DLF Answers
DLF Answers
Mr John has developed a software program and to make his program run faster he allows portion of
the program to reside in a computer memory……..
Ans.speed optimization
4. which of the following statement is not corrct about code quality metrics?
ans. Inheritance
6. cls are the work products within the selected categories that the project wants under configuration
controle.
Imagine you are the person for writing the CM plan who typically works with the team leads ........
ans.technology,digital,operations,security,and strategy.
8. A team is referring to the latest version of the product backlog to work ont he deliverables.who is
responsible
ans.product owner
9. a technique to render the untrusted data such as user input into literal texts so that
when any malicious code is input, it will not be ......security measure aganist...
11. consider the dockerfile code-(Assume the petclinic war ad server,xml files are avalible in the current
working directory)
ans. run keyword excutes the shell command during yoour image build where as CMD.
12. what guidelines should be followed for creating the accenture coding standards?
ans.c.TDD,TDD
ans.a.micro-service containers.
15. while doing the daily scrum cermony,the true sprit of the ceremony shouldbe?
16. In the sprint planning meeting at the ---,the team along with the po selects the goal in one-sentence
foor overall outcome of the sprint.
17. In accenture code quality model, fundamental area of performanance and scalability,select ....
which
18. customer walks into an ATM to withdraw money. the money dispensed from the ATM..... the ATM
was not able to print its transaction receiptas ATM....
19. what is the major difference between the product backlog and the sprint backlog?
ans.deliverable,artifact,outcome
21. which of the following is a unit of work that a role may be asked to...
ans. Task.
ans. writing codes with the highest possible coupling and lowest possible cohesion.
23. which of the following tasks will be performed by the configuraation manager?
ans. a.makes sure that project complies with CM standards and procedures.
ans.workstream.
ans.custom/package/both
27. A graph that shows the progress of work toward a goal line associated with a value vertical axis is
called?
28. sohini is a new developer on xyz e-commerece project.she has awritten a piece of code handling
errors that may occur
ans.Business Exceptions.
29. Mr.Neli has to create a project document that includes configuration item project he is currently
working on.he has propposed the configuration
A.project documentation
B. Architectures
C.interfaces
d. requirements
30. what are some of the way test-driven development can benefit a project ... technique?
d. API calls travel across the internet and are subject to threats
32. which are the external application-oriented devices that provide application
ans.waf,https,citrix,api,gateway.
36.Every sprint starts with ---- and ends with --- and
37.what are the major challenges faced when performing test-drive database device
41. Linda, an AWS cloud administrator, used to generate a soft token in her mobile..........
ans.multifactor authentication
42. what is key benifit of the least privilege approach to security?
43. which of the following action to be taken before pushing the code into github.com when .... have
senstive in the source code?
44.what are the two important objectivies when adding testing code to a project?
ans. a.run integration tests on the final release to ensure test code is present
46. john is the identified product owner of a just commenced scrum project..
ans.d.all i,ii,iii
ans hidden
49. Mr.John is working for an E-commerce application,There are various innterdependent components
to this application like payment provider,and gateway....
ans.c.API testing.
51. which of the following are not benifits of ccode optimization techniques?
53. what are the oops components that is influenced in design patterns?
ans. abstraction,poly,encap
54.after what activity we should raise a change request(cr)?(choose the best option)
ans.c. any changes to the requirements which come after entering the design stage.since the...
56.in a banking application,we keep the customer UI logic separate from the the backend
or the business logic of our application. which GRAPS principle would take......
ans.a.creator
57. product ,relase or sprint level planning is a key feature of the ---- tools
58.which of the following is a unit of work that a role may be asked to perform?
ans.d.task.
59. shyam created container images considering his project environment requirement. which cloud
based registry....
60.what are the benefits of adopting the security-centric approach to develop the application in the
cloud?
62. while designing the application, what is used to graphically represent application components and
services,depicts...
63. before using the "git commit" command, in the source code,if sensitive information is identified,....
a.use functions.... b. copy the sensitive..... c.add the cfg file... d. identigy the sensitive...
ans. ABCD
65.product owner considers which of the following criteria while writing a good user story.
