1)Requirement clarity index for a project is computed based on the understanding of requirements by:
A)Development Team
B) Testing team
C)Business Analysts
D)Development and testing teams
2)Techniques used by static code analysis tool is:
A)Control Analysis
B)Fault/Failure Analysis
C)Interface Analysis
D)All the above
3)If a application is a most critical application that perform high value transaction,contain sensitive medical data,or any application that requires the highest level of trust (defence,Navy,govt secret missions etc) comes under which level of security?
A)Level 1 security
B)Level 2 Security
C)Level 3 Security
D) None of the above
4)Which of the following is not a security principle?
A)Confidentiality
B)Integrity
C)Availability
D) Authority
5)What should be included in every service level agreement?
A)Details of Systems based metrics used
B)A technical Description of service components
C)Clearly defined service outcomes
D)LEgal language
6)What is meant by team velocity in Scrum projects?
A)Team works less when it rains
B)keeping metrics of earlier amounts of work completed to help with future predictions on how much work can be completed in a certain time frame
C)Reterospectives should use less important topics such as weather ,as ice-breakers
D)Estimating team efforts for completing the projects.
7)Which of the following is the best practices adopted by scrum teams to ensure to have a sprint ready backlog items ready by the sprint planning meeting?
A)Spiking
B)Backlog refinement
C)Refactoring
D)Process tailoring
8)As per GIP MDD Stands for
A)Managing definition of done
B)Metrics description Document
C)Metric for defect density
D)Maintiain document descrptions
9)Reusability,Extensibility,portability,scalability,performance are examples of
A)Project types
B)Review types
C)Archtectural goals
D)All of the above
10)______ type of attack is carried out when untrusted data is sent to an interpreter as a part of command or query?
A)Sensitive data exposure
B)Broken authentication
C)SQL injection
D)Cross site scripting
11)which is owned code review tool as per the Devsecops periodic table available in GIP under Devsecops
A)Insight live
B) JAcoco
C)Crucible
D)Mocha
12)If the application handles personal data also known as personal information or sensitive information it is said to be
A)LEvel 1 Security
B)Level 2 security
C)Level 3 Security
D) None of the above
13)Define high level migration road map in cloud transformation is the primary responsibility of
A)Business Analyst
B)CLoud Architect
C)Both A and B
D)None of the roles
14)As per GIP models that are used to forecast quality and performence outcomes related to one or more sub process involved in the development ,maintainance and service process is refered as?
A)Statistical Modeling
B)GIP
C)CMMI
D)Prediction models
15)What does TCO give in cloud discovery?
A)Projected savings over a 3 or 5 yr period by moving to the cloud
B)Actual savings over a 3 or 5 yr period by moving to the cloud
C)Actual Loss over a 3 or 5 yr period by moving to the cloud
D)Projected loss over a 3 or 5 yr period by moving to the cloud
16)which of the following is not a functional testing?
A)Eqvivalence Test
B)Decision based tests
C)Boundary value tests
D)None of the above
17)which role in agile scrum is self organised and owns most of the activities included in sprint planning ,execution and reterospection
A)Scrum master
B)Product owner
C) Development team
D)Agile coach
18)Which of the following is the purpose of monitoring and event management practice?
A)To ensure that accurate and reliable information about the configuration of services is available when and where is needed
B)To systematically observe the services and service components record and report the selected changes of state
C)To protect the information needed by the organisation to conduct its business
D)to minimize the negative impact of incidents by restoring the normal service operation as quickly as possible
19)which of the following states the fundamental tent of scrum approach?
A)Get something simple released As quckly as possible
B)Get something business vale delivered As quckly as possible,consistent with the right level of quantity
C)Get something delivered once its fully documented and the documentation is signed off complete.
D)Get something “quick and dirty” delivered to save time.
20)Which of the following is benefit of using an IT service management tool to support incident managemt?
A)It can ensure that the incidents are resolved within agreed times
B)It can provide automated matching of incidents to problems or known errors
C)It can ensure the supplier contracts are aligned to the requirements
D)It can provide automated resolution of complex incidents
21)A process that is used to identify what is working well ,not working well and needs some modifications in the project is called:
A)Release Audit
B)Reterospection
C)Configuration Audit
D)Unit testing
22)As per GIP Lo team would maintian all std operating procedures /Known Error Database:
A)True
B)False
23)Upon rolling out large web and mobile enabled application portal ,if end users complain that they are unable to find the information they are looking for and needs multiple actions to retrieve simple information which of the following testing would have been ineffective for the application?
A)UAT Testing
B)Securtiy Testing
C)USability
D)Functional testing