Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

1.

Mr John has developed a software program and to make his program run faster he allows portion of
the program to reside in a computer memory……..

Ans.speed optimization

2. The most encouraged time of day to hold a scrum daily meeting is ……

Ans. The beginning of the day ,at 7.00 pm

3. which of the following are not benifits of code optimization techniques?

ans. improves the organization's performance

improves the compilation time of an application.

4. which of the following statement is not corrct about code quality metrics?

ans.cyclomatic complexity measures the complexity of a program.

5. which of the following is not one of the 9 key principles of GRASP?

ans. Inheritance

6. cls are the work products within the selected categories that the project wants under configuration
controle.

Imagine you are the person for writing the CM plan who typically works with the team leads ........

ans. product manager or configuration manager

7. what are various lines of businesses that accenture delivery suite(ADS)support?

ans.technology,digital,operations,security,and strategy.

8. A team is referring to the latest version of the product backlog to work ont he deliverables.who is
responsible

for the content availability and orddering of the items....

ans.product owner
9. a technique to render the untrusted data such as user input into literal texts so that

when any malicious code is input, it will not be ......security measure aganist...

ans.applying least privilege, insufficient attack protection.

10.what are the responsibilities of the change control board?

ans. b.review and authorize changes to the baselines.

d.Monitor changes and updates to the project requirements as part of cm.

11. consider the dockerfile code-(Assume the petclinic war ad server,xml files are avalible in the current
working directory)

ans. run keyword excutes the shell command during yoour image build where as CMD.

12. what guidelines should be followed for creating the accenture coding standards?

ans.b.should be agreed upon across project teams spanning globally

c.coding standards should be easy to understand.

13. -------helps the dessign process,whereas---- is more suitable for integration..

ans.c.TDD,TDD

14. how does microservices provide small,manageable,and deployable components?

ans.a.micro-service containers.

15. while doing the daily scrum cermony,the true sprit of the ceremony shouldbe?

ans .c.reporting updates to scrum master.

16. In the sprint planning meeting at the ---,the team along with the po selects the goal in one-sentence
foor overall outcome of the sprint.

ans.c.Beginning of sprint planning

17. In accenture code quality model, fundamental area of performanance and scalability,select ....

ans.c.sensitive data not being used or passed unnecessarily.

which

18. customer walks into an ATM to withdraw money. the money dispensed from the ATM..... the ATM
was not able to print its transaction receiptas ATM....

which principle of GRASP was utilizedto handle this exception?


ans. a.Indirection.

19. what is the major difference between the product backlog and the sprint backlog?

ans:a.the sprint backlog is a subset of the product backlog.

20. which of the following could be input or output of a task?

ans.deliverable,artifact,outcome

21. which of the following is a unit of work that a role may be asked to...

ans. Task.

22.what is the best apporach in design patterns in coding?

ans. writing codes with the highest possible coupling and lowest possible cohesion.

23. which of the following tasks will be performed by the configuraation manager?

ans. a.makes sure that project complies with CM standards and procedures.

b.plans configuration management.

c.tracks and reports...

24. what relationship(S) can a work product have to task?

ans. optional input,mandatory input, primary outputand secondary output.

25. what is the work / assets grouped by business area?

ans.workstream.

26.complete the statement application design can be done using---

ans.custom/package/both

27. A graph that shows the progress of work toward a goal line associated with a value vertical axis is
called?

ans. burnup chart

28. sohini is a new developer on xyz e-commerece project.she has awritten a piece of code handling
errors that may occur

because of non avaliblity of product in a cart already....

ans.Business Exceptions.

29. Mr.Neli has to create a project document that includes configuration item project he is currently
working on.he has propposed the configuration

A.project documentation

B. Architectures
C.interfaces

D.Designs..........Mr vincent is the configuration manager in the project

ans b.metrics and status reports

d. requirements

30. what are some of the way test-driven development can benefit a project ... technique?

ans a.compresses the avaliable set of test tools

c.supports continuous integration.

31. identify the cloud application issues when an application id developed

ans.b.attack surface has increased

d. API calls travel across the internet and are subject to threats

32. which are the external application-oriented devices that provide application

ans.waf,https,citrix,api,gateway.

33. code review process involves which of the following steps:

ans.baseline a software products,prepare for a review,plan for a review,reslove review points

34.select the challenges of applying TDD to agile development projects?

ans developers adaptability

test writing becomes intuitive

35.while doing TDD,which of the following is recommended?

ans writing trivial tests that are too small.

36.Every sprint starts with ---- and ends with --- and

ans a.1.sprint planning 2. sprint review 3. sprint retrospective

37.what are the major challenges faced when performing test-drive database device

ans .b.test framework usi g mock objects

d.schema changes breaking tests

40. why are WIP limits important?

ans b.To ensures smooth flow of things through the system.

41. Linda, an AWS cloud administrator, used to generate a soft token in her mobile..........

ans.multifactor authentication
42. what is key benifit of the least privilege approach to security?

ans It minimized the level of compromise in the event of a security breech.