66.consider the identity and access management solutions by various providers as given below.
67.Mr.Mark works in acloud service provider firm.he gathers requirements from a customer.customer
68. choose the most appropriate option:janet requires to automate end to end process in her project
based on requirement received ......
ans.build process.
69. A team is referring to the latest version of theproduct backlog to work on the deliverables. who....
70. in accenture code quality model,fundamental area and scalability,select the important .....
71.Mr.vincent is the configuration manager for one project in accenture.he to identify and establish
configuration items.
a.determine CI categories
c. determine Ci tools.
d.determine CI namingconventions.
e.auits and status reporting
f.select cis
ans. abcdf.
72.which of the following is correct with respect to the scrum master role?
a) the role hierarchial b)the role is at ... c)its authority is ... d) the role acts as... e)the scrum master...
ans.only a,c,e.
73.swiss knife is capable enough to perform multiple tasks but if you want to change...
75.Ms Richa has to write a poc that proposes the devops adoptioninto the project that is ....
76.complete the statements -accenture delivery suite(or ADS) is our standard delivery framework
78.Mr.Anthony ans.c,a,e,d,b
80.
1. swiss knife is capable enough to perform multiple tasks but you
3. Which soild principle helps the use to develop less coupled code by ensuring the
5. Mr. Mark works in a cloud service provider firm. he gather requirement from a
ans.
6.sujata a senior develper of project has been assigned a task to look at the code
7.which of the following could be input or output of a task?(select all that apply)?
ans. outcome,artifact,deliverable
8.which of the following are not optimization techniques?
9.what guidelines should be followed for creating the accenture coding standards?
A.determine ci categories
C.determine CI tools
F.select CIs.
ans.abef
12.Mr.jacob is an ethical hacker. He wants to intrude into mail box of his friened john ....
http://mail.abc.com/home/user=john123/0/#inbox..............etc
13. Mr.Anthony is the configuration manager for the ABC utility.He has to plan
B.selecting Cis.
C.determining categories
E.configuration items(cis).
ans. c,a,e,d,b
14.Ms.julie has to write a project document that process the configuration management
ans.a,b,c,d,e
15. which solid principle states that an abstraction should not depend on details,
16.Ajay,a project Manager onborded new resources for his project.The client he is
ans.
17.John has written code that includes multiples methods that is not synonymous.....
ans. b. A small change can break your code and this could have…….
21.which are the common coding situation that developers come across...
22.which of the following is a unit of work that a role may be asked to perform?
ans. activity
23.what are the guidelines that needs to be followed for managing bottlenects during optimization?
25. what are the pitfalls concerning the cloud application development?
Ans.workstream.
27. complete the statements-Accenture delivery suite(or ADS) is our standard delivery framework
=============================================================
ANS: a.artifact
b.outcome
c.deliverable
============================================================
=============================================================
ANS: a.network-to-network
b.network-to-host
c.peer-to-peer
====================================================
5.what are the two important objectives when adding testing code directly into units
ANS: a.use normal design criteria to embed test code directly into units.
b.run integration tests on the final release to ensure test code is present
ANS. A, B and C
=====================================================================
7.which SOLID principle represents following stmt “the vehicle is an abstract for truck and bike”?
========================================================================
8.Kiran needs help in following the rules that must be followed within creating exception handling
strategy. Which rules he must consider from below list?
============================================================================
==========================================================================
10.What is the major difference between the Product Backlog and the Sprint backlog?
================================================================
ANS: a.Planning
b.development
c.Testing
d.Operations
e.Management
12.ADOP is built on a ________________infrastructure
ANS: Docker
===================================================
========================================================================
14.Which of the following stmts are correct about coding best practices and coming standards.Select
one or more
ANS: a.Coding standards improve the consistency and reliability at the code by eliminating personal
styles…..
b.Coding best practices one collection of good prgrmng practices which involve…..
========================================================================
15.If we need to apply design patterns , can we do it without the principle of OOP and standards?
