owner will help him groom well for the role. Which of the following are the desired qualities of a Product Owner?

i) PO should be a Domain Expert

ii) PO should be able to communicate with technical audience

iii) PO should be able to communicate with business audience

iv) PO should be a respectable person by the Scrum Team members

Select one:
a.

Only i and iv

b.

Only i, iii and iv

c.

Only i and iii

d.

All the options

Feedback

Question 4

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Mr. Neil has to create a project document that includes Configuration Item categories in the project he is currently working on. He has proposed the Configuration

Item categories that are quoted below -

A. Project Documentation

B. Architectures

C. Interfaces

D. Designs

E. Source code and Executable code.

Mr. Vincent is the Configuration Manager in the project. While reviewing the document, Mr. Vincent has found that few more configuration item categories can be added.

Assume that you are Mr. Vincent and determine few more categories that can be added to the same.

Select one or more:
a.

Requirements

b.

Training materials

c.

Databases that include processed data

d.

Metrics and Status Reports

Feedback

Question 5

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Mr. Anthony is the Configuration Manager for the ABC Utility. He has to plan Configuration Management. Planning CM has a set of sequential steps associated with it. Assume that you are part of CM Team and arrange the steps which are mentioned below in the sequential order while planning CM.

A. Levels of Control.

B. Selecting CIs

C. Determining categories of CM

D. Naming Conventions

E. Configuration Items(CIs)

Select one:
a.

C,A,E,D,B

b.

C,B,D,A,E

c.

D,E,B,A,C

d.

C,E,D,A,B

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following action to be taken before pushing the code into github.com when we have sensitive information in the source code ?

Select one:
a.

Replace the sensitive data with mock data

b.

Delete all the sensitive information

c.

No change needed as the information is needed for application functionality

d.

Move the sensitive information to .gitignore file

Feedback

Question 7

Partially correct
Mark 0.33 out of 1.00
Remove flag

Question text

Identify the services provided by Microservices when compare to Design Patterns.

Select one or more:
a.

Code Access

b.

Implementation

c.

Environment

d.

Catalog of Solutions

Feedback

Question 8

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

What was seen in application over time, which creates the need of solutions which could also be used in other projects?

Select one:
a.

Faster time to market

b.

More effective and efficient process

c.

Complexity of application and managing business

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is a unit of work that a role may be asked to perform?

Select one:
a.

Work?ow

b.

Work Unit

c.

Activity

d.

Task

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Mr. Vincent is the Configuration Manager for one project in Accenture. He has to identify and establish Configuration Items.

Assume that you are Mr. Vincent and select the steps involved while identifying and establishing CIs mentioned below.

A. Determine CI Categories.

B. Determine CM Control Levels.

C. Determine CI Tools.

D. Determine CI Naming Conventions.

E. Audits and Status Reporting

F. Select CIs

Select one:
a.

A,B,C,D

b.

A,B,E,F

c.

A,B,C,D,F

d.

A,C,D,E

Feedback

Question 11

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In Scrum ban, impediments are

Select one:
a.

hidden

b.

avoided

c.

fixed

d.

attended

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

What practices should be used when building a complex system ?

Select one or more:
a.

Designing for testability

b.

Using a modular design

c.

Using components with tight coupling

d.

Maximizing cohesion between components

Feedback

Question 13

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

Which are the external application-oriented devices that provide application security?

Select one or more:
a.

HTTPS

b.

API Gateway

c.

Citrix

d.

DAM

e.

WAF

Feedback

Question 14

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following statement is not CORRECT about code quality metrics?

Select one:
a.

Tight coupling and low cohesion indicates high quality of code

b.

Cyclomatic complexity measures the complexity of a program.

c.

Comment density is measured by dividing the number of comment lines by the total lines of code.

d.

Checking code duplication.

Feedback

Question 15

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Mr John has developed a software program and to make his program run faster he allows portion of the program to reside in a computer's memory. However, this approach will cause the program to consume more memory. As a result, the program will be optimized in terms of speed, but will be inefficient in terms of memory utilization. What Mr. John is trying to achieve in this scenario?

Select one:
a.

Memory Optimization

b.

Code Optimization

c.

Memory utilization

d.

Speed Optimization

Feedback

Question 16

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text

Ms. Tina working in a development of an application. She would like to trigger Jenkins job whenever there is a change detected either in the code or branches or any where in the code repository. Which build trigger option will be more suitable.

Select one:
a.

GitHub hook trigger for GitSCM polling

b.

Poll SCM

c.

Facilitates periodic build

d.

