The data access requirements for an application should be determined by the:
The data access requirements for an application should be determined by the:
Which of the following is the FOREMOST root cause of project risk?
Which of the following is the FOREMOST root cause of project risk?
Each correct answer represents a complete solution. Choose two.
What is the first step in a business process re-engineering project?
What is the first step in a business process re-engineering project?
What project management process would best help you?
You are the project manager of the NHQ Project for your company. You have completed
qualitative and quantitative analysis of your identified project risks and you would now like to find
an approach to increase project opportunities and to reduce threats within the project. What
project management process would best help you?
Which of the following stages of the Forrester’s IT Governance Maturity Model describes that the IT gove
Which of the following stages of the Forrester’s IT Governance Maturity Model describes that the
IT governance processes is fully developed and optimized across the enterprise, and a well-built
IT portfolio management process is put to ensure that all IT investment decisions are themselves
optimized?
From an information security perspective, information that no longer supports the main purpose of the business
From an information security perspective, information that no longer supports the main purpose of
the business should be:
Which output of the manage stakeholder expectations process can create risks?
You are the project manager of a SGT project. You have been actively communicating and
working with the project stakeholders. One of the outputs of the “manage stakeholder
expectations” process can actually create new risk events for your project. Which output of the
manage stakeholder expectations process can create risks?
what must be done with the data to ensure data completeness?
When storing data archives off-site, what must be done with the data to ensure data
completeness?
What risk response has been given in this project?
Jane is the project manager of the GBB project for her company. In the current project a vendor
has offered the project a ten percent discount based if they will order 100 units for the project. It is
possible that the GBB Project may need the 100 units, but the cost of the units is not a top priority
for the project. Jane documents the offer and tells the vendor that they will keep the offer in mind
and continue with the project as planned.
What risk response has been given in this project?
which is the MOST critical security consideration?
The organization has decided to outsource the majority of the IT department with a vendor that is
hosting servers in a foreign country. Of the following, which is the MOST critical security
consideration?