43. which of the following action to be taken before pushing the code into github.com when .... have
senstive in the source code?

ans. move the sensitive information to gitignore file.

44.what are the two important objectivies when adding testing code to a project?

ans. a.run integration tests on the final release to ensure test code is present

b. use normal design criteria too...

d.prevent test code from being complied into production code.

45.definition of done is application to which of the following?

ans all of the options.

46. john is the identified product owner of a just commenced scrum project..

i)identify the REAL product owner to do job

ii)educate the project ownw=er on the expectation

iii) request the scurm..

ans.d.all i,ii,iii

47. in scrum ban,impediments are..

ans hidden

48.in which situation a looping error will not occur?

ans. loops varibles are intialized correctly.

49. Mr.John is working for an E-commerce application,There are various innterdependent components
to this application like payment provider,and gateway....

ans.c.API testing.

50. identify the responsibilities of a DBA which includes

ans all of the above

51. which of the following are not benifits of ccode optimization techniques?

ans.c.improves the system performance

d.improves the organization's performance.

52. which of these is an administrative responsibility for the team?


ans.d.attend the daily scrum ceremony an provide the hours consumed or burned down.

53. what are the oops components that is influenced in design patterns?

ans. abstraction,poly,encap

54.after what activity we should raise a change request(cr)?(choose the best option)

ans.c. any changes to the requirements which come after entering the design stage.since the...

55.what is sso in terms of cloud security mean?

ans b.single sign on/off

56.in a banking application,we keep the customer UI logic separate from the the backend

or the business logic of our application. which GRAPS principle would take......

ans.a.creator

57. product ,relase or sprint level planning is a key feature of the ---- tools

ans continuous integration (CI)

58.which of the following is a unit of work that a role may be asked to perform?

ans.d.task.

59. shyam created container images considering his project environment requirement. which cloud
based registry....

ans. Docker hub.

60.what are the benefits of adopting the security-centric approach to develop the application in the
cloud?

ans. all the above.

61.in which situation a looping error will not occur?

ans loops varible are intializes correctly

62. while designing the application, what is used to graphically represent application components and
services,depicts...

ans. Design pattern

63. before using the "git commit" command, in the source code,if sensitive information is identified,....

a.use functions.... b. copy the sensitive..... c.add the cfg file... d. identigy the sensitive...

ans. ABCD

64.identify the state that referss high degree of coupling.


ans. b. small change can break your code and this could have a disastrous effect on your
application.

65.product owner considers which of the following criteria while writing a good user story.

ans. a.Definition of Done

66.consider the identity and access management solutions by various providers as given below.

Google apps sso;

microsoft SQL server integrated security;

microsoft office online;

the above solution comes under.............................

ans. single sign-on/off(sso) identity

67.Mr.Mark works in acloud service provider firm.he gathers requirements from a customer.customer

started that "on demand based computing resources.................etc

ans coupling and decoupling

68. choose the most appropriate option:janet requires to automate end to end process in her project
based on requirement received ......

ans.build process.

69. A team is referring to the latest version of theproduct backlog to work on the deliverables. who....

ans b.project manager.

70. in accenture code quality model,fundamental area and scalability,select the important .....

ans. b.sensitive processing...

c.data encryption and encoding implementation

d.object pooling and recycling patterns

71.Mr.vincent is the configuration manager for one project in accenture.he to identify and establish

configuration items.

a.determine CI categories

b.determine CM control levels.

c. determine Ci tools.

d.determine CI namingconventions.
e.auits and status reporting

f.select cis

ans. abcdf.

72.which of the following is correct with respect to the scrum master role?

a) the role hierarchial b)the role is at ... c)its authority is ... d) the role acts as... e)the scrum master...

ans.only a,c,e.

73.swiss knife is capable enough to perform multiple tasks but if you want to change...

ans.d.Dependency inversion principle.

74.scrum of scrum meeting is focused on?

ans. resolving coordination challenges with a teams.

75.Ms Richa has to write a poc that proposes the devops adoptioninto the project that is ....

ans.c. creates and improve products at a slower pace

d. based on agile and lean principles.

76.complete the statements -accenture delivery suite(or ADS) is our standard delivery framework

designed to help our teams----results.

ans. a.smooth,efficient,pridictable, reliable and high-quality results.

77.why are policies required for a project?

ans. all of the above

78.Mr.Anthony ans.c,a,e,d,b

79.alex has been identified as the scrum master of an ANS:only A and C.

80.
1. swiss knife is capable enough to perform multiple tasks but you

want to change blade or component of the swiss knife,all other components....etc

ans. dependency inversion principle

2.what is sso in terms of cloud security mean?

ans. single sign on/off

3. Which soild principle helps the use to develop less coupled code by ensuring the

high level modules depend on abstaction..........lower level modules?

ans. dependency inversion principle.