ANS: Yes, design patterns are logical and comprehensive sequencing of elements with procedural
principles
======================================================================
16.As part of cloud application security, which of the following are the identify and and access solutions
provided by the cloud service providers?
b.Single sign-On/Off
==========================================================================
17.Joshua being a project manager, need to suggest methods to developers of project so that cliemnt
become high-performance business by delivering high-quality code.Which are they?
============================================
19.John, the Product owner, in consuitation with his stakeholders, has arrived at four features that are
of same priority. The stakeholders are of the opinion that all those features are of equal significance
Which of the following can John do, in this context?
ANS: Consult with the Development team and still arrive at a priority among these features
====================================================
20. Which of the following types of testing and their contribution to overall system documentation are
correct: select one
=======================================================
21.Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling
errors that may occur because of non availability of product in a cart already added earlier. Her first task
is to define these issue under a suitable category identify the correct category from the following
options.
==========================================================
22.What practices should be used when building a complex system? Select one or more:
============================================================
23.A Scrum development Team is supposed to be Self Organized that would mean
ANS: They can identify their own goals and make decisions on their own
=========================================================
24. What is the key benefit of the least privilege approach to security
So he logged into the mail account which resulted in the URL as shown below-
http://mail.abc.com/home/user=j4jacob/0/#inbox
He replies j4jacob with his friends user id john123. Now the update URL is-
http://mail.abc.com/home/user=john123/0/#inbox
he tries with this URL and he could access the mail box of his friend John. What type of vulnerability you
have noticed in the above scenario?
===============================================
26. What was seen in application over time, which creates the need of solution which could also be used
in other projects?
=================================================
27.Which of the following action to be taken before pushing the code into github.com when we have
sensitive information in the source code?
=====================================================
28.What practices should be used when building a complex system? Select one or more:
===========================================================
30. Identify the usage of sandboxes in Cloud Application Security.Select one or more
d.Discover vulnerabilities
======================
31.A model in which a service provider makes resources and infrastructure management available as
needed, and charges them for specific usage rather than a flat rate. Which model has the above stated
characteristics
====================================================
32.While doing the daily scrum ceremony, the true spirit of the ceremony should be?
==========================================
ANS: Optional input, mandatory input, primary output and secondary output
=============================
=================================================
35. John has written code that includes multiple methods that is not synonymous with functionality of it.
Many of those methods contain lots of nested stmts, hard coded values and over 500 lines of code.
What standard coding patterns would you suggest to him?
b.limit the method size between 100 and 150 code lines by refactoring it
======================================
36.Sujata a senior developer of project has been assigned a task to look at the code structure and
decoupling component wherever deemed necessary. What points she should keep in mind while
checking? Select one or more:
ANS: a.The average complexity of classes, programs, methods, procedures, or functions is under control
37.Which of the following is the description for the level 1 OWASP threat assessment maturity practice?
ANS: Identify and understand the high level threats to the organization and individual projects
======================================================================
ANS: writing codes with the highest possible coupling and the lowest possible cohesion.
===================================================================
c) Developers adaptability
==================================================
b) Longevity
c) Vastness
41) Which are the common coding situations that Developers come across Frequently from below ?
===========================================================
42) How did object-oriented programming systems handle completely better than procedural process.
==============================================
43) Which of the following definitions provided by various personnels would correctly depicts
CONFIGURATION MANAGEMENT and its most appropriate?
======================
45)What are the some features a tool should have to facilitate TDD Agile database development.
Ans) a. Implement tests in a built-in database testing language
=================================================================
Ans) An epic is the functional specifiactions technical specifiactions usability requirements specifications
of a user story
======================================================================
47) Consider the Dockerfile code – (assume the petclinic war and server.xml files are available in.
Ans) RUN Keyword executes the shell command during your image build where as CMD.
=======================================================================
Ans) a.Requirements.
================================================================
49) CIS are the work products within the selected categories that the project wants under.
