Which of the following is described by the definition given below?

Which of the following is described by the definition given below? "It is the expected guaranteed value of taking a risk."A . Certainty equivalent valueB . Risk premiumC . Risk value guaranteeD . Certain value assuranceView AnswerAnswer: A Explanation: The Certainty equivalent value is the expected guaranteed value of taking...

December 6, 2020 No Comments READ MORE +

Which of the following role carriers will decide the Key Risk Indicator of the enterprise? Each correct answer represents a part of the solution. Choose two.

Which of the following role carriers will decide the Key Risk Indicator of the enterprise? Each correct answer represents a part of the solution. Choose two.A . Business leadersB . Senior managementC . Human resourceD . Chief financial officerView AnswerAnswer: AB Explanation: An enterprise may have hundreds of risk indicators...

December 6, 2020 No Comments READ MORE +

Which of the following activities best describes a salience model?

Ben works as a project manager for the MJH Project. In this project, Ben is preparing to identify stakeholders so he can communicate project requirements, status, and risks. Ben has elected to use a salience model as part of his stakeholder identification process. Which of the following activities best describes...

December 6, 2020 No Comments READ MORE +

What type of risk response has David adopted?

David is the project manager of the HRC Project. He has identified a risk in the project, which could cause the delay in the project. David does not want this risk event to happen so he takes few actions to ensure that the risk event will not happen. These extra...

December 5, 2020 No Comments READ MORE +

What is the MOST important reason to maintain Key Risk Indicators?

You are the project manager of GHT project. You have selected appropriate Key Risk Indicators for your project. Now, you need to maintain those Key Risk Indicators. What is the MOST important reason to maintain Key Risk Indicators?A . Risk reports need to be timelyB . Complex metrics require fine-tuningC...

December 5, 2020 No Comments READ MORE +

When the project manager updates the risk register he will need to include several pieces of information including all of the following except for which one?

The only output of qualitative risk analysis is risk register updates. When the project manager updates the risk register he will need to include several pieces of information including all of the following except for which one?A . Trends in qualitative risk analysisB . Risk probability-impact matrixC . Risks grouped...

December 5, 2020 No Comments READ MORE +

Out of several risk responses, which of the following risk responses is used for negative risk events?

Out of several risk responses, which of the following risk responses is used for negative risk events?A . ShareB . EnhanceC . ExploitD . AcceptView AnswerAnswer: D Explanation: Among the given choices only Acceptance response is used for negative risk events. Risk acceptance means that no action is taken relative...

December 5, 2020 No Comments READ MORE +

What document do you and your team is creating in this scenario?

You are the project manager of the NHH Project. You are working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be...

December 5, 2020 No Comments READ MORE +

Which of the following tools would you use to choose the appropriate risk response?

You are the project manager of a project in Bluewell Inc. You and your project team have identified several project risks, completed risk analysis, and are planning to apply most appropriate risk responses. Which of the following tools would you use to choose the appropriate risk response?A . Project network...

December 5, 2020 No Comments READ MORE +

What type of control is an intrusion detection system (IDS)?

You are the project manager of your enterprise. You have introduced an intrusion detection system for the control. You have identified a warning of violation of security policies of your enterprise. What type of control is an intrusion detection system (IDS)?A . DetectiveB . CorrectiveC . PreventativeD . RecoveryView AnswerAnswer:...

December 5, 2020 No Comments READ MORE +