| |
|
SAFe 5 DevOps Practitioner
Question No:-13
|
The DevOps Health Radar aligns the four aspects of the Continuous Delivery Pipeline to which four stakeholder concerns?
Choose the correct options from below list
(1)Exploration, integration, development, reflection
(2)Portfolio, Solution, program, team
(3)Productivity, efficiency, speed-to-market, competitive advantage
(4)Alignment, quality, time-to-market, business value
Answer:-(4)Alignment, quality, time-to-market, business value
|
|
Question No:-14
|
Where do features go after Continuous Exploration?
Choose the correct options from below list
(1)Into Continuos Integration where they are then split into stories
(2)Into the Portfolio Backlog where they are then prioritized
(3)Into Continuous Integration where they are deployed with features toggles
(4)Into Continuos Development where they are implemented in small batches
Answer:-(1)Into Continuos Integration where they are then split into stories
|
|
Question No:-15
|
What is one potential outcome of the Verify activity of the Continuous Delivery Pipeline?
Choose the correct options from below list
(1)Analyze regression testing results
(2)Roll back a failed deploymentcorrect
(3)Fix a broken build
(4)Capture usage metrics from a canary release
Answer:-(2)Roll back a failed deploymentcorrect
|
|
Question No:-16
|
What marks the beginning of the Continuous Delivery Pipeline?
Choose the correct option from below list
(1)A committed Feature
(2)A checked-in change
(3)An idea
(4)A committed user story
|
Question No:-17
|
Which two statements describe the purpose of value stream mapping? (Choose two.)
Choose the correct option from below list
(1)To deliver incremental value in the form of working, tested software and systemscorrect
(2)To create an understanding of the budget
(3)To create an action plan for continuos improvement
(4)To understand the Product Owner's priorities
(5)To visualize how value flows
|
Question No:-18
|
Which technical practice incorporates build-time identification of security vulnerabilities in the code?
Choose the correct option from below list
(1)Threat modeling
(2)Application security
(3)Penetration testing
(4)Dynamic code analysis
Answer:-(2)Application security
|
|
Question No:-19
|
Weighted shortest job first is applied to backlogs to identify what?
Choose the correct option from below list
(1)Maximum economic value
(2)Epics, Features, and Capabilities
(3)User business value
(4)Proxy for job size
Answer:-(1)Maximum economic value
|
|
Question No:-20
|
Which two statements describe the purpose of value stream mapping? (Choose two.)
Choose the correct option from below list
(1)To deliver incremental value in the form of working, tested software and systems
(2)To create an understanding of the budget
(3)To create an action plan for continuos improvement
(4)To understand the Product Owner's priorities
(5)To visualize how value flows
|
Question No:-21
|
What work is performed in the Build activity of the Continuous Delivery Pipeline?
Choose the correct option from below list
(1)Code
(2)Compile
(3)Code review
(4)Automated acceptance testing
|
Question No:-22
|
What is a consequence of working in isolation on long-lived code branches?
Choose the correct option from below list
(1)Rollbacks will be difficult
(2)Trunk/main will not always be in a deployable state
(3)Static analysis tests will fail
(4)Deployments will fail
Answer:-(2)Trunk/main will not always be in a deployable state
|
|
Question No:-23
|
Why is hypothesis evaluation important when analyzing data from monitoring systems in the Release on Demand aspect?
Choose the correct option from below list
(1)It helps quickly create balanced scorecards for stakeholder review
(2)It helps operations teams know where to apply emergency fixes
(3)It helps link objective production data to the hypothesis being tested
(4)It helps define the minimum viable product
Answer:-(3)It helps link objective production data to the hypothesis being tested
|
|
Question No:-24
|
Scanning application code for security vulnerabilities is an important step in which aspect of the Continuous Delivery Pipeline?
Choose the correct option from below list
(1)Release on Demand
(2)Continuous Integration
(3)Continuous Exploration
(4)Continuous Deployment
Answer:-(2)Continuous Integration
|
|
|
|
|
|
|
|
|
|