Exam4Training

OutSystems Architecture Specialist 11 Architecture Specialist (OutSystems 11) Online Training

Question #1

The Architecture Canvas is a …

  • A . framework to support Architecture Conventions for Modules in Outsystems
  • B . framework to support application architecture design in Outsystems
  • C . framework to support Architecture Design Process in Outsystems

Reveal Solution Hide Solution

Correct Answer: B
Question #2

What is NOT a best practice for Mobile Application Architecture: Limit server side calls?

  • A . Limit Server side calls to online transactions or Synchronization. Do the bulk of the operations on the Client Side before passing information to the Server Side.
  • B . Synchronize on every screen or online event for better granularity No direct calls to backend systems. Do call to Outsystems Core Services and Outsystems will handle the interaction with external backend systems.
  • C . Direct calls is bad from Security, Performance and Maintainability standpoint. Direct calls will require javascript Code and javascript Code is harder to maintain.

Reveal Solution Hide Solution

Correct Answer: B
Question #3

There are generally 4 common style guide scenario.

Which of the below is NOT a common style guide scenario?

  • A . Specialize a Built-in: Use when introducing changes to an existing theme for multiple apps. First, create a custom theme that REFERENCE the Base Theme. Second, clone a Custom
    Template from the Base Template but this custom theme will reference the custom theme created previously. Third, create new applications based on the Custom Theme and Custom Template
  • B . Built-in Style Guide: Uses Built-in style guide from Outsystems UI. Minor customizations to the Base Theme should be done inside the App Theme.
    C, Build Your Own: Use when custom style guide cannot benefit from any existing theme. Just like Clone a Built In scenario, clone both Custom Theme and Custom Template from the Base Theme and Base Template, however clone the Base Theme from Outsystems UI.
  • C . Since the theme is very basic, front-end developer will have to expand and design the theme from there.
    Modify Built-in Style Guide: Use when only small changes are required for single application. First, create a custom theme that REFERENCE the Base Theme. Second, clone a Custom Template from the Base Template but this custom theme will reference the custom theme created previously. Third, reference that application to the custom Theme and Template.
  • D . Clone a Built-in: Use when introducing extensive changes to existing theme. First, CLONE a custom theme from a Base Theme. Second, clone a Custom Template from the Base Template but this custom theme will reference the custom theme created previously. Third, create new applications based on the Custom Theme and Custom Template.
    Base Theme can be Outsystems UI or your own custom theme.

Reveal Solution Hide Solution

Correct Answer: D
Question #4

The Architecture Design Process has three steps.

Which of the options below is NOT one of those steps?

  • A . Organize
  • B . Plan
  • C . Assemble
  • D . Disclose

Reveal Solution Hide Solution

Correct Answer: B
Question #5

In OutSystems, an application with Foundation, Core, and End-User Modules is a

  • A . End-User Application.
  • B . Foundation Application.
  • C . Core Application.

Reveal Solution Hide Solution

Correct Answer: A
Question #6

Which of the following Data elements can we find in a End-User layer Module?

  • A . Non-core Entities
  • B . Entities to save UI states
  • C . Core Entities (exposed as read-only)
  • D . CRUD actions for Entities

Reveal Solution Hide Solution

Correct Answer: B
Question #7

Considering Architecture Dashboard(AI Mentor), which of the following sentences is FALSE?

  • A . Architecture Dashboard allows you to automatically apply a solution to solve a found code pattern.
  • B . Architecture Dashboard performs a code analysis that uncovers patterns related to performance, security, architecture and maintainability.

Reveal Solution Hide Solution

Correct Answer: A
Question #8

SSL Pinning is a security best practice for mobile application.

Which of the below is FALSE about SSL Pinning?

  • A . All of the above are true
  • B . SSL Pinning or HTTP Public Key Pinning (HPKP) helps reduce man-in-the-middle attacks
  • C . SSL Pinning does not mean hardcoding the public key into the code.
  • D . Works on the client side and adds verification of the server certificate against hashes of public keys, which are pre-bundled with the mobile app

Reveal Solution Hide Solution

Correct Answer: C
Question #9

Which of the below is NOT a reason why application Architecture is important when building quality software solutions?

  • A . Reduces Costs: Architecture benefits are not only technical, but affect how you operate
  • B . Reduces Risk: Architecture is a cost effective way to mitigate substantial risks and ensure ^ success
  • C . Manages Complexity: Helps reduce emerging complexity by focusing on relevant properties and omitting irrelevant details, thus leading to simpler representation
  • D . Facilitate Change: When something comes up that requires you to veer from the origina design or path, architecture of your system can show you exactly what needs to change and help with communication and planning.
  • E . Supports Planning: Helps the team anticipate and build solutions
  • F . Helps Communication: Helps you to get buy in from the business and to communicate overall plan to them
  • G . Drives Consensus: Helps create common ground with the team

Reveal Solution Hide Solution

Correct Answer: F
Question #10

ISO/IEC 9126:1991 included several different dimensions.