4. security features match the database level security?

ans. login ,user,audits

5. Mr. Mark works in a cloud service provider firm. he gather requirement from a

customer.customer stated that "on demand based computing resources has to be

.......which property of cloud computing helps Mr.Mark to adress this requirement.

ans.

6.sujata a senior develper of project has been assigned a task to look at the code

......what are points she should keep in mind while checking?

ans. a. the average complexity of classes,programs…………

c. There are no cyclic dependencies between classes,components or layer.

7.which of the following could be input or output of a task?(select all that apply)?

ans. outcome,artifact,deliverable
8.which of the following are not optimization techniques?

ans. improves the organization’s performance

improves the system’s performance

9.what guidelines should be followed for creating the accenture coding standards?

ans. coding standards should be easy to understand

should be agreed upon across project teams spanning globally

10. Mr.vicent is the configuration manager for one project in accenture........

A.determine ci categories

B.determines CM control levels

C.determine CI tools

D.determine CI naming conventions

E.audits and status reporting

F.select CIs.

ans.abef

11.which are external application-oriented devices that provide application security?

ans. waf,https,citrix,api gateway.

12.Mr.jacob is an ethical hacker. He wants to intrude into mail box of his friened john ....

http://mail.abc.com/home/user =j4jacob/0/#inbox .......

http://mail.abc.com/home/user=john123/0/#inbox..............etc

ans.cross site scripting

13. Mr.Anthony is the configuration manager for the ABC utility.He has to plan

configuration management planning CM has a set of sequential steps....


A.levels of control.

B.selecting Cis.

C.determining categories

E.configuration items(cis).

ans. c,a,e,d,b

14.Ms.julie has to write a project document that process the configuration management

adoption into the project.......

A.estabilshes and maintain the integrity of the items.......under its control.

B.accounts for and reports the progress of development efforts.

C.prevents unauthorized access to assets.

D.coordinates tracks and management change activities.

E.facilitates concurrent development.

ans.a,b,c,d,e

15. which solid principle states that an abstraction should not depend on details,

but.........on the abstractions?

ans. dependency inversion principle.

16.Ajay,a project Manager onborded new resources for his project.The client he is

handling is diamond client of accenture and he needs to train the resources on

various........................proper project plans and enable agile practices?

ans.

17.John has written code that includes multiples methods that is not synonymous.....

.....what standard coding patterns would you suggest to him?

ans. a. group logically related statements for…..

b. name of methods does not matter.


18.identify the state that refers high degree of coupling?

ans. b. A small change can break your code and this could have…….

19. Mr.John is working for an E-commerce application.There are various interdependent....

ans. API testing

20.what is the funtionality of data cohesion in modulues of project?

ans. Both option 1 and 2.

21.which are the common coding situation that developers come across...

ans. code is not well-formatted.

22.which of the following is a unit of work that a role may be asked to perform?

ans. activity

23.what are the guidelines that needs to be followed for managing bottlenects during optimization?

Ans a. do not cache the result.

b. identify benefits of implementing complex……

d. do performance testing on critical…………

24. where are policies required for a project?

Ans all of the above.

25. what are the pitfalls concerning the cloud application development?

Ans. requiring all application be deployed in the cloud.

26. what is work / assets grouped by business area?

Ans.workstream.

27. complete the statements-Accenture delivery suite(or ADS) is our standard delivery framework

Designed to help our teams “----------“ results.

Ans. smooth,efficient,predictable,reliable and high_quality results.


1.which of the following tasks wil be performed by the configuration management?

Choose exactly three correct options.

Ans: A.Plans configuration

b.Tracks and reports

C.Makes sure that project complies with CM standard

=============================================================

2. which of the following could be input or output of a task

ANS: a.artifact

b.outcome

c.deliverable

============================================================

3.identify the right combination of red/green/refactor cycle with its descripti

Ans) ALL the above

=============================================================

4.Identify the message protection deployment modes

ANS: a.network-to-network

b.network-to-host

c.peer-to-peer

====================================================

5.what are the two important objectives when adding testing code directly into units

ANS: a.use normal design criteria to embed test code directly into units.

b.run integration tests on the final release to ensure test code is present

c.prevent test code from being compiled into production code


6.Peter a software professional is attending Devops training. The trainer has written some stmts that are
as listed below.he asked the participants to identify the challenges the devops is facing predominantly

A.developer vs operations mindset

B.Transition from legacy infrastructure for deployment to microservices

C.Resistance to the changes

ANS. A, B and C

=====================================================================

7.which SOLID principle represents following stmt “the vehicle is an abstract for truck and bike”?

ANS: dependency inversion principle

========================================================================

8.Kiran needs help in following the rules that must be followed within creating exception handling
strategy. Which rules he must consider from below list?

ANS: a.Create meaningful exception messages

b.Differentiate between application business and technical exceptions

============================================================================

9.How to ensure reusability of code in a project?

