0% found this document useful (0 votes)
6K views

DFA 4.0

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6K views

DFA 4.0

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

1. Why is maintaining coding standards important for code quality?

Options:

• It eliminates the need for team communication during development.

• It allows easier debugging and updating, making the code more maintainable and reducing
risks.

• It slows down the development process, giving more time for testing.

• It limits the creative freedom of developers, ensuring uniformity.

Correct Answer: It allows easier debugging and updating, making the code more maintainable
and reducing risks.

2. Which technique is commonly used for prioritizing backlog items in Agile?

Options:

• Gantt Chart.

• MoSCoW Method.

• Waterfall Model.

• SWOT Analysis.

Correct Answer: MoSCoW Method.


3. How should user stories be prioritized in Agile?

Options:

• Based on the project’s budget and timeline.

• Based on business value and user needs.

• Based on the availability of developers.

• Based on the estimated time for completion.

Correct Answer: Based on business value and user needs.

4. What is the primary purpose of creating personas in Agile development?

Options:

• To evaluate the performance of the development team.

• To identify and prioritize system features based on user needs.

• To assign tasks to development team members.

• To define the project budget and timeline.

Correct Answer: To identify and prioritize system features based on user needs.
5. Which of the following is typically NOT a component of the Definition of Done (DoD)?

Options:

• Acceptance criteria are met.

• The story is prioritized in the backlog.

• Code is written and reviewed.

• Documentation is updated.

Correct Answer: Documentation is updated.

6. How does Feature-Driven Development (FDD) prioritize work?

Options:

• By the business value of features and their risk.

• By the complexity of the tasks.

• By assigning tasks to developers based on their skills.

• By team members’ preferences and availability.

Correct Answer: By the business value of features and their risk.

7. What is the primary purpose of the Kano Model in Agile?


Options:

• To estimate project costs and timelines.

• To prioritize features based on customer satisfaction.

• To allocate tasks among team members.

• To determine the technical feasibility of features.

Correct Answer: To prioritize features based on customer satisfaction.

8. In Accenture Reinvention Console, what kind of information can you find in an industry page?

Options:

• Accenture positioning and competitive landscape.

• Industry-specific subject matter experts.

• Industry-specific assets by lifecycle phase.

• All of the above.

Correct Answer: All of the above.

9. In ARC, which of the following can be achieved using the myWorkspace feature? Choose three
most appropriate options.

Options:
• Tailor relevant aspects of a solution table to align with client priorities.

• Search for technologies, processes, patents, and other properties of Accenture.

• Create a personalized client transformation journey.

• Modify the look and feel of the workspace to align with your client’s brand and content
expectations.

Correct Answer: Tailor relevant aspects of a solution table to align with client priorities, Create a
personalized client transformation journey, Modify the look and feel of the workspace to align
with your client’s brand and content expectations.

10. Ganesh, the Tester, has joined Accenture recently and is not very clear about his
responsibilities. Can you point him to the right method and role?

Options:

• ADM for Custom Development - Role: User Experience Specialist.

• ADM for Service Delivery - Role: Release Manager.

• ADM for Custom Development - Role: Tester.

• ADM for Hybrid Agile - Role: Test Lead.

Correct Answer: ADM for Custom Development - Role: Tester.

11. As a Solution Architect, Jason needs to find the method and task used to perform solution
planning. Which methods and tasks/roles can he use?
Options:

• Method: ADM for Service Delivery; Task: O710 Manage Solution Planning; Role: Project
Manager.

• Method: ADM for Application Modernization; Task: 212 Assess Process Gaps; Role: Solution
Architect.

• Method: ADM for Solution Planning for SI; Task: O710 Manage Solution Planning; Role: Solution
Architect.

• Method: ADM for Packaged Development; Task: 713 Analyze Business Process; Role: Process
Team Lead.

Correct Answer: Method: ADM for Solution Planning for SI; Task: O710 Manage Solution
Planning; Role: Solution Architect.

12. Which cloud computing service model is most appropriate for a company that wants to
manage its own applications and data but not the underlying infrastructure?

Options:

• Software as a Service (SaaS).