Which is NOT part of ISO/IEC 9126:1991?

  • A . Usability: Usability from the point of view of the users
  • B . Efficiency: Efficiency which relates to the performance to the amount of resources used
  • C . Portability: Portability which defines the ability to move software between environments
  • D . Security: Security which relates to the strength of the of the software against cybersecurity attacks
  • E . Reliability: Reliability which ensures that a software solution can maintain it performance over a period of time
  • F . Maintainability: Maintainability which relates to the effort needed to make modifications
  • G . Functionality: Functionality as a set of functions that satisfy needs

Reveal Solution Hide Solution

Correct Answer: D

Question #11

CS modules is for

  • A . Isolated Business Logic (Actions) or Core Widgets (blocks), to manage complexity, composition or to have its own lifecycle.
  • B . Logic to Synchronize data in CS’s with an external system. Isolating this logic makes the CS completely system agnostic and it’s easier to decouple or replace the external system.
  • C . Technical wrapper to expose an API to External consumers, keeping core services system agnostic and supporting multiple versions of the API.
  • D . A BL becomes a Calculation Engine if it performs complex calculations, (e.g. an invoice calculation engine or an insurance simulator). Engines are usually subject to versions.
  • E . Reusable Core Services with public entities, actions, and blocks.

Reveal Solution Hide Solution

Correct Answer: E
Question #12

Of the options below, which one is a benefit of adopting the Architecture Canvas?

  • A . It’s an automatic way to find and fix architecture issues.
  • B . It’s a systematic approach to architecture design
  • C . It promotes the business users’ collaboration and understanding
  • D . It’s a faster architecture design

Reveal Solution Hide Solution

Correct Answer: B
Question #13

In which of the following scenarios should you choose to clone a built-in Style Guide?

  • A . When minor customizations to the base theme should be done inside the app theme.
  • B . It is not possible to customize a built-in Style Guide, since it is part of OutSystems UI.
  • C . When you want to introduce extensive changes to an existing theme.
  • D . When it is not possible to benefit from any existing theme and extensive changes are needed.

Reveal Solution Hide Solution

Correct Answer: C
Question #14

_IS module is for

  • A . Generic Library module.
  • B . several integration services with different systems, performing the same type of operation (e.g. printers) you can create several drivers exposing the same API, with specialized implementations (like the transparency services pattern).
  • C . Reusable UI Patterns for layout and display only – no Business logic.
  • D . Theme, look & feel elements, menu, etc.
  • E . technical wrapper to consume and normalize an external service.

Reveal Solution Hide Solution

Correct Answer: E
Question #15

_Pat module is for

  • A . Generic Library module.
  • B . Reusable UI Patterns for layout and display only – no Business logic.
  • C . Theme, look & feel elements, menu, etc.
  • D . technical wrapper to consume and normalize an external service.
  • E . to have several integration services with different systems, performing the same type of operation (e.g. printers) you can create several drivers exposing the same API, with specialized implementations (like the transparency services pattern).

Reveal Solution Hide Solution

Correct Answer: B
Question #16

What is a best practice for Mobile Application Architecture: Local Storage?

  • A . Do not use local storage(mobile device), instead try to use central storage(server side)
  • B . Map server side static entities into local entities
  • C . Have a local storage inside the CS Module instead of M_CS Module
  • D . Use a centralized local storage for all mobile applications to ensure maintainability

Reveal Solution Hide Solution

Correct Answer: B
Question #17

Which of the following Data elements can we find in a Foundation layer Module?

  • A . CRUD actions for Entities
  • B . Core Entities (exposed as read-only)
  • C . Non-core Entities
  • D . Entities to save UI states

Reveal Solution Hide Solution

Correct Answer: C
Question #18

Which of the below is not part of the Architecture Validation

  • A . No Downward References To Foundation Modules
  • B . No Side References Between End-User Modules
  • C . No Circular References
  • D . No Upward References

Reveal Solution Hide Solution

Correct Answer: A
Question #19

_BL module is for

  • A . A BL becomes a Calculation Engine if it performs complex calculations, (e.g. an invoice calculation engine or an insurance simulator). Engines are usually subject to versions.
  • B . Logic to Synchronize data in CS’s with an external system. Isolating this logic makes the CS completely system agnostic and it’s easier to decouple or replace the external system.
  • C . Isolated Business Logic (Actions), to manage complexity, composition or to have its own ‘ifecycle.
  • D . Reusable Core Services with public entities, actions, and blocks.
  • E . Technical wrapper to expose an API to External consumers, keeping core services system agnostic and supporting multiple versions of the API.

Reveal Solution Hide Solution

Correct Answer: C
Question #20

What is done in the Organize part of the Architecture Design Process?

