لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Shelly is the project manager of the BUF project for her company. In this project Shelly needs to establish some rules to reduce the influence of risk bias during the qualitative risk analysis process. What method can Shelly take to best reduce the influence of risk bias?
A. Establish risk boundaries
B. Group stakeholders according to positive and negative stakeholders and then complete the risk analysis
C. Determine the risk root cause rather than the person identifying the risk events
D. Establish definitions of the level of probability and impact of risk event
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which of the following is the FOREMOST root cause of project risk? Each correct answer represents a complete solution. Choose two.
A. New system is not meeting the user business needs
B. Delay in arrival of resources
C. Lack of discipline in managing the software development process
D. Selection of unsuitable project methodology
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following comes under phases of risk management?
A. Assessing risk
B. Prioritization of risk
C. Identify risk
D. Monitoring risk
E. Developing risk
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which of the following control detects problem before it can occur?
A. Deterrent control
B. Detective control
C. Compensation control
D. Preventative control
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following control is used to ensure that users have the rights and permissions they need to perform their jobs, and no more?
A. System and Communications protection control
B. Audit and Accountability control
C. Access control
D. Identification and Authentication control
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which of the following is the MOST important aspect to ensure that an accurate risk register is maintained?
A. Publish the risk register in a knowledge management platform with workflow features that periodically contacts and polls risk assessors to ensure accuracy of content
B. Perform regular audits by audit personnel and maintain risk register
C. Submit the risk register to business process owners for review and updating
D. Monitor key risk indicators, and record the findings in the risk register
عرض الإجابة
اجابة صحيحة: C
السؤال #7
There are four inputs to the Monitoring and Controlling Project Risks process. Which one of the following will NOT help you, the project manager, to prepare for risk monitoring and controlling?
A. Risk register
B. Work Performance Information
C. Project management plan
D. Change requests
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which of the following steps ensure effective communication of the risk analysis results to relevant stakeholders? Each correct answer represents a complete solution. Choose three.
A. The results should be reported in terms and formats that are useful to support business decisions
B. Provide decision makers with an understanding of worst-case and most probable scenarios,due diligence exposures and significant reputation, legal or regulatory considerations
C. Communicate the negative impacts of the events only, it needs more consideration
D. Communicate the risk-return context clearly
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Marie has identified a risk event in her project that needs a mitigation response. Her response actually creates a new risk event that must now be analyzed and planned for. What term is given to this newly created risk event?
A. Residual risk
B. Secondary risk
C. Infinitive risk
D. Populated risk
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Which among the following is the BEST reason for defining a risk response?
A. To eliminate risk from the enterprise
B. To ensure that the residual risk is within the limits of the risk appetite and tolerance
C. To overview current status of risk
D. To mitigate risk
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Judy has identified a risk event in her project that will have a high probability and a high impact. Based on the requirements of the project, Judy has asked to change the project scope to remove the associated requirement and the associated risk. What type of risk response is this?
A. Exploit
B. Not a risk response, but a change request
C. Avoidance
D. Transference
عرض الإجابة
اجابة صحيحة: D
السؤال #12
You are the project manager for TTP project. You are in the Identify Risks process. You have to create the risk register. Which of the following are included in the risk register? Each correct answer represents a complete solution. Choose two.
A. List of potential responses
B. List of key stakeholders
C. List of mitigation techniques
D. List of identified risks
عرض الإجابة
اجابة صحيحة: C
السؤال #13
You are the risk professional of your enterprise. You have performed cost and benefit analysis of control that you have adopted. What are all the benefits of performing cost and benefit analysis of control? Each correct answer represents a complete solution. Choose three.
A. It helps in determination of the cost of protecting what is important
B. It helps in taking risk response decisions
C. It helps in providing a monetary impact view of risk
D. It helps making smart choices based on potential risk mitigation costs and losses
عرض الإجابة
اجابة صحيحة: D
السؤال #14
You are the project manager of the GHT project. This project will last for 18 months and has a project budget of $567,000. Robert, one of your stakeholders, has introduced a scope change request that will likely have an impact on the project costs and schedule. Robert assures you that he will pay for the extra time and costs associated with the risk event. You have identified that change request may also affect other areas of the project other than just time and cost. What project management component is re
A. Configuration management
B. Integrated change control
C. Risk analysis
D. Project change control system
عرض الإجابة
اجابة صحيحة: ABC
السؤال #15
You are working in an enterprise. You project deals with important files that are stored on the computer. You have identified the risk of the failure of operations. To address this risk of failure, you have guided the system administrator sign off on the daily backup. This scenario is an example of which of the following?
A. Risk avoidance
B. Risk transference
C. Risk acceptance
D. Risk mitigation
عرض الإجابة
اجابة صحيحة: AD
السؤال #16
Risks with low ratings of probability and impact are included for future monitoring in which of the following?
A. Risk alarm
B. Observation list
C. Watch-list
D. Risk register
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Billy is the project manager of the HAR Project and is in month six of the project. The project is scheduled to last for 18 months. Management asks Billy how often the project team is participating in risk reassessment in this project. What should Billy tell management if he's following the best practices for risk management?
A. Project risk management has been concluded with the project planning
B. Project risk management happens at every milestone
C. Project risk management is scheduled for every month in the 18-month project
D. At every status meeting the project team project risk management is an agenda item
عرض الإجابة
اجابة صحيحة: ACD
السؤال #18
You are using Information system. You have chosen a poor password and also sometimes transmits data over unprotected communication lines. What is this poor quality of password and unsafe transmission refers to?
A. Probabilities
B. Threats
C. Vulnerabilities
D. Impacts
عرض الإجابة
اجابة صحيحة: B
السؤال #19
You are elected as the project manager of GHT project. You have to initiate the project. Your Project request document has been approved, and now you have to start working on the project. What is the FIRST step you should take to initialize the project?
A. Conduct a feasibility study
B. Acquire software
C. Define requirements of project
D. Plan project management
عرض الإجابة
اجابة صحيحة: C
السؤال #20
Which of the following are external risk factors? Each correct answer represents a complete solution. Choose three.
A. Geopolitical situation
B. Complexity of the enterprise
C. Market
D. Competition
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: