Delivery Foundation Academy CL10 Question Answers


Hello Friends if you are looking for Delivery Foundation Academy CL10 Questions with Answers | Delivery Foundation Academy CL10 Multiple Choice Questions | Delivery Foundation Academy CL10 Accenture Dumps | Delivery Foundation Academy CL10 Objective type questions with Answers then you will get all answers here.

Join our Telegram Channel for Daily Updates on Accenture Examshttps://t.me/+U0BWlikjjG5jNDVl

Please use ‘FIND IN PAGE OPTION’ in google chrome to find any questions

For handling errors in ABC project code base, Sam has been assigned task for creating exceptions. Which guidelines he must follow while writing exceptions? Select one or more:

a.
Always handle the exception as it is an unusual event that may occur.
b.
Create new types of exceptions to handle any kind of situation if need be.
c.
Write exceptions in usual flow of program.
d.
No need to document exceptions.

Ans: A B

What is considered by the developers in regard to RESTFul API deployment? Select one or more:

a.
Size of the application
b.
Use API Keys
c.
Protection Against Injection
d.
Use HTTPS identity Authentication
e.
Operation

Ans: B C D E

Madhu has created an image using Docker commands and she wants to map a customized tag for the image. Which command helps to do the same ? Select one or more:

a.
docker tag imageid tagname:version

b.
docker tag tagname:version
c.
docker tag image name tagname:version
d.
docker tag tagname:version imagename

Ans: A C

What are the responsibilities of the Change Control Board? Choose exactly TWO correct options. Select one or more:

a.
Review and authorize changes to the baselines.
b.
Represent the interests of the Project Manager and any groups who are not affected by changes to the
baselines.
c.
Authorize the creation of products from the RTM library.

d.
Monitor changes and updates to the project requirements as part of CM.

Ans: A D

Shyam created container images considering his project environment requirement. Which cloud based registry enables capability of hosting private and public content(images). Select one:

a.
Docker Container
b.
Docker Volumes
c.
Docker Hub
d.
Docker Repositories

Ans: C

In Accenture Code Quality Model, fundamental area of Performance and Scalability, select the important considerations from below – Select one or more:

a.
Sensitive data not being used or passed unnecessarily
b.
Object pooling and recycling patterns
c.
Parallel processing and concurrency
d.
Data Encryption and encoding implementation

Ans: B C

Which of the following is CORRECT about a Proxy Product Owner?
i) Proxy PO comes into picture when PO is absent
ii) Proxy PO has all the power and authority as that of a PO
iii) Proxy PO can make ‘Go’ or ‘No-Go’ decisions with the teams
Select one:

a.
Only ii and iii
b.
Only iii
c.
Only i
d.
All the options

Ans:D

What are the OOP components that is influenced in Design Patterns?
Select one or more:

a.
Polymorphism
b.
Encapsulation
c.
Inheritance
d.
Abstraction

Ans:A B C D

Alex is addressing the Scrum Development Team and educating them on ‘Courage’, which is one of the
core values of Scrum. Which of the following is an appropriate explanation that Alex can give his team
on ‘Courage’?
i) Courage in sharing facts as it is
ii) Courage to change direction when needed
iii) Courage to support Scrum Values
iv) Courage to not deliver incomplete deliverables
Select one:
a.
None of the options
b.
Only I, ii and iii
c.
Only ii, iii and iv

d.
All the options

Ans:D

In a real-world system where we will hundreds of classes and objects which perform thousands of actions. How will assign the responsibility to each class or object?
Select one:

a.
Assign a responsibility to the Information Expert, which will have the necessary information to fulfill
the responsibilities.
b.
Group the objects into classes which will be giving the information to all the subclasses on their
responsibility
c.
Create an Abstract class and implement based on the responsibility

Ans:A

……………. used to identify security vulnerabilities in an application while it is being developed. Useful in
penetration testing.
Select one:

a.
OWASP ZAP
b.
Vault
c.
Fortify
d.
SonarQube

Ans:A

Which SOLID principle helps the use to develop less coupled code by ensuring the high level modules depend on abstraction rather than concrete implementations of lower level modules?
Select one:

a.
Open Closed Principle
b.

Single responsibility
c.
Dependency Inversion Principle
d.
Interface segregation

Ans:C

Which of the following action to be taken before pushing the code into github.com when we have sensitive information in the source code ?
Select one:

a.
Move the sensitive information to .gitignore file
b.
Replace the sensitive data with mock data
c.
Delete all the sensitive information
d.
No change needed as the information is needed for application functionality

Ans:A

What is feature integration sprint?
Select one:

a.
A sprint outside release for performing cutover activities
b.
A final sprint within the release for performing integration & regression testing
c.
Sprint that can be conducted as and when required for adhoc tasks
d.
First sprint of the release dedicated for planning

Ans:B

Why are policies required for a project?
Select one:

a.
All of the above
b.
Make things easy to understand
c.
Everybody is on the same page
d.
It helps one understand what needs to be done for that particular column

Ans:A

Choose exactly three CORRECT options about Fuzzing.
Select one or more:

a.
Analysis performed on execution code
b.
It uses unexpected randomized inputs to determine how software will respond
c.
Does the software meet design requirement
d.
A form of black box testing

Ans:A B D

How does ADM align to the new ?
Select one or more:

a.
Extensions and Context
b.
Vastness
c.
Longevity
d.
Reputability

Ans:A B C D

Which of the following is done as part of ”Kanban’?

a) Splitting work into smaller items

b) Deciding the sequence of steps the work items need to go through

c) not imposing any limit on the work in progress

d) Track the lead and cycle time

Ans:Only a,b and d

Mr Peter is performing GUI testing for Web Application. Which all features should he need to make sure while GUI Testing of the Web application can be automated?

a.

Validation of fields

b.

touch screen

c.

mouse clicks

d.

All of the Above

e.

displaying help texts

Ans:d

BookMyTicket is an online application for booking the movie ticket. This application is making use of acentral database which is maintained on cloud and is available on demand. It is encrypted in transit. This database is used by all the movie ticket booking applications including BookMyTicket. Which XaaS is depicted in the above scenario?

Select one:

a.

DaaS

b.

STaaS

c.

CaaS

d.

BPaaS

Ans:a

Which of the following is the description for the Level 2 OWASP threat assessment maturity practice?

Select one:

a.

Map compensating controls to each threat against the internal and third-party software

b.

Identify and understand the high level threats to the organization and individual projects

c.
Increase the accuracy of the threat assessment and improve granularity of per-project understanding.

Ans:c

Projects should establish baselines at the end of each project stage. Typically, a baseline is created for each major stage of work, and the Team Lead for each stage (or the Project Manager) is responsible for creating that baseline. Which of the following baseline will be supported for project’s work according to you? Choose exactly THREE correct options.

Select one or more:

a.

Architecture Baseline

b.

Requirements Baseline

c.


Testing Baseline

d.

Integration Baseline

Ans:abd

What are the ADM 5 main focus areas?

Select one or more:
a.
Management
b.
Testing
c.
Planning
d.
Operations
e.
Development

Ans:all of the above

Which of the following statements are correct about coding best practices and coding standards? Select one or more:

a.Coding standards improve the consistency and reliability of the code by eliminating personal styles
and by bringing symmetry to the application code, irrespective of the developers involved.
b.Coding best practices and standards are automatically taken care
c. Deliver High Quality Code
d. Coding best practices are collection of good programming practices and experiences, which involve
the use and improvement of coding standards.

Ans: a c d

Which of the following is NOT one of the 9 key principles of GRASP?

Select one:
a.
Inheritance
b.
High Cohesion
c.
Low Coupling
d.
Creator

Ans: a

Which among the following is NOT part of Large Scale Scrum?

a) Sprint Planning
b) Daily Scrum Meeting
c) Overall Retrospection
d) Product Backlog Refinement

Ans: None of the above

Mr. John is trying to trigger the pipeline for Build Periodically option of Build Triggers 15 minutes past mid-night every day. Can you help Mr. John to achieve the same.
Select one:

a.
Under build triggers, select Build Periodically option and * * * 15 12
b.
Under build triggers, select Build Periodically option and * * * * *
c.
Under build triggers, select Build Periodically option and 15 * * * *
d.
Under build triggers, select Build Periodically option and 15 0 * * *

Ans: d

In a Banking application, we keep the CustomerUI logic separate from the backend or the business logic of our application. Which GRASP principle would take the request from the UI and then assign that to the
proper object to do the work?

Select one:
a.
Low Coupling
b.
High Cohesion
c.
Controller
d.
Creator

Ans: c

If any team member, accidently , pushed the sensitive information in their project’s private github.comrepository, what should be the step he/she has to take immediately?

Select one or more:

a.

No action needed as the repository is private and have access to only project team members.
b.
Remove the sensitive information from github.com and delete the version history immediately.
c.
Report the issue to ASOC and his/her manager immediately
d.
Copied code over to Accenture internal repository hence the code can be protected.

Ans: b c

Kiran needs help in following the rules that must be followed while creating exception handling strategy.
Which rules he must consider from below list?

Select one or more:
a.
Delay till testing to rectify an incorrect exception.
b.
Think of a strategy for logging exceptions
c.
Create meaningful exception messages.
d.
Differentiate between application business and technical exceptions.

Ans: b c d

What are the pitfalls concerning the cloud application development?

Select one:
a.
Using Open source
b.
Requiring all applications be deployed in the cloud.
c.
Consulting with all Key stakeholders
d.
Using untrusted Third party APIs

Ans:d

Which areas of a code layout must be considered to reduce comments on methods and reduce errors?

Select one or more:
a.
Blocks of code
b.
Indentation
c.
The use of white space
d.
Naming conventions

Ans:all of these

Identify the cloud application issues when building an application.

Select one or more:
a.
API calls emanate from multiple device types
b.
attack surface has increased
c.
API calls travel across the internet and are subject to threats
d.
Developer create the APIs when building application

Ans:all of these

Complete the statements- Accenture Delivery Suite (or ADS) is our standard delivery framework designed to help our teams “_” results.

