Welcome to Part 3 of the Process Question Bank, along with their answers and explanations.
Wings1 Process exam Preparation MCQ Part - 3
- Changes should be backed out based on probability of failure.
- As there are multiple changes we cannot rollback any change.
- Change which was deployed last should be backed out first. ✔
- Roll Back Both the Changes
Correct Answer: C
Explanation: In the given scenario, where multiple changes have been deployed and two of them are suspected to have caused the outage, the recommended approach is to roll back the changes in the reverse order of their deployment. This means that the change which was deployed most recently should be rolled back first. By rolling back the changes in reverse order, you have a higher chance of identifying and resolving the cause of the outage. This allows you to eliminate the most recent changes first and see if the issue persists. If rolling back the most recent change resolves the problem, it indicates that this change was indeed the cause of the outage. If the issue persists after rolling back the most recent change, you can then proceed to roll back the next change in the order of deployment.
2. What type of change is mostly likely to be managed by service request management practice?
- An emergency Change
- A normal Change
- An Application Change
- A Standard Change ✔
Correct Answer: D
Explanation: Service request management primarily deals with fulfilling customer requests for standard services or pre-defined changes that are well-known and documented. Standard changes are low-risk, routine changes that have been pre-authorized and follow a set procedure or workflow. These changes are typically repetitive, have a predictable outcome, and do not require extensive assessment or approval processes. Examples of standard changes include password resets, access permission changes, software installations, and hardware replacements. These changes are typically handled through a service catalog or service request portal, where customers can submit their requests for predefined services or changes.
3. TCS Location Independent Agile is about ( Select all that apply)
- How Distributed agile teams, each team itself being co-located should colloborate
- How to Distribute work among team members distributed across different time zones.
- Harnessing globally available talent.
- How an agile team can be distributed and yet perform without compromising on agility
Correct Answer: A, C, D ✔
Explanation: Option B, "How to distribute work among team members distributed across different time zones," is not specifically related to TCS Location Independent Agile. While it may be a consideration in distributed agile teams, it is not a defining aspect of TCS Location Independent Agile. The other options describe the focus of Location Independent Agile, which is about effectively collaborating in distributed teams, leveraging global talent, and maintaining agility despite geographic dispersion.
4. You are leading a transition of a large operations support. During Transition phase when knowledge transition is in progress, should you ask for the incumbent vendors “Known Error Database(KEDB)?
- Yes, you should request for KEDB, receive and enhance it further as per TCS standards, with additional known errors and keep it updated always. ✔
- No, You should always create a fresh KEDB from Scratch
- Yes, to solve this issues during secondary support changes.
- No, It would be a security violation to request for their KEDB.
Correct Answer: A
Explanation: During the transition phase, it is beneficial to leverage the existing knowledge and documentation from the incumbent vendor. Requesting their KEDB allows you to understand the known errors, their resolutions, and any workarounds or known issues that have been documented. This information can be valuable in providing efficient support and minimizing disruptions during the transition. However, it is important to review and enhance the KEDB to align it with TCS standards and update it as needed.
5. What are the ways to manage the shifts efficiency with zero impact on business?
- All of the options ✔
- Ensure that team has relevant knowledge to prioritize the task based on SLA's or deliverables.
- Ensure that the shift handover/ takeover procedures are followed.
- Ensure that all the team members are aware of their roles and responsibilities assigned to the shift.
Correct Answer: A
Explanation: To manage shift efficiency with zero impact on business, it is important to implement all of the mentioned options. Ensuring that the team has relevant knowledge to prioritize tasks based on SLAs (Service Level Agreements) or deliverables helps in efficiently managing workload and meeting business requirements. Following shift handover/takeover procedures ensures smooth transition between shifts, minimizing disruptions and ensuring continuity of operations. Ensuring that all team members are aware of their roles and responsibilities assigned to the shift promotes clarity, accountability, and effective collaboration within the team. By implementing these practices collectively, organizations can optimize shift efficiency while minimizing any negative impact on business operations.
6. The Sprint has ended. The development teams has not completed any of the product backlog items selected for the sprint. What would be the next step?
- End of the sprint with retrospective, since scrum favor's time boxing. ✔
- Extend the sprint since scrum favors tasks getting done.
- Request the product owner to accept the completed portion of the incomplete product backlog items and plan to complete them by next sprint, since scrum favors empowered teams.
Correct Answer: A
Explanation: In Scrum, the principle of timeboxing is followed, which means that the sprint has a fixed duration and should not be extended. If the development team has not been able to complete any of the selected product backlog items within the sprint, it is important to have transparency and open communication with the product owner. The development team should present the completed portion of the work to the product owner and discuss the reasons for the incomplete items. The product owner can then decide whether to accept the completed portion and include it in the product increment or make adjustments to the product backlog for the next sprint. The focus is on collaboration, transparency, and adapting the plan based on the feedback and priorities set by the product owner.
7. When multiple scrum teams are working on same product, how many product owners and product backlogs are needed?
- Multiple Product owners and multiple product backlogs.
