Which one of the following is NOT an input to the risk identification process?
You are the project manager of the GHY project for your organization. You are working with
your project team to begin identifying risks for the project. As part of your preparation for
identifying the risks within the project you will need eleven inputs for the process. Which one
of the following is NOT an input to the risk identification process?
Which risk response is appropriate for both positive and negative risk events?
There are seven risks responses that a project manager can choose from. Which risk
response is appropriate for both positive and negative risk events?
What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reac
What course of action can be taken by a party if the current negotiations fail and an
agreement cannot be reached?
Which of the following is the acronym of RTM?
Which of the following is the acronym of RTM?
what additional information can you associate with the identified risk events?
You are the project manager of the GGG project. You have completed the risk identification
process for the initial phases of your project. As you begin to document the risk events in
the risk register what additional information can you associate with the identified risk
events?
Positive risk events, such as these within the NHJ Project are also known as what?
Thomas is the project manager of the NHJ Project for his company. He has identified
several positive risk events within his project and he thinks these events can save the
project time and money. Positive risk events, such as these within the NHJ Project are also
known as what?
Which of the following are the tasks performed by the owner in the information classification schemes?
Which of the following are the tasks performed by the owner in the information classification
schemes? Each correct answer represents a part of the solution. Choose three.
Which of the following approaches can be used to build a security program?
Which of the following approaches can be used to build a security program? Each correct
answer represents a complete solution. Choose all that apply.
Why is the schedule management plan needed for quantitative risk analysis?
Mary is the project manager for the BLB project. She has instructed the project team to
assemble, to review the risks. She has included the schedule management plan as an input
for the quantitative risk analysis process. Why is the schedule management plan needed for
quantitative risk analysis?
Who is correct in this scenario?
Sammy is the project manager for her organization. She would like to rate each risk based
on its probability and affect on time, cost, and scope. Harry, a project team member, has
never done this before and thinks Sammy is wrong to attempt this approach. Harry says that
an accumulative risk score should be created, not three separate risk scores. Who is correct
in this scenario?