Which one of the following is NOT a tool or technique that is appropriate for the quantitative risk analysis p
You work as a project manager for BlueWell Inc. You are about to complete the quantitative
risk analysis process for your project. You can use three available tools and techniques to
complete this process. Which one of the following is NOT a tool or technique that is
appropriate for the quantitative risk analysis process?
which one?
You work as a project manager for TechSoft Inc. You, the project team, and the key project
stakeholders have completed a round of quantitative risk analysis. You now need to update
the risk register with your findings so that you can communicate the risk results to the
project stakeholders – including management. You will need to update all of the following
information except for which one?
Which of the following statements best describes the level of detail Lisa should include with the risk respons
Lisa is the project manager of the SQL project for her company. She has completed the risk
response planning with her project team and is now ready to update the risk register to
reflect the risk response. Which of the following statements best describes the level of detail
Lisa should include with the risk responses she has created?
Which one of the following is the best explanation for completing qualitative risk analysis?
David is the project manager of HGF project for his company. David, the project team, and
several key stakeholders have completed risk identification and are ready to move into
qualitative risk analysis. Tracy, a project team member, does not understand why they need
to complete qualitative risk analysis. Which one of the following is the best explanation for
completing qualitative risk analysis?
Why should the project team members be involved in the Identify Risk process?
The Identify Risk process determines the risks that affect the project and document their
characteristics. Why should the project team members be involved in the Identify Risk
process?
which systems can be evaluated for compliance against specific control objectives?
Which of the following NIST Special Publication documents provides a guideline on
questionnaires and checklists through which systems can be evaluated for compliance
against specific control objectives?
Which policy does this pertain to?
An organization monitors the hard disks of its employees’ computers from time to time.
Which policy does this pertain to?
Which of the following recovery plans includes specific strategies…?
Which of the following recovery plans includes specific strategies and actions to deal with
specific variances to assumptions resulting in a particular security problem, emergency, or
state of affairs?
Which risk response will likely cause a project to use the procurement processes?
You work as a project manager for BlueWell Inc. You are working with your team members
on the risk responses in the project. Which risk response will likely cause a project to use
the procurement processes?
Which of the following authentication methods is being referred to?
An authentication method uses smart cards as well as usernames and passwords for
authentication. Which of the following authentication methods is being referred to?