No governed timed route exists for this stage yet, so this page gives you an honest untimed stage-end check built from the published bank.
FormatUntimed self-check
Questions20
Best time to use itAfter the stage modules and practice
Question 1
What is the PRIMARY role of a software architect?
Writing all the code for a project
Making and communicating technical decisions that are costly to change later
Managing the project timeline and budget
Testing the software for bugs
Reveal answer
Correct answer: Making and communicating technical decisions that are costly to change later
Question 2
Why are architecture decisions sometimes called 'the decisions that are hard to change'?
Because architects are resistant to change
Because they affect the fundamental structure, and reversing them requires significant rework across the system
Because they are documented in legal contracts
Because no one remembers why the decision was made
Reveal answer
Correct answer: Because they affect the fundamental structure, and reversing them requires significant rework across the system
Question 3
What is a non-functional requirement (NFR)?
A requirement that has been rejected
A quality attribute that describes how the system should behave, such as performance, security, or availability
A requirement written by non-technical stakeholders
A feature that does not require coding
Reveal answer
Correct answer: A quality attribute that describes how the system should behave, such as performance, security, or availability
Question 4
What is an Architecture Decision Record (ADR)?
A database of all architectural components
A short document that captures the context, decision, and consequences of an architecture choice
A meeting where architects vote on designs
A compliance report for auditors
Reveal answer
Correct answer: A short document that captures the context, decision, and consequences of an architecture choice
Question 5
In the C4 model, what does Level 1 (System Context) show?
Individual classes and methods
The system as a whole, its users, and the external systems it interacts with
The internal components of each container
The deployment infrastructure
Reveal answer
Correct answer: The system as a whole, its users, and the external systems it interacts with
Question 6
What is the key difference between a C4 Container and a C4 Component?
Containers are physical servers; components are virtual machines
A container is a separately deployable unit (web app, database, API); a component is a grouping of related functionality within a container
Containers hold data; components hold logic
There is no meaningful difference
Reveal answer
Correct answer: A container is a separately deployable unit (web app, database, API); a component is a grouping of related functionality within a container
Question 7
What does 'security by design' mean in practice?
Adding security testing at the end of the project
Considering security requirements and threats from the earliest design stages, not as an afterthought
Using only secure programming languages
Hiring a dedicated security team
Reveal answer
Correct answer: Considering security requirements and threats from the earliest design stages, not as an afterthought
Question 8
Why is input validation considered a fundamental security control?
It improves application performance
It prevents attackers from injecting malicious data that could exploit the application
It makes the user interface cleaner
It is required by all programming languages
Reveal answer
Correct answer: It prevents attackers from injecting malicious data that could exploit the application
Question 9
What is the purpose of a CI/CD pipeline in the context of software architecture?
To write code automatically
To automate the build, test, and deployment process, reducing human error and enabling faster, repeatable releases
To store all project documentation
To monitor production systems
Reveal answer
Correct answer: To automate the build, test, and deployment process, reducing human error and enabling faster, repeatable releases
Question 10
What does DevSecOps add to a standard DevOps approach?
Extra servers for performance
Security practices integrated into every stage of the CI/CD pipeline, not just at the end
A separate team for security reviews
Longer development cycles
Reveal answer
Correct answer: Security practices integrated into every stage of the CI/CD pipeline, not just at the end
Question 11
What is an SRE (Site Reliability Engineering) error budget?
The financial budget for fixing errors
The acceptable amount of downtime or errors allowed before new feature work pauses to focus on reliability
The maximum number of bug reports per sprint
A reserve of spare servers
Reveal answer
Correct answer: The acceptable amount of downtime or errors allowed before new feature work pauses to focus on reliability
Question 12
What is the difference between an SLI, SLO, and SLA?
They are three different types of programming languages
SLI is the metric measured, SLO is the target for that metric, SLA is the formal agreement with consequences for missing targets
SLI is for internal use, SLO is for teams, SLA is for management
They are interchangeable terms for service quality
Reveal answer
Correct answer: SLI is the metric measured, SLO is the target for that metric, SLA is the formal agreement with consequences for missing targets
Question 13
In the ISO/IEC 25010:2023 quality model, which quality attribute measures how easy a system is to modify?
Reliability
Maintainability
Performance efficiency
Usability
Reveal answer
Correct answer: Maintainability
Question 14
Why do quality attributes often conflict with each other?
Because they were designed by different standards bodies
Because optimising for one (e.g. security) often requires trade-offs with another (e.g. usability or performance)
Because they apply to different programming languages
They do not conflict in well-designed systems
Reveal answer
Correct answer: Because optimising for one (e.g. security) often requires trade-offs with another (e.g. usability or performance)
Question 15
What is a user journey in the context of architecture discovery?
The physical path a user takes to reach their computer
The sequence of steps and interactions a user follows to accomplish a goal across the system
A debugging walkthrough by the development team
A list of all API endpoints
Reveal answer
Correct answer: The sequence of steps and interactions a user follows to accomplish a goal across the system
Question 16
What is the purpose of a deployment pipeline stage that runs OWASP ASVS checks?
To measure code coverage
To verify that the application meets a defined set of security verification requirements
To optimise application performance
To generate API documentation
Reveal answer
Correct answer: To verify that the application meets a defined set of security verification requirements
Question 17
What is the main benefit of using a consistent architecture documentation format like C4?
It eliminates the need for code comments
It creates a shared visual language that different audiences (developers, managers, ops) can understand at appropriate levels of detail
It generates code automatically
It replaces unit testing
Reveal answer
Correct answer: It creates a shared visual language that different audiences (developers, managers, ops) can understand at appropriate levels of detail
Question 18
What does a blameless post-mortem focus on?
Finding and punishing the person who caused the incident
Understanding the systemic factors that contributed to the incident and how to prevent similar ones
Calculating the financial cost of downtime
Updating the project timeline
Reveal answer
Correct answer: Understanding the systemic factors that contributed to the incident and how to prevent similar ones
Question 19
What is the OWASP Top 10 and how does it relate to architecture?
A list of the ten best programming languages
A ranking of the most critical web application security risks, used by architects to prioritise security controls in design
Ten architectural patterns for web applications
A certification programme for web developers
Reveal answer
Correct answer: A ranking of the most critical web application security risks, used by architects to prioritise security controls in design
Question 20
What is technical debt and why should architects care about it?
The financial cost of buying technical equipment
Shortcuts or design compromises that make future changes harder and more expensive, which accumulates if not managed
The debt incurred from hiring too many developers
Technical debt only exists in legacy systems
Reveal answer
Correct answer: Shortcuts or design compromises that make future changes harder and more expensive, which accumulates if not managed