1. which of the following tasks wil be performed by the configuration management?
Choose exactly three correct options.
Ans: [Link] configuration
[Link] and reports
[Link] sure that project complies with CM standard
=============================================================
2. which of the following could be input or output of a task
ANS: [Link]
[Link]
[Link]
============================================================
3. identify the right combination of red/green/refactor cycle with its descripti
Ans) ALL the above
=============================================================
4. Identify the message protection deployment modes
ANS: [Link]-to-network
[Link]-to-host
[Link]-to-peer
====================================================
5. what are the two important objectives when adding testing code directly into units
ANS: [Link] normal design criteria to embed test code directly into units.
[Link] integration tests on the final release to ensure test code is present
[Link] test code from being compiled into production code
6. Peter a software professional is attending Devops training. The trainer has written some stmts that are
as listed [Link] asked the participants to identify the challenges the devops is facing predominantly
A. developer vs operations mindset
B. Transition from legacy infrastructure for deployment to microservices
[Link] to the changes
ANS. A, B and C
=====================================================================
7. which SOLID principle represents following stmt “the vehicle is an abstract for truck and bike”?
ANS: dependency inversion principle
========================================================================
8. Kiran needs help in following the rules that must be followed within creating exception handling
strategy. Which rules he must consider from below list?
ANS: [Link] meaningful exception messages
[Link] between application business and technical exceptions
============================================================================
9. How to ensure reusability of code in a project?
ANS: [Link] loosely coupled system
[Link] dependable modules
==========================================================================
10. What is the major difference between the Product Backlog and the Sprint backlog?
ANS: The sprint backlog is a subset of the product backlog
================================================================
11. What are the ADM 5 main focus areas?
ANS: [Link]
[Link]
[Link]
[Link]
[Link]
12. ADOP is built on a infrastructure
ANS: Docker
===================================================
13. What are the responsibilities of the change control board?
Choose exactly TWO options:
ANS: [Link] changes and updates to the project requirement as part of CM
[Link] and authorize changes to the baselines
========================================================================
14. Which of the following stmts are correct about coding best practices and coming [Link]
one or more
ANS: [Link] standards improve the consistency and reliability at the code by eliminating personal
styles…..
[Link] best practices one collection of good prgrmng practices which involve…..
[Link] high quality code
========================================================================
15. If we need to apply design patterns , can we do it without the principle of OOP and standards?
ANS: Yes, design patterns are logical and comprehensive sequencing of elements with procedural
principles
======================================================================
16. As part of cloud application security, which of the following are the identify and and access solutions
provided by the cloud service providers?
ANS: [Link] authentication
[Link] sign-On/Off
==========================================================================
17. Joshua being a project manager, need to suggest methods to developers of project so that cliemnt
become high-performance business by delivering high-quality [Link] are they?
ANS: [Link] to Accenture Delivery Methods best practices and guidelines
[Link] the Accenture Code quality Model
[Link] the practice of peer reviews
18. This pattern evcaluates scenarios where you need just one object and you don’t want to create
multiple objects of that particular class. Or simply put restricting construction of more than one
object”Which pattern is it?
ANS: Singleton pattern
============================================
19. John, the Product owner, in consuitation with his stakeholders, has arrived at four features that are
of same priority. The stakeholders are of the opinion that all those features are of equal significance
Which of the following can John do, in this context?
ANS: Consult with the Development team and still arrive at a priority among these features
====================================================
20. Which of the following types of testing and their contribution to overall system documentation are
correct: select one
ANS: All the above
=======================================================
21. Sohini is a new developer on XYZ e-commerce project. She has a written a piece of code for handling
errors that may occur because of non availability of product in a cart already added earlier. Her first task
is to define these issue under a suitable category identify the correct category from the following
options.
ANS: Business Exceptions
==========================================================
22. What practices should be used when building a complex system? Select one or more:
ANS: [Link] a modular design
[Link] components with tight coupling
============================================================
23.A Scrum development Team is supposed to be Self Organized that would mean
ANS: They can identify their own goals and make decisions on their own
=========================================================
24. What is the key benefit of the least privilege approach to security
ANS: it minimized the level of compromise in the event of a security breech
[Link] is an ethical hacker. He wants to intrude3 into mail box of his friend john to his personal
information
So he logged into the mail account which resulted in the URL as shown below-
[Link]
He replies j4jacob with his friends user id john123. Now the update URL is-
[Link]
he tries with this URL and he could access the mail box of his friend John. What type of vulnerability you
have noticed in the above scenario?
ANS: Cross site scripting
===============================================
26. What was seen in application over time, which creates the need of solution which could also be used
in other projects?