ANS: a.Having loosely coupled system

b.No dependable modules

==========================================================================

10.What is the major difference between the Product Backlog and the Sprint backlog?

ANS: The sprint backlog is a subset of the product backlog

================================================================

11.What are the ADM 5 main focus areas?

ANS: a.Planning

b.development

c.Testing

d.Operations

e.Management
12.ADOP is built on a ________________infrastructure

ANS: Docker

===================================================

13.What are the responsibilities of the change control board?

Choose exactly TWO options:

ANS: a.Monitor changes and updates to the project requirement as part of CM

b.Review and authorize changes to the baselines

========================================================================

14.Which of the following stmts are correct about coding best practices and coming standards.Select
one or more

ANS: a.Coding standards improve the consistency and reliability at the code by eliminating personal
styles…..

b.Coding best practices one collection of good prgrmng practices which involve…..

c.Deliver high quality code

========================================================================

15.If we need to apply design patterns , can we do it without the principle of OOP and standards?

ANS: Yes, design patterns are logical and comprehensive sequencing of elements with procedural
principles

======================================================================

16.As part of cloud application security, which of the following are the identify and and access solutions
provided by the cloud service providers?

ANS: a.Multifactor authentication

b.Single sign-On/Off

==========================================================================

17.Joshua being a project manager, need to suggest methods to developers of project so that cliemnt
become high-performance business by delivering high-quality code.Which are they?

ANS: a.Adhere to Accenture Delivery Methods best practices and guidelines

b.follow the Accenture Code quality Model

c.Implementing the practice of peer reviews


18.This pattern evcaluates scenarios where you need just one object and you don’t want to create
multiple objects of that particular class. Or simply put restricting construction of more than one
object”Which pattern is it?

ANS: Singleton pattern

============================================

19.John, the Product owner, in consuitation with his stakeholders, has arrived at four features that are
of same priority. The stakeholders are of the opinion that all those features are of equal significance
Which of the following can John do, in this context?

ANS: Consult with the Development team and still arrive at a priority among these features

====================================================

20. Which of the following types of testing and their contribution to overall system documentation are
correct: select one

ANS: All the above

=======================================================

21.Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling
errors that may occur because of non availability of product in a cart already added earlier. Her first task
is to define these issue under a suitable category identify the correct category from the following
options.

ANS: Business Exceptions

==========================================================

22.What practices should be used when building a complex system? Select one or more:

ANS: a.Using a modular design

b.Using components with tight coupling

============================================================

23.A Scrum development Team is supposed to be Self Organized that would mean

ANS: They can identify their own goals and make decisions on their own

=========================================================

24. What is the key benefit of the least privilege approach to security

ANS: it minimized the level of compromise in the event of a security breech


25.Mr.Jacob is an ethical hacker. He wants to intrude3 into mail box of his friend john to his personal
information

So he logged into the mail account which resulted in the URL as shown below-

http://mail.abc.com/home/user=j4jacob/0/#inbox

He replies j4jacob with his friends user id john123. Now the update URL is-

http://mail.abc.com/home/user=john123/0/#inbox

he tries with this URL and he could access the mail box of his friend John. What type of vulnerability you
have noticed in the above scenario?

ANS: Cross site scripting

===============================================

26. What was seen in application over time, which creates the need of solution which could also be used
in other projects?

ANS: Faster time to market

=================================================

27.Which of the following action to be taken before pushing the code into github.com when we have
sensitive information in the source code?

ANS: Move the sensitive information to gitignore file

=====================================================

28.What practices should be used when building a complex system? Select one or more:

ANS: a.Using a modular design

b.Designing the testability

c.Using components with tight coupling

===========================================================

29.What are the pitfalls concerning the cloud application development?

ANS: Requiring all applications be deployed in the cloud

30. Identify the usage of sandboxes in Cloud Application Security.Select one or more

ANS: a.Discover attack vectors and agents

b.Discover application errors

c.Discover the impact of the applied malware

d.Discover vulnerabilities
======================

31.A model in which a service provider makes resources and infrastructure management available as
needed, and charges them for specific usage rather than a flat rate. Which model has the above stated
characteristics

ANS: Cloud computing

====================================================

32.While doing the daily scrum ceremony, the true spirit of the ceremony should be?

ANS: reporting updates to scrum master

==========================================

33.What relationship(s) can a work product have to task?

ANS: Optional input, mandatory input, primary output and secondary output

=============================

34.Select the challenges of applying TDD to Agile development projects

ANS: a.Design changes may affect unit tests

b.Test writing becomes intuitive

=================================================

35. John has written code that includes multiple methods that is not synonymous with functionality of it.
Many of those methods contain lots of nested stmts, hard coded values and over 500 lines of code.
What standard coding patterns would you suggest to him?

