Which of the following statements is NOT true regarding the risk management plan?

Which of the following statements is NOT true regarding the risk management plan?A . The risk management plan is an output of the Plan Risk Management process.B . The risk management plan is an input to all the remaining risk-planning processes.C . The risk management plan includes a description of...

December 11, 2020 No Comments READ MORE +

An enterprise has identified risk events in a project. While responding to these identified risk events, which among the following stakeholders is MOST important for reviewing risk response options to an IT risk.

An enterprise has identified risk events in a project. While responding to these identified risk events, which among the following stakeholders is MOST important for reviewing risk response options to an IT risk.A . Information security managersB . Internal auditorsC . Incident response team membersD . Business managersView AnswerAnswer: D...

December 11, 2020 No Comments READ MORE +

Which of the following processes is described in the statement below?

Which of the following processes is described in the statement below? "It is the process of exchanging information and views about risks among stakeholders, such as groups, individuals, and institutions."A . Risk governanceB . Risk identificationC . Risk response planningD . Risk communicationView AnswerAnswer: D Explanation: Risk communication is the...

December 11, 2020 No Comments READ MORE +

Which of the following aspect of monitoring tool ensures that the monitoring tool has the ability to keep up with the growth of an enterprise?

Which of the following aspect of monitoring tool ensures that the monitoring tool has the ability to keep up with the growth of an enterprise?A . ScalabilityB . CustomizabilityC . SustainabilityD . Impact on performanceView AnswerAnswer: A Explanation: Monitoring tools have to be able to keep up with the growth...

December 11, 2020 No Comments READ MORE +

Which project management process is responsible for these actions?

You are the project manager of the GHY Project for your company. You need to complete a project management process that will be on the lookout for new risks, changing risks, and risks that are now outdated. Which project management process is responsible for these actions?A . Risk planningB ....

December 11, 2020 No Comments READ MORE +

What is the value of exposure factor if the asset is lost completely?

What is the value of exposure factor if the asset is lost completely?A . 1B . InfinityC . 10D . 0View AnswerAnswer: A Explanation: Exposure Factor represents the impact of the risk over the asset, or percentage of asset lost. For example, if the Asset Value is reduced to two...

December 11, 2020 No Comments READ MORE +

Which of the following is true for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual loss expectancy (ALE)?

Which of the following is true for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual loss expectancy (ALE)?A . ALE= ARO/SLEB . ARO= SLE/ALEC . ARO= ALE*SLED . ALE= ARO*SLEView AnswerAnswer: D Explanation: A quantitative risk assessment quantifies risk in terms of numbers such as dollar values....

December 11, 2020 No Comments READ MORE +

Which of the following is an administrative control?

Which of the following is an administrative control?A . Water detectionB . Reasonableness checkC . Data loss prevention programD . Session timeoutView AnswerAnswer: C

December 10, 2020 No Comments READ MORE +

What approach can you use to achieve this goal of improving the project's performance through risk analysis with your project stakeholders?

You work as a project manager for BlueWell Inc. Management has asked you to work with the key project stakeholder to analyze the risk events you have identified in the project. They would like you to analyze the project risks with a goal of improving the project's performance as a...

December 10, 2020 No Comments READ MORE +

Which of the following is a technique that provides a systematic description of the combination of unwanted occurrences in a system?

Which of the following is a technique that provides a systematic description of the combination of unwanted occurrences in a system?A . Sensitivity analysisB . Scenario analysisC . Fault tree analysisD . Cause and effect analysisView AnswerAnswer: C Explanation: Fault tree analysis (FIA) is a technique that provides a systematic...

December 10, 2020 No Comments READ MORE +