Search test library by skills or roles
⌘ K

Adaface Sample Questions

Adaface assessments are tailored to your job description by our subject matter experts from our library of 10000+ questions. We've made a small portion of our library public to demonstrate the quality of questions in our library. All questions used in Adaface assessments are non-googleable and designed to test for on-the-job skills.

Here are some sample questions from our premium questions library (10273 non-googleable questions).

Skills

🧐 Question

Easy

Executing a particular command
Solve
                                    Bernie wants to use matrix-based security to execute a particular command in a Jenkins pipeline, but they do not have any relevant groups and they are not allowed to create a specific user to run the task. Which of the following can they do?
                                    
                                    A: Create a group or reassign the user
            
            B: Change workflow to require an existing user to the task, and grant permissions to that group.
            
            C: Create a group, add an existing user to run the task or reassign the user
            
            D: Set permissions to allow anonymous user to run the command.
                                    

Medium

Memory Map
Memory Architecture
Solve
                                    Review the following Embedded Systems code and memory map of 16-bit microcontroller:
                                    
 image
 image
                                    Here are the specifications of the microcontroller:
            
            - The stack grows from area D, whereas the program and static variables are stored in area C
            - ‘int’ in the system is a 16-bit number
            - There is no operating system and no memory protection
            - The program is compiled and loaded into area C
                                    
                                    Pick the correct statements:
            
            A: first_var, second_var and input will be in area D
            B: first_var and second_var will be in area C, input will be in area D
            C: If the contents of 0x0010 at the start of the program is 7, the program will print 0 and exit
            D: If the contents of 0x0010 at the start of the program is 42, the program will print 0 and exit
            E: If the contents of 0x0010 at the start of the program is 42, the program will overflow the stack overwriting the program and static variables region
            F: If the program overflows and overwrites the program and static variables region, arbitrary data is executed as if it is the program, causing unpredictable results
                                    

Medium

Loop Large Value
Solve
                                    Consider the following pseudo code. 
                                    
 image
                                    What does foo() return for very large value of B (Choose closest option)
                                    

Medium

File Handling and Defer
File Handling
Solve
                                    Consider the following Go code. Where should we use *defer*?
                                    
 image

Easy

Floating points
Solve
                                    Check the following Jest tests:
                                    
 image
                                    Which of the tests will pass?
                                    

Easy

Crop marks
Solve
                                    Cho's boss has asked set up a document containing artwork for printing in InDesign CS5. The boss has also mentioned that they need the artwork to contain a bleed or slug area. When Cho is setting crop marks, what should they make a note of?
                                    
 image

Medium

Security log file
Event Viewer
Solve
                                    Harper is hired as the system admin for an e-commerce company, Dove. There is a Windows Server 2003 system which was installed by another administrator, just before they left. The admin seems to have finished the installation, but they did not set up any configuration after the installation. Harper checks the maximum log sizes in Event Viewer, and realizes that the maximum size of the Security log is 16 MB. What can we tell on the basis of this information?
                                    
🧐 Question🔧 Skill

Easy

Executing a particular command
2 mins
Jenkins
Solve

Medium

Memory Map
Memory Architecture
3 mins
Embedded Systems
Solve

Medium

Loop Large Value
2 mins
Pseudo Code
Solve

Medium

File Handling and Defer
File Handling
2 mins
Go
Solve

Easy

Floating points
2 mins
Jest
Solve

Easy

Crop marks
2 mins
Adobe InDesign
Solve

Medium

Security log file
Event Viewer
2 mins
Windows Administration
Solve
🧐 Question🔧 Skill💪 Difficulty⌛ Time
Executing a particular command
Jenkins
Easy2 mins
Solve
Memory Map
Memory Architecture
Embedded Systems
Medium3 mins
Solve
Loop Large Value
Pseudo Code
Medium2 mins
Solve
File Handling and Defer
File Handling
Go
Medium2 mins
Solve
Floating points
Jest
Easy2 mins
Solve
Crop marks
Adobe InDesign
Easy2 mins
Solve
Security log file
Event Viewer
Windows Administration
Medium2 mins
Solve

Adaface questions are trusted by enterprises globally

Amazon Morgan Stanley Vodafone United Nations HCL PayPal Bosch WeWork Optimum Solutions Deloitte Microsoft NCS Doubtnut Sokrati J&T Express Capegemini

We evaluated several of their competitors and found Adaface to be the most compelling. Great default library of questions that are designed to test for fit rather than memorization of algorithms.


Swayam Narain, CTO, Affable

hashtag image heart icon Swayam
Join 1200+ companies in 75+ countries.
Try the most candidate friendly skills assessment tool today.
Ready to streamline your recruitment efforts with Adaface?
Ready to streamline your recruitment efforts with Adaface?
Chat with us
40 min tests.
No trick questions.
Accurate shortlisting.
Ada
● Online
Previous
Score: NA
Next
✖️