ANS: a.Group logically related stmts for easy readability

b.limit the method size between 100 and 150 code lines by refactoring it

======================================

36.Sujata a senior developer of project has been assigned a task to look at the code structure and
decoupling component wherever deemed necessary. What points she should keep in mind while
checking? Select one or more:

ANS: a.The average complexity of classes, programs, methods, procedures, or functions is under control

b.There are no cyclic dependencies between classes, components or layers

c.dependencies to external libraries are well known

37.Which of the following is the description for the level 1 OWASP threat assessment maturity practice?
ANS: Identify and understand the high level threats to the organization and individual projects

======================================================================

38.What is the best approach in Design Patterns in coding?

ANS: writing codes with the highest possible coupling and the lowest possible cohesion.

===================================================================

39.Select the challenges of applying TDD to Agile development projects

Ans: a) Design changes may affect unit tests

b) Test Writing becomes intuitive

c) Developers adaptability

==================================================

40) How does ADM align to the new ?

Ans) a) Extensions and Context

b) Longevity

c) Vastness

41) Which are the common coding situations that Developers come across Frequently from below ?

Ans) Code is not well-formatted

===========================================================

42) How did object-oriented programming systems handle completely better than procedural process.

Ans) All the procedures were treated as an identifiable behaviour of an object.

==============================================

43) Which of the following definitions provided by various personnels would correctly depicts
CONFIGURATION MANAGEMENT and its most appropriate?

Ans) GABRIEL’S definition

======================

44) Which global policy of Accenture does ADS meet?

Ans) Policy 1100

45)What are the some features a tool should have to facilitate TDD Agile database development.
Ans) a. Implement tests in a built-in database testing language

b. Able to run tests in transactions to keep them independent

=================================================================

46) Which of the following statements is Valid?

Ans) An epic is the functional specifiactions technical specifiactions usability requirements specifications
of a user story

======================================================================

47) Consider the Dockerfile code – (assume the petclinic war and server.xml files are available in.

Ans) RUN Keyword executes the shell command during your image build where as CMD.

=======================================================================

48)Mr.Neil has to create a project that includes.

Ans) a.Requirements.

b.Metrics and Status Reports

================================================================

49) CIS are the work products within the selected categories that the project wants under.

Ans) Configuration Manager.

============================================================================

50) What is considered by the developers in regard to RESTFUL API deployment.

Ans) a.Protection Against injection

b.Use API Keys

c.Use HTTPS identity Authentication

====================================================================

51)Ms.Julie has

Ans) A,B,C,D and E

================================================================

52)Which of the following are CORRECT related to Secure SDLC?

Ans) A,B,C

==================

53)Projects should establish baseline at the end of each project stage.


Ans) a.Architecture Baseline

b.Requiremens Baseline

c.Testing Baseline

===============================================

54) What is the work assets grouped by business area?

Ans) WorkStream

================================================

55) What is the best approach in Design Patterns in coding?

Ans) Writing codes with the highest possible coupling and Lowest possible cohesion

===========================================================

56)Identify the cloud application

Ans) a.Api calls travel across the internet and are subject to threats

b.attack surface has increased.

===========================================================

57) What is the function of a featured identity?

Ans) Enables users of an application to use the same authentication for other application by the same
application.

===========================================

58) What is the logical grouping of elements that have single major outcome ?

Ans) Activity or Discipline

===================================

59) Which are the external application oriented devices that provide application security?

Ans except DAM

==================================

60) During which ceremony Team members synchronize their work and progress and report any ?

Ans) Daily Scrum

61) What guidelines should be followed for creating the Accenture coding standards?
Ans) a.Should be agreed

b.Coding Standards

========================================================

62) What are some of the ways test-driven?

Ans) a.Supports continuous integration

b.Compresses the available

=================================================

63)How to ensure reusability of code in a project?

Ans) a.No dependable modules

b. Having loosely coupled system

=======================================================

64) Which of the following is CORRECT about a proxy product owner ?

Ans) All the options

==============================================================

65)Complete the statements Accenture Delivery Suite

Ans) smooth,efficient,predictable,reliable and high-quality results

66) Complete the statement Application Design can be done?

Ans) Custom/Packaged/Both

67) In the sprint planning

Ans) Begginning of sprint

68) What are the two importants

Except – Ensure test-related

69)What are the two important objectives when adding testing code to a project?

Ans) Except : Ensure test-related code is isolated

==============================================================

70) Code Review process involves which of the following steps?

Ans) except: Never conduct a review

71)How to ensure reusability of code in a project?

Ans) a.No dependable modules


b.Having loosely coupled system

72)Which of the following is not the right answer for packaged or Custome.

Ans)Custom software maps to the clients business process and contains key features

=====================================================================

73) In Large Scale Scrum there is

Ans) multiple teams multiple product backlog

74) Why are WIP limits important

Ans) To ensure smooth flow of things through the system

==============================================================

75) What are the major challenges faced

Ns) a. Schema changes breaking testa

b.Test framework using mock objects

76)What are the different generic techniques followed in code optimization

Ans) Except : Data-Level parallelism

77) ____________ helps the design process

Ans) TDD,TDD

================================

78) Which of the following statements is/are correct?