============================================================================
====================================================================
51)Ms.Julie has
================================================================
Ans) A,B,C
==================
b.Requiremens Baseline
c.Testing Baseline
===============================================
Ans) WorkStream
================================================
Ans) Writing codes with the highest possible coupling and Lowest possible cohesion
===========================================================
Ans) a.Api calls travel across the internet and are subject to threats
===========================================================
Ans) Enables users of an application to use the same authentication for other application by the same
application.
===========================================
58) What is the logical grouping of elements that have single major outcome ?
===================================
59) Which are the external application oriented devices that provide application security?
==================================
60) During which ceremony Team members synchronize their work and progress and report any ?
61) What guidelines should be followed for creating the Accenture coding standards?
Ans) a.Should be agreed
b.Coding Standards
========================================================
=================================================
=======================================================
==============================================================
Ans) Custom/Packaged/Both
69)What are the two important objectives when adding testing code to a project?
==============================================================
72)Which of the following is not the right answer for packaged or Custome.
Ans)Custom software maps to the clients business process and contains key features
=====================================================================
==============================================================
Ans) TDD,TDD
================================
A .except inheritance
A. Dependance inversion
A. ADFCBE
A. Except reducing
A. Speed optimization
A. Big Ans
A. caas
A. CAEDB
A. Design level
15.which of the following is correct with respect to the scrum master role
A. Only a,c,e
A. liskov
A. Only b and c
A. Object, sensitive
A. Schema,users,roles
A. Small change
A. Design pattern
A. Map compensating
A. Create an
31.before using the “git commit” command, in the source code, if sensitive information
A. DBCA
A. Outcome, artifact
A. Git add:
A. https://in.accenture.com/accenturedeliverysuite
35.identify the state that refers high degree coupling
A. Small change
A. Activity or discipline
A. Except monitoring
A. Task boxing
A. GABRIEL’S definition
A. task
46.which are the roles usually seen in the custom application design in ADM
=============================================================
ANS: a.artifact
b.outcome
c.deliverable
============================================================
=============================================================
ANS: a.network-to-network
b.network-to-host
c.peer-to-peer
====================================================
5.what are the two important objectives when adding testing code directly into units
ANS: a.use normal design criteria to embed test code directly into units.
b.run integration tests on the final release to ensure test code is present
ANS. A, B and C
=====================================================================
7.which SOLID principle represents following stmt “the vehicle is an abstract for truck and bike”?
========================================================================
8.Kiran needs help in following the rules that must be followed within creating exception handling
strategy. Which rules he must consider from below list?
============================================================================
==========================================================================
10.What is the major difference between the Product Backlog and the Sprint backlog?
================================================================
ANS: a.Planning
b.development
c.Testing
d.Operations
e.Management
ANS: Docker
===================================================
========================================================================
14.Which of the following stmts are correct about coding best practices and coming standards.Select
one or more
ANS: a.Coding standards improve the consistency and reliability at the code by eliminating personal
styles…..
b.Coding best practices one collection of good prgrmng practices which involve…..
========================================================================
15.If we need to apply design patterns , can we do it without the principle of OOP and standards?
ANS: Yes, design patterns are logical and comprehensive sequencing of elements with procedural
principles
======================================================================
16.As part of cloud application security, which of the following are the identify and and access solutions
provided by the cloud service providers?
b.Single sign-On/Off
==========================================================================
17.Joshua being a project manager, need to suggest methods to developers of project so that cliemnt
become high-performance business by delivering high-quality code.Which are they?
ANS: a.Adhere to Accenture Delivery Methods best practices and guidelines
18.This pattern evcaluates scenarios where you need just one object and you don’t want to create
multiple objects of that particular class. Or simply put restricting construction of more than one
object”Which pattern is it?
============================================
19.John, the Product owner, in consuitation with his stakeholders, has arrived at four features that are
of same priority. The stakeholders are of the opinion that all those features are of equal significance
Which of the following can John do, in this context?