• Platform as a Service (PaaS).

• Infrastructure as a Service (IaaS).

• On-premises data center.

Correct Answer: Infrastructure as a Service (IaaS).


13. Which of the following are key enabling technologies of cloud computing?

Options:

• Blockchain and quantum computing.

• Virtualization, distributed computing, and high-speed internet connectivity.

• 3D printing and augmented reality.

• Nanotechnology and biotechnology.

Correct Answer: Virtualization, distributed computing, and high-speed internet connectivity.

14. What does the DRY principle in software development emphasize?

Options:

• Writing code that is difficult to understand.

• Avoid duplicating code by reusing existing code wherever possible.

• Writing the same code multiple times for clarity.

• Using complex algorithms to solve simple problems.

Correct Answer: Avoid duplicating code by reusing existing code wherever possible.

15. Which design pattern is used to make incompatible interfaces work together?
Options:

• Singleton Pattern.

• Observer Pattern.

• Adapter Pattern.

• Factory Pattern.

Correct Answer: Adapter Pattern.

16. Which of the following is NOT a part of Configuration Management?

Options:

• Auditing.

• Status Reporting.

• Controlling Change.

• Standardization.

Correct Answer: Standardization.

17. What best describes Configuration Management?

Options:
• Configuration Management helps in making sure the right code gets into the project at the right
time.

• It’s the same thing as version control.

• Configuration Management is what we do to make sure we’ve backed up our work.

• Configuration Management is the process of establishing and maintaining the integrity of work
products and other important project documents.

Correct Answer: Configuration Management is the process of establishing and maintaining the
integrity of work products and other important project documents.

18. During a busy workday, the company’s email system suddenly becomes unavailable,
preventing employees from sending or receiving emails. The IT team quickly acknowledges the
issue and begins working on a fix. What step do they take?

Options:

• Escalating the issue to senior management.

• Waiting to see if the issue resolves itself.

• Logging the incident and categorizing its priority.

• Ignoring the incident if it’s minor.

Correct Answer: Logging the incident and categorizing its priority.

19. Our Accenture asset GenWizard is built on top of ______?

Options:
• Azure OpenAI.

• AWS CloudAI.

• Google VisionAI.

• VertexAI.

Correct Answer: Azure OpenAI.

20. For which of the following use cases can we infuse GenWizard for modern engineering
modules? Choose two most appropriate options.

Options:

• Incident management.

• Automated ticket resolution.

• Continuous Deployment.

• Translate code across languages.

Correct Answer: Automated ticket resolution, Translate code across languages.

21. Which two important inclusions should be part of an AI acceptable use policy?

Options:
• Preventing use of sensitive data.

• Allowing unrestricted data access.

• Ensuring data privacy.

• Ignoring ethical considerations.

Correct Answer: Preventing use of sensitive data, Ensuring data privacy.

22. Which of the following best describes social engineering?

Options:

• A technique used to manipulate individuals into divulging confidential information.

• A type of software that protects against cyber threats.

• A programming language used to develop security applications.

• A method of exploiting human psychology to gain unauthorized access to information.

Correct Answer: A method of exploiting human psychology to gain unauthorized access to


information.

23. Which of the following is an example of an application-layer attack?

Options:

• Brute force attack.


• Distributed Denial of Service.

• Cross-Site Scripting (XSS).

• Man-in-the-Middle (MitM) attack.

Correct Answer: Cross-Site Scripting (XSS).

24. What is the principle of least privilege in IAM?

Options:

• Users are granted access based on their seniority within the organization.

• Users are given the minimum level of access necessary to perform their job functions.

• Access is revoked after a user has not logged in for 30 days.

• All users have full administrative access to all resources.

Correct Answer: Users are given the minimum level of access necessary to perform their job
functions.

25. What is a cumulative update in the context of security patches?

Options:

• An update that reverts the system to its original state.

• An update that improves system performance without addressing security issues.


• An update that includes multiple security patches bundled together.

• An update that only includes security patches for a single vulnerability.

Correct Answer: An update that includes multiple security patches bundled together.

