Crashing the project is what type of risk response?
Tracy is the project manager of the NLT Project for her company. The NLT Project is scheduled to last 14 months and has a budget at completion of $4,555,000. Tracy’s organization will receive a bonus of $80,000 per day that the project is completed early up to $800,000. Tracy realizes that
there are several opportunities within the project to save on time by crashing the project work.
Crashing the project is what type of risk response?
Which of the following techniques is NOT used as a tool in qualitative risk analysis process?
You work as a project manager for TechSoft Inc. You are working with the project stakeholders onthe qualitative risk analysis process in your project. You have used all the tools to the qualitative risk analysis process in your project. Which of the following techniques is NOT used as a tool in qualitative risk analysis process?
Which of the following statements are true about BS 7799?
BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of the following statements are true about BS 7799?
Each correct answer represents a complete solution. Choose all that apply.
Where should she document the risks associated with this technology so she can track the risk status and respo
Adrian is a project manager for a new project using a technology that has recently been released and there’s relatively little information about the technology. Initial testing of the technology makes the use of it look promising, but there’s still uncertainty as to the longevity and reliability of the technology. Adrian wants to consider the technology factors a risk for her project. Where should she document the risks associated with this technology so she can track the risk status and responses?
Which of the following processes is described in the statement below?
Which of the following processes is described in the statement below?
“It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project.”
Which of the following participants are required in a NIACAP security assessment?
The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment?
Each correct answer represents a part of the solution. Choose all that apply.
What are the procedures that must be defined for each software project to ensure that a sound SCM process is i
The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are included in the risk register?
You are the project manager for TTP project. You are in the Identify Risks process. You have to create the risk register. Which of the following are included in the risk register?
Each correct answer represents a complete solution. Choose two.
What are the different categories of penetration testing?
Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. What are the different categories of penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are included in Technical Controls?
Which of the following are included in Technical Controls?
Each correct answer represents a complete solution. Choose all that apply.