Trigger builds remotely using scripts

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the order of steps for Code review process.

a. Conduct a review

b. Plan for a review

c. Resolve review points

d. Validate resolutions

e. Prepare for a review

f. Baseline a software work product

Select one:
a.

b, f, a, e, c, d

b.

b, e, a, c, d, f

c.

a, c, b, e, f, d

d.

b, f, a, e, c, d

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions?

Select one or more:
a.

Create new types of exceptions to handle any kind of situation if need be.

b.

Always handle the exception as it is an unusual event that may occur.

c.

Write exceptions in usual flow of program.

d.

No need to document exceptions.

Feedback

Question 19

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Which of the following could be input or output of a task? (Select all that apply.)

Select one or more:
a.

Artifact

b.

Outcome

c.

Role

d.

Deliverable

Feedback

Question 20

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project's work according to you?

Choose exactly THREE correct options.

Select one or more:
a.

Requirements Baseline

b.

Integration Baseline

c.

Architecture Baseline

d.

Testing Baseline

Feedback

Question 21

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is trying to determine which CM Tool to use. Assume that you are part of CM team and select the appropriate tool to use. Choose exactly THREE correct options.

Select one or more:
a.

VSS(Visual SourceSafe)

b.

PVCS(Poly Version Control System)

c.

Mercurial

d.

GitLab

Feedback

Question 22

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

How does ADM align to the new ?

Select one or more:
a.

Extensions and Context

b.

Vastness

c.

Longevity

d.

Reputability

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the work / assets grouped by business area?

Select one:
a.

Stage

b.

Activity or Discipline

c.

Workstream

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Remove flag

Question text

Accenture DevOps Platform (ADOP) is a cloud-hosted development and operations environment that can be used for which of the following continuous process. Choose three most appropriate options.

Select one or more:
a.

Release

b.

Planning

c.

Monitoring

d.

Testing

Feedback

Question 25

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the key benefit of the least privilege approach to security?

Select one:
a.

Ensures modular, reusable output

b.

it minimized the level of compromise in the event of a security breech

c.

it results in the tasks being completed quicker

Feedback

Question 26

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the state that refers High degree of Coupling.

Select one:
a.

Big change can break your code and this could have a disastrous effect on your application

b.

Small change can break your code and this could have a disastrous effect on your application

c.

Adding a functionality to your application is difficult and effects your application

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

At home we replace an old CFL bulb to a new LED bulb. Although we change the bulb, we don’t change the functionality. which SOLID principle does it satisfy?

Select one:
a.

Dependency Inversion Principle

b.

Liskov substitution

c.

Open Closed Principle

d.

Interface segregation

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the responsibilities of a DBA which includes.

Select one:
a.

Creating user accounts and assigning passwords

b.

Classifying data

c.

All of the above

d.

Granting and Denying user privileges

Feedback

Question 29

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

In Accenture Code Quality Model, fundamental area of Performance and Scalability, select the important considerations from below -

Select one or more:
a.

Sensitive data not being used or passed unnecessarily

b.

Object pooling and recycling patterns

c.

Data Encryption and encoding implementation

d.

Parallel processing and concurrency

Feedback

Question 30

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

While doing TDD, Which of the following is recommended?

Select one:
a.

Writing Large or course-grained tests

b.

Writing trivial tests that are too small

c.

Writing exhaustive test cases upfront

d.

Tests to be frequently run for effectiveness

Feedback

Question 31

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Digital asset management comes in the form of a software or appliance device that can be used on which of the following?
Select one or more:
a.
cloud-based model
b.
Mobiles and laptops
c.
All electronic gadgets
d.
on-premises

Feedback

Question 32

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is NOT one of the 9 key principles of GRASP?

Select one:
a.

High Cohesion

b.

Inheritance

c.

Low Coupling

d.

Creator

Feedback

Question 33

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Manoj from network and Infrastructure team was to update the firewall rules on Saturday night to disable any requests coming from EU region into the banking application as the business was recently closed in EU. However, Manoj missed doing this update while working on other requests. What kind of security threat is the bank now vulnerable to?

Select one:
a.

Insufficient attack protection

b.

Cross site scripting

c.

Broken Authentication

d.

Security Misconfiguration

Feedback

Question 34

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

While doing the daily scrum ceremony, the true spirit of the ceremony should be?

Select one:
a.

sharing updates among team members

b.

reporting updates to scrum master

c.

sharing updates among scrum masters

d.

reporting updates to product owner

Feedback

Question 35

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which are the common coding situations that Developers come across frequently from below?
Select one:
a.
code is inconsistent
b.
code is not well commented
c.
Code is not well-formatted
d.
code is complex

Question 36

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is feature integration sprint?

Select one:
a.

A sprint outside release for performing cutover activities

b.

First sprint of the release dedicated for planning

c.