26. What is one of the main challenges associated with automation?

Options:

• Increased manual data entry.

• Lack of software availability.

• High upfront costs and investment.

• Decreased speed of processes.

Correct Answer: High upfront costs and investment.

27. What does “workflow automation” refer to in the context of BPA?

Options:

• The manual creation of workflows.

• Designing physical layouts for workspaces.

• Increasing the number of tasks performed by humans.


• Automating the steps and tasks in a business process.

Correct Answer: Automating the steps and tasks in a business process.

28. What is a project baseline?

Options:

• A risk management tool.

• A financial report.

• A list of project tasks.

• The original project plan plus approved changes.

Correct Answer: The original project plan plus approved changes.

29. Which document defines the scope, objectives, and overall approach for a project?

Options:

• Work Breakdown Structure (WBS).

• Project Charter.

• Stakeholder Register.

• Risk Register.
Correct Answer: Project Charter.

30. Which document outlines the project’s deliverables and the work required to create them?

Options:

• Project Charter.

• Stakeholder Register.

• Risk Register.

• Work Breakdown Structure (WBS).

Correct Answer: Work Breakdown Structure (WBS).

31. A financial services firm is considering a hybrid cloud strategy to improve operational
efficiency. Which business reason most likely motivates this firm to adopt a hybrid cloud
solution?

Options:

• Enhancing scalability for non-critical applications.

• Reducing total cost of ownership.

• Reducing the risk of vendor lock-in.

• Achieving regulatory compliance.

Correct Answer: Enhancing scalability for non-critical applications.


32. An e-commerce company is planning for Black Friday sales. Which hybrid cloud use case
does this scenario best represent?

Options:

• Data sovereignty.

• Disaster recovery.

• Cloud bursting.

• DevOps integration.

Correct Answer: Cloud bursting.

33. You are working on a new feature and want to ensure it does not disrupt the main codebase
being developed by others. What SCM practice should you follow to manage your feature
development?

Options:

• Share code changes via email.

• Commit directly to the main branch.

• Avoid using branches and work directly on the production code.

• Create a separate branch for your feature development.

Correct Answer: Create a separate branch for your feature development.


34. You have several Docker containers running different services and need to manage their
deployment, scaling, and networking. What tool would you use to manage multiple containers
effectively?

Options:

• Jenkins.

• Docker Compose.

• Ansible.

• Kubernetes.

Correct Answer: Kubernetes.

35. Which of the following is NOT a common technique used in functional testing?

Options:

• Boundary Value Analysis.

• Equivalence Partitioning.

• Decision Table Testing.

• Load Testing.

Correct Answer: Load Testing.


36. What is the key difference between Alpha Testing and Beta Testing?

Options:

• Alpha Testing is focused on performance, Beta Testing on functionality.

• Alpha Testing is done by internal teams, Beta Testing is done by external users.

• Alpha Testing is done by the end users, Beta Testing is done by developers.

• Alpha Testing is conducted post-release, while Beta Testing is pre-release.

Correct Answer: Alpha Testing is done by internal teams, Beta Testing is done by external users.

37. Which of the following is NOT a Generative AI Assets – Deployment option we have in
Accenture?

Options:

• On-Premise dedicated implementation.

• SaaS-based Implementation.

• Develop using Private Open Source.

• Develop using Public Open Source.

Correct Answer: Develop using Private Open Source.


38. Which of the following are valid use cases for GenWizard in conjunction with ecosystem
tools in Application Development & Systems Integration? Choose two most appropriate options.

Options:

• Incident management.

• Self-healing – monitoring to auto-resolution.

• Continuous Deployment.

• Functional test case and script generation & execution.

Correct Answer: Self-healing – monitoring to auto-resolution, Functional test case and script
generation & execution.

39. If a service’s availability falls below its Service Level Objective (SLO), what should be the first
course of action?

Options:

• Adjust the SLO to match current availability.

• Investigate the underlying causes of the availability shortfall.

• Deploy additional infrastructure immediately.

• Notify the end-users about the delay.

Correct Answer: Investigate the underlying causes of the availability shortfall.

You might also like