- One Product Owner and One Product Backlogs.
- Multiple Product Owners and One Product Backlog. ✔
- One Product Owner and Multiple Product Backlogs.
Correct Answer: C
Explanation: In this scenario, each Scrum team may have its own dedicated Product Owner who is responsible for representing the interests of the stakeholders and prioritizing the work for their respective team. However, all the Product Owners collaborate and work together to maintain a single Product Backlog for the entire product. The multiple Product Owners collaborate to ensure alignment and synchronization among the Scrum teams. They coordinate and prioritize the backlog items based on the overall product vision and objectives. By having multiple Product Owners, it allows for better focus on individual team needs while still maintaining a cohesive approach to product development. Having one Product Backlog for the entire product ensures that there is a unified prioritized list of features, enhancements, and other work items that all the Scrum teams can pull from during their Sprint Planning.
8. Which of the following risks will be identified through RIO Risk identification excercise?
- None of the above
- Only Customer related risk.
- Only TCS operations risk,
- Operational Risk ( Both Customer and TCS related). ✔
Correct Answer: D
Explanation: The RIO (Risk Identification and Ownership) exercise is typically conducted to identify and assess operational risks associated with a project or initiative. It aims to identify risks that could impact both the customer and TCS (the organization). Therefore, the exercise would involve identifying operational risks related to both the customer and TCS operations. Option A, "None of the above," is incorrect because operational risks are indeed identified through the RIO exercise. Option B, "Only Customer related risk," is incorrect because the RIO exercise considers risks related to both the customer and TCS. Option C, "Only TCS operations risk," is incorrect because the RIO exercise also considers risks related to the customer.
9. When does a product backlog retires?
- When the product owner retires.
- When the Customer provides sign-off on completion of project.
- When the product retires. ✔
- When all sprint overs
Correct Answer: C
Explanation: The retirement of a product backlog is not tied to any specific event or condition listed in the options provided. The product backlog represents an ongoing and evolving list of items that define the work to be done on a product. A product backlog can be considered "retired" when the product itself is no longer actively developed or maintained. This could happen when the product reaches its end of life, is discontinued, or is replaced by a newer version or alternative solution. Therefore, the retirement of a product backlog is typically associated with the overall lifecycle of the product, rather than specific events such as the retirement of the product owner, customer sign-off, or completion of sprints.
10. The Process of granting users the right to use a service and system to manage the confientiality, availability and integrity of the organizations daata and IP?
- Transition Management
- Configuration Management Database
- Identity and Access Management (IAM) ✔
- Software Configuration Library
Correct Answer: C
Explanation: The correct answer to the question is not provided among the options given. The process described in the question is typically associated with the practice of Identity and Access Management (IAM). IAM involves granting users the right permissions to use a service or system while ensuring the confidentiality, availability, and integrity of the organization's data and intellectual property.
11. It is a secure logical library in which the definitive, authorized versions of all software media configuration items are stored and protected.
- Integration Library
- Configuration Management Database
- Definitive Media Library ✔
- Software Configuration Library
Correct Answer: C
Explanation: A Definitive Media Library (DML) is a secure logical library in which the definitive, authorized versions of all software media configuration items (CIs) are stored and protected. It is a centralized repository for storing software media, such as installation files, source code, licenses, and documentation. The DML ensures that the software versions used in the organization are controlled and can be reliably reproduced. Option A, Integration Library, is not a recognized term in the context of IT service management. Option B, Configuration Management Database (CMDB), is a database that stores information about configuration items (CIs) in an IT infrastructure. It is not specifically related to storing software media. Option D, Software Configuration Library, is not a recognized term in the context of IT service management.
12. A team wants to use Planning Proker to estimate effort to achieve sprint goals. What will be the BEST recommendation?
- Use when estimating a large number of items with large group of pareticipants.
- Use to find similar user stories and group them together to visulaize the estimation.
- Use numbered playing cards to estimate a relative small number of items in small team. ✔
- Use an Informal and quick way to get a rough feeling about the total size of backlog.
Correct Answer: C
Explanation: Planning Poker is a collaborative estimation technique commonly used in Agile and Scrum teams. It involves team members using numbered playing cards (representing effort or story points) to individually estimate the effort required for each user story or task. The team members then discuss their estimates and reach a consensus. Option A suggests using Planning Poker for a large number of items with a large group of participants. While Planning Poker can be used in such cases, it tends to be more effective and efficient with a smaller number of items and participants. With a large group, it may become challenging to facilitate discussions and achieve consensus. Option B suggests using Planning Poker to find similar user stories and group them together for estimation. While this approach can be useful for organizing and visualizing the estimation process, it is not the primary purpose of Planning Poker. Planning Poker focuses on estimating individual items rather than grouping them based on similarity. Option D suggests using Planning Poker as an informal and quick way to get a rough feeling about the total size of the backlog. While Planning Poker can provide a rough estimation, its main purpose is to facilitate collaborative estimation and consensus-building within the team.
