Question:- What qualities should a good Agile Tester have?
Answer:- 1. Agile Testers should be able to understand the requirements quickly. 2. They should know Agile concepts and principles. 3. As requirements keep changing, Agile Testers should understand the risk involved in it. 4. Agile Testers should be able to prioritize the work based on the requirements. 5. Communication skills are a must for Agile Testers as they are required to constantly communicate with developers and business associates.
Question:- What is difference between Epic, User Stories, and Tasks?
Answer:- • An Epic is a group of related user stories. • User Stories define the actual business requirements. They are generally created by the business owner. • Task: To accomplish the business requirements, the development team creates tasks.
Question:- How is the velocity of sprint measured?
Answer:- f capacity is measured as a percentage of 40 hours weeks, then completed = story points * team capacity If capacity is measured in man-hours, then completed story points/team capacity.
Question:- How does the Agile testing (development) methodology differ from other testing (development) methodologies?
Answer:- Testers (developers) ensure that the whole process of testing (development) is broken down into as small steps as possible, and just a small unit of code is tested (developed) in each of these steps. The team of testers (developers) consistently communicates the results of their work and changes the short-term strategy and even the development plan on the go, based on the results of the agile testing. The agile methodology encourages a flexible and rapid response to change, which leads to better end results.
Question:- Explain velocity in Agile.
Answer:- Velocity is a metric that is calculated by the addition of all effort estimates associated with user stories completed in one iteration. It predicts how much work Agile can complete in a sprint and how much time it will require to complete a project.
Question:- How does ITIL help minimize the total cost of ownership (TCO) for IT investments?
Answer:- IT investments and staff always find that they break their work schedule. This happens because the unscheduled work always takes priority over the work that is planned. ITIL can help an organization stop this continuous cycle and can, therefore, help employees focus on the total cost of ownership (TCO) and other activities in their respective departments.
Question:- Is there a trade-off between return and risk?
Answer:- According to modern portfolio theory, there is a trade-off between risk and return. All other factors being equal, if a particular investment incurs a higher risk of financial loss for prospective investors, those investors must be able to expect a higher return in order to be attracted to the higher risk. In the majority of cases, even though there is no promise of higher returns on risky assets, the higher risk just tends to scare off potential investors, keeping the returns on a given investment low. The only investments that can really try to promise higher returns for higher risk are bonds, and even then the higher returns won’t be generated if the issuing organization goes default.
Question:- What is the difference between end users and customers?
Answer:- End User: An end user or an end customer directly receives the service or employs the product. End users are not the only customers as there may be intermediate entities like purchasing departments, whose expectations or needs must be carried forward through a series of service contracts or requirement definitions. Customer: A customer may or may not have the ability to choose between different products and suppliers. For instance, in monopoly situations like local telephone and cable television services, there are scenarios when end users do not make the purchasing decision. It may include clients of social service agencies, court-appointed lawyers, or employees of an organization where the purchasing department makes choices.
Question:- What is the difference between end users and customers?
Answer:- End User: An end user or an end customer directly receives the service or employs the product. End users are not the only customers as there may be intermediate entities like purchasing departments, whose expectations or needs must be carried forward through a series of service contracts or requirement definitions. Customer: A customer may or may not have the ability to choose between different products and suppliers. For instance, in monopoly situations like local telephone and cable television services, there are scenarios when end users do not make the purchasing decision. It may include clients of social service agencies, court-appointed lawyers, or employees of an organization where the purchasing department makes choices.
Question:- What type of information is stored in a CMDB?
Answer:- CMDB contains contents intended to hold a collection of IT assets commonly referred to as configuration items (CI), as well as descriptive relationships between such assets. When populated, the repository becomes a means of understanding how critical assets such as information systems are composed, what their upstream sources or dependencies are, and what their downstream targets are.
Question:- What is a service request?
Answer:- A service request is a formal request submitted by a user for some types of services, software, or hardware. A service request generally refers to something the user wants and/or needs but does not already have, such as a printer or a laptop. It often involves items that are already approved. For instance, if it is a company policy that all employees get access to the cloud-based CRM system and when someone from the marketing department sends a service request for the access, then this does not need any additional approval. The IT help desk can simply fulfill this request.
Question:- What is ISO/IEC 27002?
Answer:- ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including selection, implementation, and management of controls, taking into consideration the organization’s information security risk environment(s). It is designed to be used by organizations that intend to: • Select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001 • Implement commonly accepted information security controls • Develop their independent information security management guidelines
Question:- Explain Service Portfolio, Service Catalog, and Service Pipeline.
Answer:- • Service Portfolio: It defines services provided by service providers across the market and all customers. The objective of ITIL Service Portfolio Management is to manage the Service Portfolio. Service Portfolio Management ensures that the service provider has the right mix of services to meet the required business outcomes at an appropriate level of investment. • Service Catalogue is a subset of Service Portfolio. Services ready to be offered to customers are listed in this catalog. An IT Service Catalog is a list of available technology resources and offerings within an organization. • Service Pipeline consists of services under development. It is a great opportunity to view the direction of a service provider’s growth as it discusses and includes the future services that are currently under development by the service provider.
Question:- What is the difference between ITIL v2 and v3?
Answer:- • The ITIL v2 library was organized into seven core books: (i) Service Support (ii) Service Delivery (iii) ICT Infrastructure Management (iv) Planning to Implement Service Management (v) Application Management (vi) Business Perspective (vii) Security Management • On the other hand, ITIL v3 is now organized into just five books: (i) Service Strategy (ii) Service Design (iii) Service Transition (iv) Service Operation (v) Continual Service Improvement • Basically, the v2 process areas have been logically grouped into a phased life cycle approach • In contrast to ITIL v2, ITIL v3 clearly defines the roles and responsibilities in each process and reasons the role of communication in the entire life cycle.
