Skip to main content

Professional Scrum with Kanban I (PSK I)

The Professional Scrum with Kanban I (PSK I) validates the ability to integrate Kanban practices into a Scrum framework without losing the core benefits of Scrum. It focuses on improving flow, transparency, and predictability within the development process. Professionals with the symbol SCRUM_PSK_1 demonstrate expertise in optimizing team performance through hybrid agile methodologies.



---------- Question 1
A Scrum Team has been using Kanban for several months. They notice that their Throughput is high, but their Cycle Time is also very high. What does this likely indicate?
  1. The team is very efficient and finishing work quickly.
  2. The team is taking on too much work at once, causing items to sit idle.
  3. The Product Owner is not providing enough items in the Product Backlog.
  4. The team needs to increase their WIP limits to finish items faster.

---------- Question 2
A team has a WIP limit of 3 for their Development column. They have 3 items in progress and a high-priority bug is discovered. What is the best way to handle this while following Kanban practices?
  1. Immediately start the bug and ignore the WIP limit since it is an emergency fix.
  2. Wait until one of the current items is finished before pulling the bug into the workflow.
  3. Ask the Product Owner to remove one of the active items and replace it with the bug.
  4. Create a new expedited lane on the board that has no WIP limits for any type of bug.

---------- Question 3
Which of these metrics is most useful for identifying which specific stage of the team’s workflow is the most common bottleneck?
  1. Total Throughput per Sprint.
  2. Average Work Item Age per column.
  3. The number of items in the Product Backlog.
  4. The number of stakeholders attending the Sprint Review.

---------- Question 4
A team notices a widening gap between the bottom and top lines of their Cumulative Flow Diagram. What does this visualization most likely signify about their process?
  1. The teams throughput is increasing and they are delivering value faster than before.
  2. The amount of Work in Progress is increasing, which will likely lead to longer cycle times.
  3. The team has successfully reduced the time spent in the Testing stage of the workflow.
  4. The Product Owner is removing unnecessary items from the Product Backlog to save time.

---------- Question 5
What happens to the definition of Done when a Scrum Team starts using Kanban practices to optimize their workflow?
  1. The definition of Done is replaced by the Service Level Expectation to track speed
  2. It remains a critical artifact that ensures the quality of the Increment is maintained
  3. It is simplified to only include the technical tasks that fit within a single day
  4. The Product Owner becomes solely responsible for deciding if an item is truly Done

---------- Question 6
A Scrum Team is transitioning to include Kanban practices and wants to define their Workflow. According to the Kanban Guide for Scrum Teams, which element is mandatory for a valid Scrum with Kanban definition of Workflow?
  1. A defined point where work items are considered started and finished
  2. A specific software tool to track the movement of Sprint Backlog items
  3. A rule stating that only the Product Owner can move items to Done
  4. A requirement that all work items must be the same size in points

---------- Question 7
A Scrum Team identifies that their Work in Progress (WIP) is consistently high, causing delays in getting items to Done. What is the primary benefit of the team collectively deciding to lower their WIP limits?
  1. It ensures that every Developer is working on a different task simultaneously
  2. It reduces the context switching and increases the focus on finishing work
  3. It allows the Product Owner to add more items to the Sprint mid-way
  4. It guarantees that the team will achieve 100 percent Throughput every Sprint

---------- Question 8
A Scrum Team is defining their workflow to integrate Kanban practices. According to the Kanban Guide for Scrum Teams, which of the following is a mandatory element that must be included in their definition of the workflow?
  1. A requirement for all work items to be estimated in Story Points
  2. A definition of the start and end points for measuring flow
  3. A rule that only one developer can work on a single item at a time
  4. A mandatory sequence of specific technical testing tools to be used

---------- Question 9
During the Daily Scrum, the team looks at their Kanban board and notices several items in the Testing column have reached the Work in Progress limit. What is the most appropriate action for the Developers to take?
  1. Create a temporary column to hold the excess items until the bottleneck is cleared
  2. Assign the excess items to the Scrum Master to finish so the team can start new work
  3. Collaborate to finish the items in the Testing column before pulling new work
  4. Increase the Work in Progress limit for the Testing column to accommodate more items

---------- Question 10
A Scrum Team has reached its WIP limit for the Development column. One Developer is free because their current task is blocked. What is the most appropriate action according to Kanban principles?
  1. Pull a new item from the Sprint Backlog to ensure they stay busy
  2. Help colleagues resolve the blockage or finish other items in that column
  3. Ask the Product Owner for more work that is not subject to WIP limits
  4. Stay idle until a slot in the Development column becomes available


Are they useful?
Click here to get 270 more questions to pass this certification at the first try! Explanation for each answer is included!

Follow the below LINKEDIN channel to stay updated about 89+ exams!



Comments

Popular posts from this blog

Microsoft Certified: Azure Fundamentals (AZ-900)

The Microsoft Certified: Azure Fundamentals (AZ-900) is the essential starting point for anyone looking to validate their foundational knowledge of cloud services and how those services are provided with Microsoft Azure. It is designed for both technical and non-technical professionals ---------- Question 1 A new junior administrator has joined your IT team and needs to manage virtual machines for a specific development project within your Azure subscription. This project has its own dedicated resource group called dev-project-rg. The administrator should be able to start, stop, and reboot virtual machines, but should not be able to delete them or modify network configurations, and crucially, should not have access to virtual machines or resources in other projects or subscription-level settings. Which Azure identity and access management concept, along with its appropriate scope, should be used to grant these specific permissions? Microsoft Entra ID Conditional Access, applied at...

Google Associate Cloud Engineer

The Google Associate Cloud Engineer (ACE) certification validates the fundamental skills needed to deploy applications, monitor operations, and manage enterprise solutions on the Google Cloud Platform (GCP). It is considered the "gatekeeper" certification, proving a candidate's ability to perform practical cloud engineering tasks rather than just understanding theoretical architecture.  ---------- Question 1 Your team is developing a serverless application using Cloud Functions that needs to process data from Cloud Storage. When a new object is uploaded to a specific Cloud Storage bucket, the Cloud Function should automatically trigger and process the data. How can you achieve this? Use Cloud Pub/Sub as a message broker between Cloud Storage and Cloud Functions. Directly access Cloud Storage from the Cloud Function using the Cloud Storage Client Library. Use Cloud Scheduler to periodically check for new objects in the bucket. Configure Cloud Storage to directly ca...

CompTIA Cybersecurity Analyst (CySA+)

CompTIA Cybersecurity Analyst (CySA+) focuses on incident detection, prevention, and response through continuous security monitoring. It validates a professional's expertise in vulnerability management and the use of threat intelligence to strengthen organizational security. Achieving the symbol COMP_CYSA marks an individual as a proficient security analyst capable of mitigating modern cyber threats. ---------- Question 1 A security analyst is reviewing logs in the SIEM and identifies a series of unusual PowerShell executions on a critical application server. The logs show the use of the -EncodedCommand flag followed by a long Base64 string. Upon decoding, the script appears to be performing memory injection into a legitimate system process. Which of the following is the most likely indicator of malicious activity being observed, and what should be the analysts immediate technical response using scripting or tools? The activity indicates a fileless malware attack attempting to ...