13. Any Highest Impact , highest Urgency issue for which the degree of impact on the business/organization is a mid-way between a normal incident and disaster
- Normal Change
- Service Change
- Major Incident ✔
- Standard Process
Correct Answer: C
Explanation: A major incident refers to an event that causes significant disruption to the business or organization, resulting in high impact and urgency. While it may not reach the level of a full-scale disaster, it is still considered a critical incident that requires immediate attention and resolution. Major incidents often involve widespread impact, affect multiple users or systems, and require a coordinated response from various teams to mitigate and resolve the issue.
14. Durimg the transition, who will sign the Toll gates to move from one stage of transition to another stage?
- Toll gate will be signed in agreement with all above stakeholders. ✔
- TCS transition manager.
- Customer Transition manager, since they are the approvers.
- Outgoing vendor Transition manager.
Correct Answer: A
Explanation: During the transition phase, the toll gates are typically signed off by all relevant stakeholders involved in the transition process. This includes representatives from both the customer organization and the service provider (such as TCS). The toll gates serve as checkpoints or milestones that signify the completion of specific stages or deliverables in the transition process. The sign-off ensures that all stakeholders are in agreement and satisfied with the progress and quality of the transition before moving on to the next stage.
15. what should be a standard way for anyone outside an agile team ( for example, delivery partner of account, Head of the Enablement Function) to get the status of the work at any point in time?
- He/She can have a status review meeting whenever required.
- He/She can talk to each team member daily to understand the status.
- All team members need to send email updates to him/her daily.
- He/she can refer the physical/digital Kanban board, which is maintained by team ✔
Correct Answer: D
Explanation: In an agile team, the standard way for anyone outside the team to get the status of the work at any point in time is to refer to the physical or digital Kanban board. The Kanban board provides a visual representation of the team's workflow, including the status of each task or user story. It typically includes columns such as "To Do," "In Progress," and "Done," which reflect the current state of the work. By looking at the kanban board, stakeholders can quickly understand which items are in progress, what has been completed, and what is still pending. This promotes transparency and enables stakeholders to have an up-to-date view of the team's progress and status without the need for frequent status meetings or individual updates.
16. The Business Unit Head wants the Developers to include a highly critical feature in the current sprint . What Should the developers do?
- Ask the Business Unit Head to work with product owner. ✔
- Work on that feature since an Business Unit Head's priority is of utmost importance.
- Work on that feature if scrum master approves it.
- As an empowered team , identify a backlog item in the scope for current sprint that may be dropped to accommodate this crtical feature.
Correct Answer: A
Explanation: In Scrum, the development team is responsible for determining how much work they can take on during a sprint. While it is important to consider input from stakeholders, including the Business Unit Head, it is ultimately the development team's decision to determine the scope of work for the sprint. If the Business Unit Head wants to include a highly critical feature in the current sprint, the developers should collaborate with the product owner and discuss the potential impact on the sprint goals and the existing backlog items. They should evaluate the priority of the critical feature in relation to the other items and assess the feasibility of accommodating it within the sprint. As an empowered team, they have the authority to make decisions about the sprint scope. If they believe that including the critical feature is crucial and aligns with the sprint goals, they can discuss with the product owner to identify a backlog item that may be dropped or deferred to a future sprint to make room for the critical feature. It's important to maintain a balance between responding to urgent requests and ensuring the overall success of the sprint and the project.
17. When do you test the Business Continuty Plan (BCP)?
- When BCP Situation is declared by Crisis Management Leader (CML)
- When I am Unable to access the applivcation due to link issues.
- When BCP is first created.
- Regularly as part of mock drills using mechanism such as Table top and call- Tree exercises. ✔
Correct Answer: D
Explanation: Testing the Business Continuity Plan (BCP) is an essential part of ensuring its effectiveness and readiness in case of a real business disruption. The BCP should not only be created but also regularly tested to identify any gaps or weaknesses, validate the plan's components, and familiarize the relevant stakeholders with their roles and responsibilities. Mock drills, such as Tabletop exercises and call-Tree exercises, are commonly used to simulate different scenarios and test the BCP's response. These exercises involve various stakeholders participating in discussions and simulations of potential disruptions, assessing the plan's adequacy, and identifying areas for improvement. Testing the BCP on a regular basis allows organizations to identify any potential issues or bottlenecks and make necessary adjustments to enhance their preparedness for a real incident. It ensures that the BCP remains up to date, relevant, and aligned with the organization's evolving needs and changes in the business environment.
18. As a self-organized and empowered team, the developers in a scrum team describes which business needs are to be developed during the sprint.
- True
- False ✔
Correct Answer: B
Explanation: In a Scrum team, the developers are responsible for developing the product increment based on the Product Backlog items selected for the sprint. However, it is the Product Owner's responsibility to describe the business needs and prioritize the Product Backlog items. The Product Owner collaborates with the stakeholders and gathers requirements to define the business needs that will be addressed in the sprint. The developers, as part of the self-organized and empowered team, work closely with the Product Owner to understand these needs and determine how best to implement them during the sprint.
Back to Questions & Answers (Page2) | Back to Questions & Answers (Page4)