Which of the following controls do NOT come under technical class of control?
Which of the following controls do NOT come under technical class of control?
What risk identification method is Mary likely using?
Mary is a project manager in her organization. On her current project she is working with her
project team and other key stakeholders to identify the risks within the project. She is currently
aiming to create a comprehensive list of project risks so she is using a facilitator to help generate
ideas about project risks. What risk identification method is Mary likely using?
Which of the following is an administrative control?
Which of the following is an administrative control?
What document do you and your team is creating in this scenario?
You are the project manager of the NHH Project. You are working with the project team to create a
plan to document the procedures to manage risks throughout the project. This document will
define how risks will be identified and quantified. It will also define how contingency plans will be
implemented by the project team. What document do you and your team is creating in this
scenario?
Where are all risks and risk responses documented as the project progresses?
Where are all risks and risk responses documented as the project progresses?
Which type of risk response is this?
A part of a project deals with the hardware work. As a project manager, you have decided to hire a
company to deal with all hardware work on the project. Which type of risk response is this?
Which of the following inputs of the identify risks process is useful in identifying risks associated to the t
John works as a project manager for BlueWell Inc. He is determining which risks can affect the
project. Which of the following inputs of the identify risks process is useful in identifying risks
associated to the time allowances for the activities or projects as a whole, with a width of the range
indicating the degrees of risk?
Which of the following events refer to loss of integrity?
Which of the following events refer to loss of integrity?
Each correct answer represents a complete solution. Choose three.
Which of the following should be PRIMARILY considered while designing information systems controls?
Which of the following should be PRIMARILY considered while designing information systems
controls?
Which of the following is the MOST effective inhibitor of relevant and efficient communication?
Which of the following is the MOST effective inhibitor of relevant and efficient communication?