What is the role played by James in the organization?
James work as an IT systems personnel in SoftTech Inc. He performs the following tasks.
Runs regular backups and routine tests of the validity of the backup data. Performs data restoration from the backups whenever required. Maintains the retained records in accordance with the established information classification policy.
What is the role played by James in the organization?
Which one of the following will NOT help Wendy to perform this project management activity?
Wendy is about to perform qualitative risk analysis on the identified risks within her project. Which one of the following will NOT help Wendy to perform this project management activity?
Which one of the following is a valid response to the identified risk event?
Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?
Which risk response can you choose that will also cause you to update the human resource management plan?
You work as a project manager for BlueWell Inc. Your project is running late and you must respond to the risk. Which risk response can you choose that will also cause you to update the human resource management plan?
Which of the following concepts represent the three fundamental principles of information security?
Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.
Which of the following tasks are identified by the Plan of Action and Milestones document?
Which of the following tasks are identified by the Plan of Action and Milestones document? Each correct answer represents a complete solution. Choose all that apply.
Which one of the following risk identification approaches is an information gathering technique?
You are the project manager of the GYH project for your organization. Management has asked you to begin identifying risks and to use an information gathering technique. Which one of the following risk identification approaches is an information gathering technique?
What are the procedures that must be defined for each software project to ensure that a sound SCM process is i
The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following activities best describes a salience model?
Ben works as a project manager for the MJH Project. In this project, Ben is preparing to identify stakeholders so he can communicate project requirements, status, and risks. Ben has elected to use a salience model as part of his stakeholder identification process. Which of the following activities best describes a salience model?
which of the following processes, probability and impact matrix is prepared?
During which of the following processes, probability and impact matrix is prepared?