Which of the following statements reflect the ‘Code of Ethics Canons’ in the ‘(ISC)2 Code of
Which of the following statements reflect the ‘Code of Ethics Canons’ in the ‘(ISC)2 Code of Ethics’? Each correct answer represents a complete solution. Choose all that apply.
Which of the following is violated in a shoulder surfing attack?
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee’s computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?
what additional information can you associate with the identified risk events?
You are the project manager of the GGG project. You have completed the risk identification process for the initial phases of your project. As you begin to document the risk events in the risk register what additional information can you associate with the identified risk events?
Why would the project manager need to update the WBS after the risk response planning process?
You are the project manager of the GHY Project for your company. You have completed the risk response planning with your project team. You now need to update the WBS. Why would the project manager need to update the WBS after the risk response planning process? Choose the best answer.
Where will you record the mitigation response?
You are the project manager for your company and a new change request has been approved for your project. This change request, however, has introduced several new risks to the project. You have communicated these risk events and the project stakeholders understand the possible effects these risks could have on your project. You elect to create a mitigation response for the identified risk events. Where will you record the mitigation response?
Which of the following statements best describes the difference between the role of a data owner and the role
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
What will you need as inputs for the qualitative risk analysis of the project in this scenario?
You are the project manager of the BlueStar project in your company. Your company is structured as a functional organization and you report to the functional manager that you are ready to move onto the qualitative risk analysis process. What will you need as inputs for the qualitative risk analysis of the project in this scenario?
Which of the following types of risk response are you following?
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of lack of space, casting it is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
Which one of the following statements best describes the requirements for the data type used in qualitative ri
You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?
which one?
You work as a project manager for TechSoft Inc. You, the project team, and the key project stakeholders have completed a round of quantitative risk analysis. You now need to update the risk register with your findings so that you can communicate the risk results to the project stakeholders – including management. You will need to update all of the following information except for which one?