Which of the following tools will help you to accomplish the task?
You work as a Project Manager for www.company.com Inc. You have to measure the probability,
impact, and risk exposure. Then, you have to measure how the selected risk response can affect
the probability and impact of the selected risk event. Which of the following tools will help you to
accomplish the task?
Which of the following are external risk factors?
Which of the following are external risk factors?
Each correct answer represents a complete solution. Choose three.
Which of the following is an acceptable method for handling positive project risk?
Which of the following is an acceptable method for handling positive project risk?
This temperature of 450 degree is referred to as?
You are the project manager of GFT project. Your project involves the use of electrical motor. It
was stated in its specification that if its temperature would increase to 500 degree Fahrenheit the
machine will overheat and have to be shut down for 48 hours. If the machine overheats even once
it will delay the project’s arrival date. So to prevent this you have decided while creating response
that if the temperature of the machine reach 450, the machine will be paused for at least an hour
so as to normalize its temperature. This temperature of 450 degree is referred to as?
Which of the following decision tree nodes have probability attached to their branches?
Which of the following decision tree nodes have probability attached to their branches?
Which of the following IS processes provide indirect information?
Which of the following IS processes provide indirect information?
Each correct answer represents a complete solution. Choose three.
You need to calculate potential revenue loss if a certain risks occurs
You are the risk professional of your enterprise. You need to calculate potential revenue loss if a
certain risks occurs. Your enterprise has an electronic (e-commerce) web site that is producing US
$1 million of revenue each day, then if a denial of service (DoS) attack occurs that lasts half a day
creates how much loss?
Which of the following process ensures that extracted data are ready for analysis?
Which of the following process ensures that extracted data are ready for analysis?
Which of the following vulnerability assessment software can check for weak passwords on the network?
Which of the following vulnerability assessment software can check for weak passwords on the
network?
Which of the following is NOT true for risk governance?
Which of the following is NOT true for risk governance?