ANS: Faster time to market
=================================================
[Link] of the following action to be taken before pushing the code into [Link] when we have
sensitive information in the source code?
ANS: Move the sensitive information to gitignore file
=====================================================
[Link] practices should be used when building a complex system? Select one or more:
ANS: [Link] a modular design
[Link] the testability
[Link] components with tight coupling
===========================================================
[Link] are the pitfalls concerning the cloud application development?
ANS: Requiring all applications be deployed in the cloud
30. Identify the usage of sandboxes in Cloud Application [Link] one or more
ANS: [Link] attack vectors and agents
b. Discover application errors
c. Discover the impact of the applied malware
d. Discover vulnerabilities
======================
31.A model in which a service provider makes resources and infrastructure management available as
needed, and charges them for specific usage rather than a flat rate. Which model has the above stated
characteristics
ANS: Cloud computing
====================================================
32. While doing the daily scrum ceremony, the true spirit of the ceremony should be?
ANS: reporting updates to scrum master
==========================================
33. What relationship(s) can a work product have to task?
ANS: Optional input, mandatory input, primary output and secondary output
=============================
34. Select the challenges of applying TDD to Agile development projects
ANS: [Link] changes may affect unit tests
[Link] writing becomes intuitive
=================================================
35. John has written code that includes multiple methods that is not synonymous with functionality of it.
Many of those methods contain lots of nested stmts, hard coded values and over 500 lines of code.
What standard coding patterns would you suggest to him?
ANS: [Link] logically related stmts for easy readability
[Link] the method size between 100 and 150 code lines by refactoring it
======================================
36. Sujata a senior developer of project has been assigned a task to look at the code structure and
decoupling component wherever deemed necessary. What points she should keep in mind while
checking? Select one or more:
ANS: [Link] average complexity of classes, programs, methods, procedures, or functions is under
control
[Link] are no cyclic dependencies between classes, components or layers
[Link] to external libraries are well known
37. Which of the following is the description for the level 1 OWASP threat assessment maturity practice?
ANS: Identify and understand the high level threats to the organization and individual projects
======================================================================
38. What is the best approach in Design Patterns in coding?
ANS: writing codes with the highest possible coupling and the lowest possible cohesion.
===================================================================
39. Select the challenges of applying TDD to Agile development projects
Ans: a) Design changes may affect unit tests
b) Test Writing becomes intuitive
c) Developers adaptability
==================================================
40) How does ADM align to the new ?
Ans) a) Extensions and Context
b) Longevity
c) Vastness
41) Which are the common coding situations that Developers come across Frequently from below ?
Ans) Code is not well-formatted
===========================================================
42) How did object-oriented programming systems handle completely better than procedural process.
Ans) All the procedures were treated as an identifiable behaviour of an object.
==============================================
43) Which of the following definitions provided by various personnels would correctly depicts
CONFIGURATION MANAGEMENT and its most appropriate?
Ans) GABRIEL’S definition
======================
44) Which global policy of Accenture does ADS meet?
Ans) Policy 1100
45)What are the some features a tool should have to facilitate TDD Agile database development.
Ans) a. Implement tests in a built-in database testing language
b. Able to run tests in transactions to keep them independent
=================================================================
46) Which of the following statements is Valid?
Ans) An epic is the functional specifiactions technical specifiactions usability requirements
specifications of a user story
======================================================================
47) Consider the Dockerfile code – (assume the petclinic war and [Link] files are available in.
Ans) RUN Keyword executes the shell command during your image build where as CMD.
=======================================================================
48)[Link] has to create a project that includes.
Ans) [Link].
[Link] and Status Reports
================================================================
49) CIS are the work products within the selected categories that the project wants under.
Ans) Configuration Manager.
============================================================================
50) What is considered by the developers in regard to RESTFUL API deployment.
Ans) [Link] Against injection
[Link] API Keys
[Link] HTTPS identity Authentication
====================================================================
51)[Link] has
Ans) A,B,C,D and E
================================================================
52)Which of the following are CORRECT related to Secure SDLC?
Ans) A,B,C
==================
53)Projects should establish baseline at the end of each project stage.
Ans) [Link] Baseline
[Link] Baseline
[Link] Baseline
===============================================
54) What is the work assets grouped by business area?
Ans) WorkStream
================================================
55) What is the best approach in Design Patterns in coding?
Ans) Writing codes with the highest possible coupling and Lowest possible cohesion
===========================================================
56)Identify the cloud application
Ans) [Link] calls travel across the internet and are subject to threats
[Link] surface has increased.