  • A . Concepts are disclosed to the Architecture team
  • B . Concepts are assembled into Modules
  • C . Concepts are added to the layers of the Architecture Canvas

Reveal Solution Hide Solution

Correct Answer: C

Question #21

Concepts are assembled into Modules in the Assembl are not principles in the Assemble step.

  • A . Don’t join concepts with different lifecycles
  • B . Apply known design patterns
  • C . N/A
  • D . Join conceptually-related concepts
  • E . Isolate reusable logic from Integration logic

Reveal Solution Hide Solution

Correct Answer: C
Question #22

In OutSystems, a Core Application can contain …

  • A . End-User, Core, and Foundation Modules.
  • B . Foundation and Core Modules
  • C . Only Foundation Modules.
  • D . End-User and Core Modules.

Reveal Solution Hide Solution

Correct Answer: B
Question #23

"Spaghetti Architecture" is also known as ‘tightly coupled architecture’ or ‘brittle architecture’.

Which is NOT a reason why is "Spaghetti Architecture" bad?

  • A . One small change in a component cause a series of cascading effects on other components
  • B . Hinder future changes as they become less flexible and difficult to manage
  • C . Any changes is maintainable and easy to deploy

Reveal Solution Hide Solution

Correct Answer: C
Question #24

Which of the below is NOT a reason for Validating a Modules’ Architecture?

  • A . Optimizes lifecycle independence
  • B . Promotes microservices
  • C . Minimizes impact of changes
  • D . Promotes abstraction of reusable services
  • E . Stop unmanageable dependencies
  • F . Prevent slow deployments, inflexible legacy systems
  • G . Avoid poor service abstraction

Reveal Solution Hide Solution

Correct Answer: B
Question #25

Elements such as the menu and login can be shared across different apps. In the menu and login are defined inside the theme.

Which use case is this?

  • A . Portal
  • B . Intranet
  • C . Independent Apps

Reveal Solution Hide Solution

Correct Answer: A
Question #26

Which of the below best matches this statement: "Needed if data is coming from MULTIPLE external systems.

IS will decide which driver to use depending on the data."

  • A . Transparency Service Pattern 1 way (simplification)
  • B . Library: Extension Pattern
  • C . ECS with isolated synchronization logic
  • D . ECS Lazy Load variation
  • E . ECS with publish/subscribe through an ESB
  • F . ECS Summary cache only variation
  • G . Library: Connector Pattern
  • H . ECS with direct integration
  • I . Base ECS pattern
  • J . Transparency Service Pattern

Reveal Solution Hide Solution

Correct Answer: J
Question #27

In which Architecture Canvas layer do you expect to have a higher reusability rate?

  • A . End-User layer
  • B . Core layer
  • C . Foundation layer

Reveal Solution Hide Solution

Correct Answer: C
Question #28

In OutSystems, a Foundation Application can NOT contain …

  • A . Core Modules and Foundation Modules.
  • B . End-User and Foundation Modules.
  • C . End-user and Core Modules.

Reveal Solution Hide Solution

Correct Answer: C
Question #29

Which of the below matches the most to Core Module Pattern – Core Entity Pattern…

  • A . is a pattern with two modules, a connector module that can be used to encapsulate an O external API with the input/output structures and a wrapper module to expose the normalized API to the consumers.
  • B . … is needed if data is coming from MULTIPLE external systems. IS will decide which driver to use depending on the data.
  • C . … tries to fetch data from local cache entity, if not there, get single entry from the external system. Cache only that record (read-through caching) Use when whole database too big or costly to synchronize. Integration only touches a small portion of the database. Avoid if access to lists of data is needed up front
  • D . … Entity is exposed as read-only and API is available to centralize business logic for entity creation/update
  • E . Same as Base ECS pattern, but have a local replica. Store data to serve as a local cache. Pro:
    Leverage Entity Use, Simpler Integration API. Con: Less impact on source system
  • F . Same as ECS with local replica but API module is provided. So any changes to the external system can notify OS, which OS then gets update from the ERP system (subscription system)
  • G . … a wrapper used to contain the logic, actions and data that will expose code that is inside of external library or to inspect external database and import the data structures so they can be used as entities inside of OS
  • H . … caches only summary data that is frequently lister, joined or searched. Full detail for a single entry is fetched directly from external system. Use when whole database too big or costly to synchronize. Details are only required for single entities (not lists)
  • I . Same as ECS with local replica but synchronization logic is separated. Pro: Code independence. Consumers of CS is not affected by Sync. Sync can orchestrate several CS
  • J . … Entity is not in Outsystems but in an external ERP system. IS just makes remote call to external system/database. No data is being kept inside OS. Data retrieval may not be optimized as it needs to traverse two different systems to get the information back. Con: Integration API must support all use cases

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Which of the below is not a best practice for mobile security: authentication?

  • A . Store password in local storage
  • B . Encrypt (only) sensitive data
  • C . Authentication: Use google or facebook for online authentication or fingerprint or pin for offline authentication

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version