ANS: Consult with the Development team and still arrive at a priority among these features
====================================================
20. Which of the following types of testing and their contribution to overall system documentation are
correct: select one
=======================================================
21.Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling
errors that may occur because of non availability of product in a cart already added earlier. Her first task
is to define these issue under a suitable category identify the correct category from the following
options.
==========================================================
22.What practices should be used when building a complex system? Select one or more:
============================================================
23.A Scrum development Team is supposed to be Self Organized that would mean
ANS: They can identify their own goals and make decisions on their own
=========================================================
24. What is the key benefit of the least privilege approach to security
So he logged into the mail account which resulted in the URL as shown below-
http://mail.abc.com/home/user=j4jacob/0/#inbox
He replies j4jacob with his friends user id john123. Now the update URL is-
http://mail.abc.com/home/user=john123/0/#inbox
he tries with this URL and he could access the mail box of his friend John. What type of vulnerability you
have noticed in the above scenario?
===============================================
26. What was seen in application over time, which creates the need of solution which could also be used
in other projects?
=================================================
27.Which of the following action to be taken before pushing the code into github.com when we have
sensitive information in the source code?
=====================================================
28.What practices should be used when building a complex system? Select one or more:
===========================================================
30. Identify the usage of sandboxes in Cloud Application Security.Select one or more
d.Discover vulnerabilities
======================
31.A model in which a service provider makes resources and infrastructure management available as
needed, and charges them for specific usage rather than a flat rate. Which model has the above stated
characteristics
====================================================
32.While doing the daily scrum ceremony, the true spirit of the ceremony should be?
==========================================
ANS: Optional input, mandatory input, primary output and secondary output
=============================
=================================================
35. John has written code that includes multiple methods that is not synonymous with functionality of it.
Many of those methods contain lots of nested stmts, hard coded values and over 500 lines of code.
What standard coding patterns would you suggest to him?
b.limit the method size between 100 and 150 code lines by refactoring it
======================================
36.Sujata a senior developer of project has been assigned a task to look at the code structure and
decoupling component wherever deemed necessary. What points she should keep in mind while
checking? Select one or more:
ANS: a.The average complexity of classes, programs, methods, procedures, or functions is under control
ANS: Identify and understand the high level threats to the organization and individual projects
======================================================================
ANS: writing codes with the highest possible coupling and the lowest possible cohesion.
===================================================================
c) Developers adaptability
==================================================
b) Longevity
c) Vastness
41) Which are the common coding situations that Developers come across Frequently from below ?
===========================================================
42) How did object-oriented programming systems handle completely better than procedural process.
==============================================
43) Which of the following definitions provided by various personnels would correctly depicts
CONFIGURATION MANAGEMENT and its most appropriate?
======================
=================================================================
Ans) An epic is the functional specifiactions technical specifiactions usability requirements specifications
of a user story
======================================================================
47) Consider the Dockerfile code – (assume the petclinic war and server.xml files are available in.
Ans) RUN Keyword executes the shell command during your image build where as CMD.
=======================================================================
Ans) a.Requirements.
================================================================
49) CIS are the work products within the selected categories that the project wants under.
============================================================================
====================================================================
51)Ms.Julie has
================================================================
Ans) A,B,C
==================
b.Requiremens Baseline
c.Testing Baseline
===============================================
Ans) WorkStream
================================================
Ans) Writing codes with the highest possible coupling and Lowest possible cohesion
===========================================================
Ans) a.Api calls travel across the internet and are subject to threats
===========================================================
Ans) Enables users of an application to use the same authentication for other application by the same
application.
===========================================
58) What is the logical grouping of elements that have single major outcome ?
===================================
59) Which are the external application oriented devices that provide application security?
==================================
60) During which ceremony Team members synchronize their work and progress and report any ?
b.Coding Standards
========================================================
=================================================
=======================================================
==============================================================
Ans) Custom/Packaged/Both
69)What are the two important objectives when adding testing code to a project?
==============================================================
72)Which of the following is not the right answer for packaged or Custome.
Ans)Custom software maps to the clients business process and contains key features
=====================================================================
==============================================================
Ans) TDD,TDD
================================