In JIRA, what components are typically included in a backup?

  • Database, attachments, configuration files, and indexes
  • Only configuration files and indexes
  • Only database
  • Only user-generated content
A typical backup in JIRA includes crucial components such as the database, attachments, configuration files, and indexes. These components collectively represent the essential data and configurations needed to restore JIRA to a functional state.

What is the difference between a "system field" and a "custom field" in JIRA?

  • System fields are always mandatory, while custom fields are optional.
  • System fields are provided by JIRA and cannot be modified. Custom fields are created by users to meet specific needs.
  • System fields are visible on the issue view screen, while custom fields are only visible in reports.
  • System fields can only be accessed by administrators, while custom fields are available to all users.
The main difference between a "system field" and a "custom field" in JIRA lies in their origin and flexibility. System fields are pre-defined by JIRA and cannot be modified, while custom fields are created by users to cater to specific requirements. System fields typically cover generic information like Priority and Summary, whereas custom fields are tailored to individual project needs, allowing users to capture specific data relevant to their workflows.

Which JIRA Query Language (JQL) operator is used to find issues that contain a specific word in their summary or description?

  • Contains
  • Like
  • Matches
  • Equals
The correct option is "Contains." This operator is used to search for issues that contain a specific word or phrase in their summary or description. It is useful for filtering issues based on keywords or terms.

_______ allows you to specify who can see particular issues in JIRA.

  • Issue Security Scheme
  • Permission Scheme
  • Project Role
  • Workflow Scheme
Issue Security Scheme in JIRA is used to control visibility, allowing administrators to specify who can view particular issues based on their role or group membership, ensuring sensitive information remains protected.

You are responsible for ensuring that only a select group of users can access sensitive financial data in JIRA. Which aspect of JIRA's user management system would you focus on?

  • Issue Security Schemes
  • Permission Schemes
  • User Groups
  • User Roles
Issue Security Schemes: Issue Security Schemes in JIRA enable you to restrict access to specific issues based on user roles or groups. By configuring the appropriate issue security scheme, you can ensure that only authorized users have access to sensitive financial data, thus maintaining data confidentiality and security within the JIRA system.

How can you restrict certain users from performing specific transitions in JIRA?

  • By adding conditions to the workflow transitions
  • By adjusting the project permission scheme
  • By configuring the workflow properties
  • By modifying the issue type scheme
In JIRA, restricting certain users from performing specific transitions can be achieved by adding conditions to the workflow transitions. These conditions can be based on user roles, groups, or other criteria, ensuring that only authorized users can execute certain transitions based on predefined criteria.

What is the purpose of a Kanban board in JIRA Agile?

  • To assign tasks to team members
  • To generate reports
  • To track sprint progress
  • To visualize and manage work in progress
A Kanban board in JIRA Agile is used to visualize and manage work in progress. It allows teams to see what tasks are currently being worked on, what's in the backlog, and what's completed. This helps teams to prioritize tasks, identify bottlenecks, and maintain a smooth workflow.

What is one of the key challenges when scaling JIRA for large teams?

  • Difficulty in user adoption due to complex interface
  • High initial cost of implementation
  • Limited customization options
  • Performance degradation due to increased data volume
One of the key challenges when scaling JIRA for large teams is performance degradation due to increased data volume. As the number of users and projects grow, the system may experience slowdowns or become unresponsive, impacting productivity and efficiency.

Explain the difference between "Issue Security Level" and "Permission Scheme" in JIRA.

  • "Issue Security Level" governs the visibility of individual issues to specific users or groups, whereas "Permission Scheme" controls overall access to actions within a project.
  • "Issue Security Level" regulates who can create or delete issues within a project, whereas "Permission Scheme" manages the visibility of issue fields to certain roles.
  • "Permission Scheme" defines the roles and their corresponding access levels within a project, while "Issue Security Level" controls who can view or edit specific issues.
  • "Permission Scheme" determines who can perform actions on issues within a project, while "Issue Security Level" restricts access to specific issues based on user roles.
"Issue Security Level" and "Permission Scheme" serve distinct purposes in JIRA. The former controls the visibility of individual issues, while the latter governs overall access to actions within a project.

Scenario: Your team is using JIRA to manage a software development project. You have received a request from a product owner to create a new issue type specifically for tracking security-related tasks. What type of issue should you create, and why?

  • Bug: This issue type is used to track defects or issues in the software.
  • Epic: This issue type allows for tracking large bodies of work that can be broken down into smaller tasks.
  • Story: This issue type is suitable for tracking user stories or requirements.
  • Task: This issue type is ideal for tracking small, actionable items.
In this scenario, the most appropriate issue type to create for tracking security-related tasks is a "Bug." Security-related tasks often involve identifying and addressing vulnerabilities or issues in the software, which aligns with the purpose of the Bug issue type. Bugs are used to track defects or issues in the software, making them suitable for recording and addressing security concerns.