Which of the following products is used after the Starting Up a Project process to capture and maintain inform
Which of the following products is used after the Starting Up a Project process to capture and
maintain information on all of the identified threats and opportunities relating to the project?
Which of the following risk responses can be used to seize an opportunity to ensure a risk ‘will’
Which of the following risk responses can be used to seize an opportunity to ensure a risk ‘will’
happen and the impact ‘will’ be realized?
What is the name given to an individual who is responsible for the management, monitoring and control of all a
What is the name given to an individual who is responsible for the management, monitoring and
control of all aspects of a particular risk assigned to them?
What is the name given to the individual assigned to carry out a risk response action or actions to respond to
What is the name given to the individual assigned to carry out a risk response action or actions to
respond to a particular risk or set of risks?
Which of the following is TRUE regarding risk?
Which of the following is TRUE regarding risk?
Which of the following is NOT one of the five risk management procedure steps?
Which of the following is NOT one of the five risk management procedure steps?
Where would the mechanism for the control of and access to a risk budget be defined?
Where would the mechanism for the control of and access to a risk budget be defined?
Which of the following steps looks at the probability, impact and proximity of a risk?
Which of the following steps looks at the probability, impact and proximity of a risk?
Which of the following steps looks at the aggregated net effect of all risks within the project?
Which of the following steps looks at the aggregated net effect of all risks within the project?
Which of the following steps would involve the sending of information regarding project threats or opportuniti
Which of the following steps would involve the sending of information regarding project threats or
opportunities to any external stakeholders?