===========================================================
57) What is the function of a featured identity?
Ans) Enables users of an application to use the same authentication for other application by the same
application.
===========================================
58) What is the logical grouping of elements that have single major outcome ?
Ans) Activity or Discipline
===================================
59) Which are the external application oriented devices that provide application security?
Ans except DAM
==================================
60) During which ceremony Team members synchronize their work and progress and report any ?
Ans) Daily Scrum
61) What guidelines should be followed for creating the Accenture coding standards?
Ans) [Link] be agreed
[Link] Standards
========================================================
62) What are some of the ways test-driven?
Ans) [Link] continuous integration
[Link] the available
=================================================
63)How to ensure reusability of code in a project?
Ans) [Link] dependable modules
b. Having loosely coupled system
=======================================================
64) Which of the following is CORRECT about a proxy product owner ?
Ans) All the options
==============================================================
65)Complete the statements Accenture Delivery Suite
Ans) smooth,efficient,predictable,reliable and high-quality results
66) Complete the statement Application Design can be done?
Ans) Custom/Packaged/Both
67) In the sprint planning
Ans) Begginning of sprint
68) What are the two importants
Except – Ensure test-related
69)What are the two important objectives when adding testing code to a project?
Ans) Except : Ensure test-related code is isolated
==============================================================
70) Code Review process involves which of the following steps?
Ans) except: Never conduct a review
71)How to ensure reusability of code in a project?
Ans) [Link] dependable modules [Link] loosely
coupled system
72)Which of the following is not the right answer for packaged or Custome.
Ans)Custom software maps to the clients business process and contains key features
=====================================================================
73) In Large Scale Scrum there is
Ans) multiple teams multiple product backlog
74) Why are WIP limits important
Ans) To ensure smooth flow of things through the system
==============================================================
75) What are the major challenges faced
Ns) a. Schema changes breaking testa [Link]
framework using mock objects
76)What are the different generic techniques followed in code optimization
Ans) Except : Data-Level parallelism
77) helps the design process
Ans) TDD,TDD
================================
78) Which of the following statements is/are correct?Ans) 1,2,3
and 4
79) Which of the following tasks will be performed by the
configuration manager?
Soln: plans,tracks,makes
80)which of the following could be input or output of a task.?
Soln: artifact , outcome, deliverable
81)identify the right combination of reed/green/refactor.?
82)identify the message protection deployment modes
Soln: Network,Network,peer
83)what are the two important objectives when adding testing
code to a project?
Soln: use,run,prevent
84)Peter a software professional a. developer vs operation mindset
Soln: a,b and c
85)which SOLID principle represents the following statememt the
vehicle is an abstract for truck and bike..?
Soln:dependency inversion principle
86) kiran needs help in following the
Soln:create,differentiate
87) how to ensure reusability of code in a project?
Soln:having loosely ,no dependable
88)what is the major difference between the product backlog and
the sprint backlog.?
Soln:the spenit backlog is a subset of the product backlog
89)what are the ADM5 MAIN focus areas?
Soln: all options
90)ADOP is built on a _ infra
solN;docker
91)what are the responsibilities of the change control board?
Soln:monitor changes , review and authorize
92)which of the following statements are correct about coding best
practices and coding standards
Soln: EXCEPT CODING BEST PRACTICES ARE AUTOMATICALLY
TAKEN CARE
93)if we need to apply design patternscan we do it without
Soln: yes, design patterns are logical and comprehensive
sequencing of
94)as part of cloud application security which of the following are
Soln: multifactor ,single sign in
95) jashua being a project manager
Soln: EXCEPT USING AUTOMATED
96) The pattern evaluates scenarios where
Soln: Singleton pattern
97)john, the product owner in consulatation with his
Soln: consult with the dev
98) which of the following types of testing and their contribution to
overall system documentation
Soln: all of the above
99)sohini is a new developer on XYZ
Soln: business exceptions
100)what practices should be used when building a complex
system
Soln: using a modular, using components
101) A scrum development team is supposed to be self
organizedthat would mean
Soln: they can identify their own goals
102)what is the key benefit of the least privilege approach to
security?
Soln: it minimized the level of compromise in the event of a
security breach
103)[Link] is an ethical hacker
Soln: cross site scripting
104) what was seen in application over time which creates the
need of solutions
Soln: faster time to market
105)which of the following action to be taken before pushing the
code
Soln; move the sensitive information
106)what practices should be used when building a complex
system?
