Who can make changes to Product Backlog?
Only the Development Team.
Only the Scrum Master.
Anyone can influence the Product Owner to make changes, but Product Owner has final decision.
Anyone can make the changes, but Product Owner has to get a notification about what was changed.
Anyone can influence the Product Owner to make changes, but Product Owner has final decision.
What should be an ideal way to approach architecture as recommended by the principles of Agile Manifesto? (choose the best option)(M)
Architecture emerges in Agile during execution.
Architecture is not important, but functionality is important for stakeholders/business owners.
Architecture is defined and planned up front during the planning phases in Agile.
Architecture is defined and implemented in the first iterations/sprints.
Architecture emerges in Agile during execution.
This triad model help establish security policies & procedures in a organization.
What is CIA ?
He is the current CPA Comptroller.
Who is Kelly Hancock?
The Scrum Master
Controls the priority order of items in the Product backlog.
Is the keeper of the product vision.
Creates, refines and communicates customer requirements to the Dev Team.
Is the Scrum Team's Scrum expert and focuses on continual improvement.
Is the Scrum Team's Scrum expert and focuses on continual improvement.
Which of the following is NOT a principle of the manifesto for agile software development?
Commitment to the plan despite changing circumstances.
Projects are built around motivated individuals, who should be trusted.
Working software is delivered frequently (weeks rather than months).
Face-to-face conversation is the best form of communication (co-location).
Commitment to the plan despite changing circumstances.
These are specific permissions or access rights granted to users or applications to perform actions on data or system.
What are entitlements ?
An error where an AI model generates incorrect, false, or misleading information, often presented as fact.
What is Hallucination?
Which of the following is a characteristic of a good Scrum Team?
Its members all have similar skills.
It waits for tasks to be assigned to it.
It seeks direction from the Scrum Master.
It is self-managing.
It is self-managing.
There is no difference between incremental and iterative development?
True
False
False
Encryption using 2 keys: one private, one public
What is asymmetric encryption ?
In AI, RAG stands to this framework to improve quality of responses.
What is Retrieval Augmented Generation?
What is the approach that Scrum encourages when Developers determines it will be difficult to deliver any value by the end of a Sprint?
Extend the Sprint by a few days to accommodate the extra work.
Immediately escalate to Senior Management.
Together with the Product Owner, focus on what can be done and identify a way to deliver something valuable at the end of each Sprint.
Suggest the Product Owner abnormally terminate the Sprint
Together with the Product Owner, focus on what can be done and identify a way to deliver something valuable at the end of each Sprint.
Which of these Agile terms is paired with its correct definition?
User personas: a summary of a feature from the user's perspective.
Use cases: a characterization of your intended end user.
User stories: documentation of user paths through an app.
Acceptance criteria: what needs to be done for a user story to be achieved.
Acceptance criteria: what needs to be done for a user story to be achieved.
Assurance that someone cannot deny the validity of something.
What is Non-repudiation?
Tool that simulates attacks to find vulnerabilities.
What is a penetration testing tool?
Graphical representation of work left to do versus time
Burn up chart
Burn down chart
Velocity chart
Sprint Report
Burn down chart
The Three Question format for Daily Scrum is compulsory
True
False
Flase
This HashiCorp tool automates infrastructure provisioning using code.
What is Terraform?
ATAM stands to this method for evaluating technology architectures.
What is Architecture Tradeoff Analysis Method?
System that monitors networks for suspicious activity.
What is an Intrusion Detection System?
This architecture is specifically designed to process sequential data.
What is a RNN(Recurrent Neural Network)?