Which of the following is a technique that provides a systematic description of the combination of unwanted occurrences in a system?

Which of the following is a technique that provides a systematic description of the combination of unwanted occurrences in a system?A . Sensitivity analysisB . Scenario analysisC . Fault tree analysisD . Cause and effect analysisView AnswerAnswer: C Explanation: Fault tree analysis (FIA) is a technique that provides a systematic...

May 20, 2021No CommentsREAD MORE +

What is the BEST action would you choose in this scenario?

You are the project manager of GHT project. You are performing cost and benefit analysis of control. You come across the result that costs of specific controls exceed the benefits of mitigating a given risk. What is the BEST action would you choose in this scenario?A . The enterprise may...

May 19, 2021No CommentsREAD MORE +

Which of the following is a key output of this process?

You are an experienced Project Manager that has been entrusted with a project to develop a machine which produces auto components. You have scheduled meetings with the project team and the key stakeholders to identify the risks for your project. Which of the following is a key output of this...

May 19, 2021No CommentsREAD MORE +

Which of the following processes addresses the risks by their priorities, schedules the project management plan as required, and inserts resources and activities into the budget?

Which of the following processes addresses the risks by their priorities, schedules the project management plan as required, and inserts resources and activities into the budget?A . Monitor and Control RiskB . Plan risk responseC . Identify RisksD . Qualitative Risk AnalysisView AnswerAnswer: B Explanation: The plan risk response project...

May 19, 2021No CommentsREAD MORE +

What should you do with these identified risk events?

You and your project team are identifying the risks that may exist within your project. Some of the risks are small risks that won't affect your project much if they happen. What should you do with these identified risk events?A . These risks can be dismissed.B . These risks can...

May 19, 2021No CommentsREAD MORE +

Which of the following should be PRIMARILY considered while designing information systems controls?

Which of the following should be PRIMARILY considered while designing information systems controls?A . The IT strategic planB . The existing IT environmentC . The organizational strategic planD . The present IT budgetView AnswerAnswer: C Explanation: Review of the enterprise's strategic plan is the first step in designing effective IS...

May 19, 2021No CommentsREAD MORE +

Why should the project team members be involved in the Identify Risk process?

The Identify Risk process determines the risks that affect the project and document their characteristics. Why should the project team members be involved in the Identify Risk process?A . They are the individuals that will most likely cause and respond to the risk events.B . They are the individuals that...

May 19, 2021No CommentsREAD MORE +

Which of the following risks refer to probability that an actual return on an investment will be lower than the investor's expectations?

Which of the following risks refer to probability that an actual return on an investment will be lower than the investor's expectations?A . Integrity riskB . Project ownership riskC . Relevance riskD . Expense riskView AnswerAnswer: D Explanation: Probability that an actual return on an investment will be lower than...

May 18, 2021No CommentsREAD MORE +

When you fast track the project, what is likely to increase?

You work as the project manager for Bluewell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decide, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project, what...

May 18, 2021No CommentsREAD MORE +

In which of the following risk prioritization options would this case be categorized?

You are the project manager of RFT project. You have identified a risk that the enterprise's IT system and application landscape is so complex that, within a few years, extending capacity will become difficult and maintaining software will become very expensive. To overcome this risk, the response adopted is re-architecture...

May 18, 2021No CommentsREAD MORE +