Select one:
a.
fast, efficient, predictable, reliable and high-quality results
b.
smooth, efficient, predictable, reliable and high-quality results
c.
workable, smooth, reliable and high-quality results

d.

efficient, predictable, reliable and high-quality results

Ans:a

The projects should adopt the security testing tools that regularly gets updated with the new set of vulnerabilities in the market (every regular intervals, there are new vulnerabilities added into the bucket vulnerabilities). These tools would eventually do security testing rigorously to identify the defects due to new and potential vulnerabilities before it is deployed and cause damage to the application and client business. Name the team in Accenture that does this quality check before the product getting deployed into the production environment.

Select one:

a.

AllSec

b.

ASOC

c.

ADOP

d.

ADM

Ans:b

Consider a scenario where apache tomcat service is already up and running on its default port 8080. While trying to have Jenkins up and running on its default port with the regular extraction of war file (java -jar jenkins.war). Which of the following will occur? Choose the appropriate option.

Select one:
a.
Both Tomcat service and Jenkins service will be up and running
b.
Both Tomcat service and Jenkins service will fail to come up
c.
Jenkins will fail to come up
d.
Tomcat service will stop and Jenkins service will start

Ans:c

Ms Ruby is trying to record all functional tests needs to be performed for her Web application. All the screen navigations and screen visited information should be recorded, search bars, sign in,etc…Which software tool will you suggest for automation of functional testing.

Select one:
a.
TestUnited
b.
TestAutomated
c.
TestFull
d.
TestComplete

Ans:d

Which of the following are CORRECT related to Secure SDLC?

A . Identifying system configuration issues related to security early.
B . Reveals the identification of shared security services
C . Influence executive decisions due to timely risk management processes.
D . Documenting and then informing management about security considerations during development
phase.
Select one:
a.
B,C
b.
A,B,C
c.
B,C,D
d.
A,B,C,D

Ans:b

What relationship(s) can a work product have to task?

Select one:
a.
Output only
b.
Optional input, mandatory input, primary output and secondary output.
c.
Input only

Ans:b

Which global policy of Accenture does ADS meet?

Select one:
a.
Policy 1200
b.
Policy 0011
c.
Policy 1100
d.
Policy 0012

Ans:b

Which of the following statements is Valid?

Select one:
a.
epic and user story are interchanging used terminologies
b.
An user story is a large epic that is made up of smaller, more granular epics.
c.
An epic is the functional specifications, technical specifications, usability requirements specifications of
a user story
d.
An epic is a large user story that is made up of smaller, more granular user stories.

Ans:d

What is the best approach in Design Patterns in coding?

Select one:
a.
Writing codes with the highest possible coupling and the highest possible cohesion.
b.
Writing codes with the lowest possible coupling and the highest possible cohesion.
c.
Writing codes with the highest possible coupling and the Lowest possible cohesion

Ans:b

Which factors we should consider during Regression Testing?

A . Code changes are Inevitable over time

B Code changes can have unintended negative consequences.

C Code Changes includes code/plugin/dependency additions

D. All of the above

E. None

Ans:a c b

Which SOLID principle repesents the follwing statement ” the vehicle is an abstract for truck and bike”

Select one:
a.
Dependency Inversion Principle
b.
Open/Closed Principle
c.
Liskov Substitution Principle
d.
Single Responsibility Principle

Ans:c

Sprints are usually ___.

Select one:
a.
Time Boxing
b.

Epic Boxing
c.
Theme Boxing
d.
Feature Boxing

Ans:a

Mr. John is a Team Lead handling a team of 10 members. He suggested their team members to adopt
DevOps process and the team is planning to implement the DevOps process for software delivery.
Which among the following benefits you think team can achieve by adopting Devops process. Choose
exactly 3 CORRECT ANSWERS.

Select one or more:
a.
Application stack consistency
b.
Production readiness
c.
Infrequent build and integration
d.
Application monitoring management

Ans:a b d

Once the Configuration Management team determines the appropriate level of CM control. ABC Utility is
trying to determine which CM Tool to use. Assume that you are part of CM team and select the
appropriate tool to use. Choose exactly THREE correct options.

Select one or more:
a.
VSS(Visual SourceSafe)
b.
GitLab
c.
Mercurial
d.
PVCS(Poly Version Control System)

Ans:a c d

What are the benefits of adopting the security-centric approach to develop the applications in the cloud?

Select one:
a.
All the above
b.
Identify system configuration issues
c.
Early identification and mitigation of security vulnerabilities
d.
Reuse of the security stratergies and tools

Ans:a

Identify the correct options for Load Testing.

Select one or more:
a.
Commonly used to test high availability solutions
b.
Test software under normal load conditions
c.
Requires a baseline of normal activity
d.
Test software under extreme load conditions

Ans:bc

Identify the services provided by Microservices when compare to Design Patterns.

Select one or more:
a.
Catalog of Solutions
b.
Environment
c.
Implementation
d.
Code Access

Ans:bcd


Leave a Reply

Your email address will not be published. Required fields are marked *