Soln: EXCEPT MAXIMIZING COHESION
107)what are the pitfalls concerning the cloud application
Soln: requiring all applications be deployed in the cloud
108)identify the usage of sandboxes in cloud
Soln: EXCEPT DISCOVER PEEK APPLICATION PERFORMANCE
109)a model in which a service provider
Soln: cloud computing
110) while doing the daily scrum ceremony the true sprint of
Soln: reporting updates to scrum master
111) what relationships can a work product have to task?
Soln: optional input mandatory
112)select the challenges of applying TDD to agile development
and projects
Soln: design changes, test writing
113)john has written code that includes multiple methods
Soln: group, limit
114) Sujata a senior developer of project
Soln: EXCEPT COMPONENTS RESPONSIBILITIES
115) which of the following is a description for the level 1 OWASP
Soln: identify and understand the high
116) what is the best approach in design patterns in coding?
Soln: writing codes with the highest possible coupling and lowest
possible cohesion
117) select the challenges of applying TDD to agile development
projects
Soln: EXCEPT AUTOMATION OF THE TESTS
118) how does ADM align to the new?
Soln: EXCEPT REPUTABILTIY
119) which are the common coding situations that developers
come across frequently
Soln: code is not well formatted
120) how did object oriented programming
Soln: all the procedures were treated as an
121)which of the followimg definitions provided by various
personnels would correctly depicts
Soln; gabriels definition
122) which global policy of Accenture
Soln; policy 1100
123) what are some features a tool should have to facilitate TDD
Soln: implement , able
124) which of the following statements is valid?
Soln: an epic is the functional specifications
125) consider the dockerfile code
Soln; run keyword executes the shell command during your image
build where as CMD command executes the shell command while
creating container from that image
126) mr. neil has to create a project document
Soln; requirements , metrics
121) Cis are the work products within the selected categories that
the project wants under configuration control
Soln: configuration manager
122)what is considered by the developers in regard to RESTFul API
deployment ?
Soln: protection , use API, use HTTPS
123) Ms. Julie has to write a project document that proposes the
configuration
Soln: a b c d and e
124) which of the following are correct related related to Secure
SDLC ?
Soln: identifying,reveals,influence
ABC
125) projects should establish baselines at the end of each project
stage
Soln: EXCEPT INTEGRATION BASELINE
126) what is the work/ assets grouped by business area?
Soln: workstream
127) what is the best approach in design patterns in coding?
Soln: writing codes with highest possible coupling and lowest
possible cohesion
128) identify the cloud application issues when an application id
developed
Soln: API calls travel across the internet , attack surface has
increased
129) what is the function of a federated identity?
Soln: Enables users of an application to use the same
authentication for other
130) what is the logical grouping of elements that have single
major outcome / business result ?
Soln: activity or discipline
131) which are the external application oriented devices that
provide applicaṭion security?
Soln: EXCEPT DAM
132) During which ceremony team members synchronize their
work and progress and report any
Soln; Daily scrum
133) what guidelines should be followed for creating the Accenture
coding standards ?
Soln: should be agreed, coding standards
134) what are some of the ways test driven development can
benefit a project
Soln; supports, compresses
135) how to ensure reusability of code in a project?
Soln: no dependable modules , having loosely coupled sysyem
136) which of the following is correct about a proxy product owner
soln: all the options
137) complete the statements Accenture delivery suite is our
standard delivery framework
Soln; smooth efficient predictable reliable and high quality results
138) complete the statement application design can be done using
soln; custom / packaged / both
139) in the sprint planning meeting at the
Soln : begininig of sprint planning
140) What are the two important objectives when adding testing
code to a project?
Soln; EXCEPT ENSURE TEST RELATED CODE IS ISOLATED
141) which of the following are phases of NST SDLC MODEL
SOLN; the initiation phase, accomplishment and decelopment , the
operations and maintenance phase
142) code review process involves which of the following steps
Soln: EXCEPT NEVER CONDUCT A REVIEW
143) how to ensure reusability of code in a project ?
Soln; no dependable , having loosely coupled system
144) which of the following is not the right answer for packaged or
custom development ?
Soln: custom software maps to the clients busimess process and
contains
145) what are same features a total should have to facilitate TDD
agile database development
Soln:
146) In large scale scrum there is _
Soln: multiple teams , multiple product backlog
147) why are wip limits important ?
Soln: to ensure smooth flow of things through the system
148) what are major challenges faced when performing test driven
database development ?
Soln: schema , test
149) what are the different generic techniques followed in code
optimization for independent platform ?
Soln: EXCEPT DATA LEVEL PARALLELISM
150) _ helps the design process whereas _ is more suitable for
integration and functional testing
Soln: TDD , TDD
151) which of the following statements is / are correct ?
Soln: 1,2,3 and 4