Ans) 1,2,3 and 4

1.A scrum development team is supported

A. they can identify their own

2.what are the oop components that is influenced in design pattern

A .except inheritance

3. which solid principle represents the following statement

A. Dependance inversion

4.what are some features a tool

A. Implements and able

5.identify the cloud application issues

A. Attack, api calls travel


6.identify the correct order of risk investigation and rating process

A. ADFCBE

7.what are the different generic techniques

A. Except reducing

8.Mr.john has developed a

A. Speed optimization

9.how to ensure reusability

A. except having highly

10.what happens when the sprint is called

A. Big Ans

11.what is talk time

A. Customer demand rate/time available

12.trust COMM is a telephone network

A. caas

13.Mr. antomy is the configuration manager from the ABC utility

A. CAEDB

14.identify the important levels of optimization

A. Design level

15.which of the following is correct with respect to the scrum master role

A. Only a,c,e

16.what is the major difference between the product backlog

A. The sprint backlog is a subset

17.at home we replace an old clf bulb to a new led bulb

A. liskov

18. alex has been identified as the scrum master

A. Only b and c

19.humberto is a project manager

A. Junit and owasp

20.identify the order of steps for code review process


A. dbeacdf

21.in Accenture code quality model

A. Object, sensitive

22.what are the three security featured match

A. Schema,users,roles

23.identify the state that refers high degree cohesion

A. Small change

24.while designing the application what is used to graphically represent

A. Design pattern

25.identify the responsibilities of a DBA which includes

A. All of the above

26.which of the following is the description for level 2 OWSAP

A. Map compensating

27.what are some of the ways test-driven

A. Enhance and supports

28.every sprint starts with________ and ends with _____________and_______________

A. 1.sprint planning 2.sprint review

29.how does ADM align to the new

A. Extensions and longevity

30.in a real-world system where we will hundreds

A. Create an

31.before using the “git commit” command, in the source code, if sensitive information

A. DBCA

32. which of the following could be input or output to a task

A. Outcome, artifact

33. when we try to push the changes into github.com

A. Git add:

34.what is the website to access Accenture Delivery Suite(ADS)

A. https://in.accenture.com/accenturedeliverysuite
35.identify the state that refers high degree coupling

A. Small change

35.code review process involves which of the following steps

A. Except never conduct a

36.projects should establish baselines at the end

A. Except integration baseline

37.john has written code that includes multiple methods

A. Group logically related ,limit the method size

38.how did object-oriented programming systems

A. Tasks were divided

39.what is the logical grouping of elements

A. Activity or discipline

40.which of the following are the role of tester in DeVops

A. Except monitoring

41.what are the guidelines that needs to be followed for managing

A. Identify benefits , do performance testing

42.what is the functionality of data cohesion

A. Both option 1 and 2

43.which of these is a primary way of scoping a sprint

A. Task boxing

44.which of the following definitions provided by various personnel’s would correctly

A. GABRIEL’S definition

45.which of the following is a unit of work a role

A. task

46.which are the roles usually seen in the custom application design in ADM

A. Application designer, user experience architect

47.what are the responsibilities of the change control board?

A. Monitor and review

48.which of the following is the description for the level 1OWSAP


A. Map compensating

1.which of the following tasks wil be performed by the configuration management?

Choose exactly three correct options.

Ans: A.Plans configuration

b.Tracks and reports

C.Makes sure that project complies with CM standard

=============================================================

2. which of the following could be input or output of a task

ANS: a.artifact

b.outcome

c.deliverable

============================================================

3.identify the right combination of red/green/refactor cycle with its descripti

Ans) ALL the above

=============================================================

4.Identify the message protection deployment modes

ANS: a.network-to-network

b.network-to-host

c.peer-to-peer

====================================================

5.what are the two important objectives when adding testing code directly into units

ANS: a.use normal design criteria to embed test code directly into units.

b.run integration tests on the final release to ensure test code is present

c.prevent test code from being compiled into production code


6.Peter a software professional is attending Devops training. The trainer has written some stmts that are
as listed below.he asked the participants to identify the challenges the devops is facing predominantly

A.developer vs operations mindset

B.Transition from legacy infrastructure for deployment to microservices

C.Resistance to the changes

ANS. A, B and C

=====================================================================

7.which SOLID principle represents following stmt “the vehicle is an abstract for truck and bike”?

ANS: dependency inversion principle

========================================================================

8.Kiran needs help in following the rules that must be followed within creating exception handling
strategy. Which rules he must consider from below list?

ANS: a.Create meaningful exception messages

b.Differentiate between application business and technical exceptions

============================================================================

9.How to ensure reusability of code in a project?

ANS: a.Having loosely coupled system

b.No dependable modules

==========================================================================

10.What is the major difference between the Product Backlog and the Sprint backlog?