A final sprint within the release for performing integration & regression testing

d.

Sprint that can be conducted as and when required for adhoc tasks

Feedback

Question 37

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Joshua being a project manager, need to suggest methods to developers of project so that client become high-performance businesses by delivering high-quality code. Which are they?

Select one or more:
a.

Using automated code review tools, if permitted by client

b.

Adhere to Accenture Delivery Methods best practices and guidelines

c.

Implementing the practice of peer reviews.

d.

Follow the Accenture Code Quality Model

Feedback

Question 38

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which SOLID principle helps the use to develop less coupled code by ensuring the high level modules depend on abstraction rather than concrete implementations of lower level modules?

Select one:
a.

Interface segregation

b.

Open Closed Principle

c.

Single responsibility

d.

Dependency Inversion Principle

Feedback

Question 39

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What are the three security features match the Database level security ?

Select one:
a.

Schemas, users, roles

b.

Schemas, users, logins

c.

Logins, Users, Audits

d.

Server Roles, schemas, Audits

Feedback

Question 40

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What are the components of Accenture Delivery Suite(ADS)?

Select one:
a.

Methods & Estimators, Deliverables, Architecture, Metrics

b.

Methods & Estimators, Deliverables, Process, Metrics

c.

Methods & Estimators, Tools, Architecture, Metrics

d.

Methods & Estimators, Tools, Process, Metrics

Feedback

Question 41

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Swiss Knife is capable enough to perform multiple tasks but if you want to change one of the blade or component of the Swiss Knife, all other components need to be removed as well, meaning has impact. Which SOLID principle does the above quote does not satisfy?

Select one:
a.

Open Closed Principle

b.

Single responsibility

c.

Interface segregation

d.

Dependency Inversion Principle

Feedback

Question 42

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following mitigation techniques can be adopted to avoid Broken Authentication & Session Management problems?

1. Encryption

2. Output Encoding

3. Hardening user account management

4. Configuring the appropriate session timeout values

Select one:
a.

1 and 2

b.

2 and 3

c.

1 and 4

d.

3 and 4

Feedback

Question 43

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

John has written code that includes multiple methods that is not synonymous with functionality of it. Many of those methods contain lots of nested statements, hard coded values and over 500 lines of code. What standard coding patterns would you suggest to him?

Select one or more:
a.

Name of methods does not matter.

b.

Limit the method size between 100 and 150 code lines by refactoring it.

c.

Group logically related statements for easy readability

d.

It's okay to have hard-coded values in the same code

Feedback

Question 44

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

A malicious or unexpected data is somehow programmatically fed into the application leading to compromise of security. What kind of hacking is this?

Select one:
a.

Injection - Correct

b.

Insecure Direct Object Reference

c.

Broken security or authentication

d.

Cross site scripting

Feedback

Question 45

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In a Build Triggers section of a Jenkins job, Build Periodically is selected and the corresponding value is provided as "2 15 * * 3". What does that mean? Choose the most appropriate answer.

Select one:
a.

Build Triggers periodically every Wednesday in a week at 2:15 AM as per the local time

b.

Build Triggers periodically every 3rd day of month at 2:15 AM as per the local time

c.

Build Triggers periodically every Wednesday in a week at 3:02 PM as per the local time

d.

Build Triggers periodically for every 3 minutes of every hour on 15th February of every year

Feedback

Question 46

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Sprint Retrospective ceremony can include an analysis of how the recent sprint went with respect to which of the following?

Select one:
a.

People

b.

Process

c.

All of the options

d.

Tools

Feedback

Question 47

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the best approach in Design Patterns in coding?

Select one:
a.

Writing codes with the highest possible coupling and the Lowest possible cohesion.

b.

Writing codes with the lowest possible coupling and the highest possible cohesion.

c.

Writing codes with the highest possible coupling and the highest possible cohesion.

Feedback

Question 48

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Mr John is working for an E-commerce application, There are various interdependent components to this application like Payment Provider, and Gateway, etc.. Choose CORRECT options for suitable testing needs to be performed to test the whole solution.

Select one:
a.

Component testing

b.

Integration Testing

c.

Module Testing

d.

API Testing

Feedback

Question 49

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Identify the state that refers High degree of Coupling

Select one:
a.

Big change can break your code and this could have a disastrous effect on your application

b.

Adding a functionality to your application is difficult and effects your application

c.

Small change can break your code and this could have a disastrous effect on your application

Feedback

Question 50

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Who is responsible for analyzing the project performance and identifying the corrective and preventive actions?

Select one:
a.

Scrum Master

b.

Development Team

c.

Project Manager

d.

Product Owner

Feedback

Comments

Subscribe to Get's Answer by Email