The temperature of 430 is called what?
Your project uses a piece of equipment that if the temperature of the machine goes above
450 degree Fahrenheit the machine will overheat and have to be shut down for 48 hours.
Should this machine overheat even once it will delay the project’s end date. You work with
your project to create a response that should the temperature of the machine reach 430, the
machine will be paused for at least an hour to cool it down. The temperature of 430 is called
what?
Which of the following is an entry in an object’s discretionary access control list (DACL) that grants p
Which of the following is an entry in an object’s discretionary access control list (DACL) that
grants permissions to a user or group?
you need to use the solution to pay for the internal solution in comparison to the vendor’s solution?
You are the project manager for your organization. You have identified a risk event you’re
your organization could manage internally or externally. If you manage the event internally it
will cost your project $578,000 and an additional $12,000 per month the solution is in use. A
vendor can manage the risk event for you. The vendor will charge $550,000 and $14,500
per month that the solution is in use. How many months will you need to use the solution to
pay for the internal solution in comparison to the vendor’s solution?
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Which of the following refers to the ability to ensure that the data is not modified or
tampered with?
What type of a chart is management asking you to create?
Management wants you to create a visual diagram of what resources will be utilized in the
project deliverables. What type of a chart is management asking you to create?
Which one of the following is NOT a probable reason for relying on organizational process assets as an input f
You are preparing to start the qualitative risk analysis process for your project. You will be
relying on some organizational process assets to influence the process. Which one of the
following is NOT a probable reason for relying on organizational process assets as an input
for qualitative risk analysis?
What are the different phases of System Authorization Plan?
System Authorization is the risk management process. System Authorization Plan (SAP) is
a comprehensive and uniform approach to the System Authorization Process. What are the
different phases of System Authorization Plan? Each correct answer represents a part of
the solution. Choose all that apply.
Which type of risk response is this?
A part of a project deals with the hardware work. As a project manager, you have decided to
hire a company to deal with all hardware work on the project. Which type of risk response is
this?
Which of the following areas can be exploited in a penetration test?
Penetration testing (also called pen testing) is the practice of testing a computer system,
network, or Web application to find vulnerabilities that an attacker could exploit. Which of
the following areas can be exploited in a penetration test? Each correct answer represents a
complete solution. Choose all that apply.
Risks with low ratings of probability and impact are included on a…
Risks with low ratings of probability and impact are included on a ____ for future monitoring.