ANS: The sprint backlog is a subset of the product backlog

================================================================

11.What are the ADM 5 main focus areas?

ANS: a.Planning
b.development

c.Testing

d.Operations

e.Management

12.ADOP is built on a ________________infrastructure

ANS: Docker

===================================================

13.What are the responsibilities of the change control board?

Choose exactly TWO options:

ANS: a.Monitor changes and updates to the project requirement as part of CM

b.Review and authorize changes to the baselines

========================================================================

14.Which of the following stmts are correct about coding best practices and coming standards.Select
one or more

ANS: a.Coding standards improve the consistency and reliability at the code by eliminating personal
styles…..

b.Coding best practices one collection of good prgrmng practices which involve…..

c.Deliver high quality code

========================================================================

15.If we need to apply design patterns , can we do it without the principle of OOP and standards?

ANS: Yes, design patterns are logical and comprehensive sequencing of elements with procedural
principles

======================================================================

16.As part of cloud application security, which of the following are the identify and and access solutions
provided by the cloud service providers?

ANS: a.Multifactor authentication

b.Single sign-On/Off

==========================================================================

17.Joshua being a project manager, need to suggest methods to developers of project so that cliemnt
become high-performance business by delivering high-quality code.Which are they?
ANS: a.Adhere to Accenture Delivery Methods best practices and guidelines

b.follow the Accenture Code quality Model

c.Implementing the practice of peer reviews

18.This pattern evcaluates scenarios where you need just one object and you don’t want to create
multiple objects of that particular class. Or simply put restricting construction of more than one
object”Which pattern is it?

ANS: Singleton pattern

============================================

19.John, the Product owner, in consuitation with his stakeholders, has arrived at four features that are
of same priority. The stakeholders are of the opinion that all those features are of equal significance
Which of the following can John do, in this context?

ANS: Consult with the Development team and still arrive at a priority among these features

====================================================

20. Which of the following types of testing and their contribution to overall system documentation are
correct: select one

ANS: All the above

=======================================================

21.Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling
errors that may occur because of non availability of product in a cart already added earlier. Her first task
is to define these issue under a suitable category identify the correct category from the following
options.

ANS: Business Exceptions

==========================================================

22.What practices should be used when building a complex system? Select one or more:

ANS: a.Using a modular design

b.Using components with tight coupling

============================================================

23.A Scrum development Team is supposed to be Self Organized that would mean

ANS: They can identify their own goals and make decisions on their own

=========================================================

24. What is the key benefit of the least privilege approach to security

ANS: it minimized the level of compromise in the event of a security breech


25.Mr.Jacob is an ethical hacker. He wants to intrude3 into mail box of his friend john to his personal
information

So he logged into the mail account which resulted in the URL as shown below-

http://mail.abc.com/home/user=j4jacob/0/#inbox

He replies j4jacob with his friends user id john123. Now the update URL is-

http://mail.abc.com/home/user=john123/0/#inbox

he tries with this URL and he could access the mail box of his friend John. What type of vulnerability you
have noticed in the above scenario?

ANS: Cross site scripting

===============================================

26. What was seen in application over time, which creates the need of solution which could also be used
in other projects?

ANS: Faster time to market

=================================================

27.Which of the following action to be taken before pushing the code into github.com when we have
sensitive information in the source code?

ANS: Move the sensitive information to gitignore file

=====================================================

28.What practices should be used when building a complex system? Select one or more:

ANS: a.Using a modular design

b.Designing the testability

c.Using components with tight coupling

===========================================================

29.What are the pitfalls concerning the cloud application development?

ANS: Requiring all applications be deployed in the cloud

30. Identify the usage of sandboxes in Cloud Application Security.Select one or more

ANS: a.Discover attack vectors and agents

b.Discover application errors


c.Discover the impact of the applied malware

d.Discover vulnerabilities

======================

31.A model in which a service provider makes resources and infrastructure management available as
needed, and charges them for specific usage rather than a flat rate. Which model has the above stated
characteristics

ANS: Cloud computing

====================================================

32.While doing the daily scrum ceremony, the true spirit of the ceremony should be?

ANS: reporting updates to scrum master

==========================================

33.What relationship(s) can a work product have to task?

ANS: Optional input, mandatory input, primary output and secondary output

=============================

34.Select the challenges of applying TDD to Agile development projects

ANS: a.Design changes may affect unit tests

b.Test writing becomes intuitive

=================================================

35. John has written code that includes multiple methods that is not synonymous with functionality of it.
Many of those methods contain lots of nested stmts, hard coded values and over 500 lines of code.
What standard coding patterns would you suggest to him?

ANS: a.Group logically related stmts for easy readability

b.limit the method size between 100 and 150 code lines by refactoring it

======================================

36.Sujata a senior developer of project has been assigned a task to look at the code structure and
decoupling component wherever deemed necessary. What points she should keep in mind while
checking? Select one or more:

ANS: a.The average complexity of classes, programs, methods, procedures, or functions is under control

b.There are no cyclic dependencies between classes, components or layers

c.dependencies to external libraries are well known


37.Which of the following is the description for the level 1 OWASP threat assessment maturity practice?

