How much capital should the project set aside for the risk contingency reserve?
You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure: How much capital should the project set aside for the risk contingency reserve?A . $142,000B . $232,000C . $41,750D . $23,750View AnswerAnswer: D
What should Walter also update in this scenario considering the risk event?
Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all...
Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?
Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?A . Configuration managementB . Risk managementC . Procurement managementD . Change managementView AnswerAnswer: A
Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.
Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.A . It can be achieved by installing service packs and security updates on a regular basis.B . It is used for securing the computer hardware.C . It can be achieved by...
According to James, which of the following maturity levels of software CMM focuses on the continuous process improvement?
James works as a security manager for SoftTech Inc. He has been working on the continuous process improvement and on the ordinal scale for measuring the maturity of the organization involved in the software processes. According to James, which of the following maturity levels of software CMM focuses on the...
Which of the following types of evidence is considered as the best evidence?
Which of the following types of evidence is considered as the best evidence?A . A copy of the original documentB . Information gathered through the witness's sensesC . The original documentD . A computer-generated recordView AnswerAnswer: C
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following is a process of monitoring data packets that travel across a network?A . Password guessingB . Packet sniffingC . ShieldingD . Packet filteringView AnswerAnswer: B
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?A . Non-repudiationB . ConfidentialityC . AuthenticationD . IntegrityView AnswerAnswer: A
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Which of the following can be prevented by an organization using job rotation and separation of duties policies?A . CollusionB . EavesdroppingC . Buffer overflowD . PhishingView AnswerAnswer: A
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?A . Emergency-management teamB . Damage-assessment teamC . Off-site storage teamD . Emergency action teamView AnswerAnswer: D