New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ScrumStudy SMC Exam - Topic 1 Question 46 Discussion

Actual exam question for ScrumStudy's SMC exam
Question #: 46
Topic #: 1
[All SMC Questions]

Andy, a Scrum Master, is helping his team draft a Sprint Backlog. In which of the following phases would this

Scrum process be in?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Noelia
4 months ago
Really? I thought they did that during implementation.
upvoted 0 times
...
Ellen
4 months ago
No way, it's all about planning the work.
upvoted 0 times
...
Berry
4 months ago
Wait, isn't it also part of the Initiate phase?
upvoted 0 times
...
Emily
5 months ago
I agree, that's where the backlog gets created.
upvoted 0 times
...
Eun
5 months ago
Definitely in the Plan and Estimate phase!
upvoted 0 times
...
Nicolette
5 months ago
I feel like it could be A or B, but I lean towards B since it involves estimating tasks for the sprint.
upvoted 0 times
...
Augustine
5 months ago
I practiced a question like this before, and I believe it was definitely about planning, so I would choose B as well.
upvoted 0 times
...
Mose
5 months ago
I'm not entirely sure, but I remember something about the backlog being part of the implementation phase too. Maybe it's C?
upvoted 0 times
...
Erasmo
5 months ago
I think the Sprint Backlog is created during the planning phase, so I would go with B, Plan and Estimate.
upvoted 0 times
...
Joseph
5 months ago
Okay, let me see. A deferred sync job implies it's not running in real-time, so it makes sense it would be on a Secondary AW machine rather than a Principal. I think C is the right answer.
upvoted 0 times
...
Twila
5 months ago
I'm leaning towards the Image content block for this one. That way I can just drop in the image and then add the text below it. Seems like the simplest approach without needing to mess with any custom code.
upvoted 0 times
...
Rose
5 months ago
Hmm, this seems like a tricky one. I'll need to think carefully about the different authentication methods and how they could protect against phishing attacks.
upvoted 0 times
...

Save Cancel