ANS: Identify and understand the high level threats to the organization and individual projects

======================================================================

38.What is the best approach in Design Patterns in coding?

ANS: writing codes with the highest possible coupling and the lowest possible cohesion.

===================================================================

39.Select the challenges of applying TDD to Agile development projects

Ans: a) Design changes may affect unit tests

b) Test Writing becomes intuitive

c) Developers adaptability

==================================================

40) How does ADM align to the new ?

Ans) a) Extensions and Context

b) Longevity

c) Vastness

41) Which are the common coding situations that Developers come across Frequently from below ?

Ans) Code is not well-formatted

===========================================================

42) How did object-oriented programming systems handle completely better than procedural process.

Ans) All the procedures were treated as an identifiable behaviour of an object.

==============================================

43) Which of the following definitions provided by various personnels would correctly depicts
CONFIGURATION MANAGEMENT and its most appropriate?

Ans) GABRIEL’S definition

======================

44) Which global policy of Accenture does ADS meet?

Ans) Policy 1100


45)What are the some features a tool should have to facilitate TDD Agile database development.

Ans) a. Implement tests in a built-in database testing language

b. Able to run tests in transactions to keep them independent

=================================================================

46) Which of the following statements is Valid?

Ans) An epic is the functional specifiactions technical specifiactions usability requirements specifications
of a user story

======================================================================

47) Consider the Dockerfile code – (assume the petclinic war and server.xml files are available in.

Ans) RUN Keyword executes the shell command during your image build where as CMD.

=======================================================================

48)Mr.Neil has to create a project that includes.

Ans) a.Requirements.

b.Metrics and Status Reports

================================================================

49) CIS are the work products within the selected categories that the project wants under.

Ans) Configuration Manager.

============================================================================

50) What is considered by the developers in regard to RESTFUL API deployment.

Ans) a.Protection Against injection

b.Use API Keys

c.Use HTTPS identity Authentication

====================================================================

51)Ms.Julie has

Ans) A,B,C,D and E

================================================================

52)Which of the following are CORRECT related to Secure SDLC?

Ans) A,B,C
==================

53)Projects should establish baseline at the end of each project stage.

Ans) a.Architecture Baseline

b.Requiremens Baseline

c.Testing Baseline

===============================================

54) What is the work assets grouped by business area?

Ans) WorkStream

================================================

55) What is the best approach in Design Patterns in coding?

Ans) Writing codes with the highest possible coupling and Lowest possible cohesion

===========================================================

56)Identify the cloud application

Ans) a.Api calls travel across the internet and are subject to threats

b.attack surface has increased.

===========================================================

57) What is the function of a featured identity?

Ans) Enables users of an application to use the same authentication for other application by the same
application.

===========================================

58) What is the logical grouping of elements that have single major outcome ?

Ans) Activity or Discipline

===================================

59) Which are the external application oriented devices that provide application security?

Ans except DAM

==================================

60) During which ceremony Team members synchronize their work and progress and report any ?

Ans) Daily Scrum


61) What guidelines should be followed for creating the Accenture coding standards?

Ans) a.Should be agreed

b.Coding Standards

========================================================

62) What are some of the ways test-driven?

Ans) a.Supports continuous integration

b.Compresses the available

=================================================

63)How to ensure reusability of code in a project?

Ans) a.No dependable modules

b. Having loosely coupled system

=======================================================

64) Which of the following is CORRECT about a proxy product owner ?

Ans) All the options

==============================================================

65)Complete the statements Accenture Delivery Suite

Ans) smooth,efficient,predictable,reliable and high-quality results

66) Complete the statement Application Design can be done?

Ans) Custom/Packaged/Both

67) In the sprint planning

Ans) Begginning of sprint

68) What are the two importants

Except – Ensure test-related

69)What are the two important objectives when adding testing code to a project?

Ans) Except : Ensure test-related code is isolated

==============================================================

70) Code Review process involves which of the following steps?

Ans) except: Never conduct a review


71)How to ensure reusability of code in a project?

Ans) a.No dependable modules

b.Having loosely coupled system

72)Which of the following is not the right answer for packaged or Custome.

Ans)Custom software maps to the clients business process and contains key features

=====================================================================

73) In Large Scale Scrum there is

Ans) multiple teams multiple product backlog

74) Why are WIP limits important

Ans) To ensure smooth flow of things through the system

==============================================================

75) What are the major challenges faced

Ns) a. Schema changes breaking testa

b.Test framework using mock objects

76)What are the different generic techniques followed in code optimization

Ans) Except : Data-Level parallelism

77) ____________ helps the design process

Ans) TDD,TDD

================================

78) Which of the following statements is/are correct?

Ans) 1,2,3 and 4

You might also like