Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
AI Flashcards
FREE
Search
Search
Sign In
Register
study help
business
principles of risk management
Mastering The PMI Risk Management Professional (PMI-RMP) Exam: Complete Coverage Of The PMI-RMP Exam Content Outline And Specifications Updated March 2022 (BASICS Lean® Implementation) 1st Edition Klaus Nielsen - Solutions
What does the risk burndown chart display?A. Risk exposed B. Number of iterations C. Risk assessment D. A and B
Which risk-based spikes can be used across all agile projects?A. Sensitivity analysis and decision tree analysis B. Expected monetary value analysis and simulations C. A and B D. Qualitative and
During risk management, the team uses the review process to examine which of the following?A. Sprint planning B. Sprint review C. Sprint retrospective D. Daily scrum
Which of the following is an agile risk strategy?A. Accept B. Plan contingency C. Avoid D. Transfer
Why does the team put risks in the backlog?A. Avoid having to keep separate risk lists B. Keep the team focused on risks C. Ensure that the risks get worked on in the early iterations D. Prevent the
In which practice would you experience simplicity as described in the 12 principles of agile software?A. Test-driven development B. Refactoring C. Osmotic communication D. Seeing waste
What is the relationship between the Agile Software Development Manifesto and the 12 principles of agile software?A. The 12 principles of agile software are the working values of the manifesto.B.
The Agile Manifesto value “customer collaboration over contract negotiation” means that:A. Agile approaches encourage you not to focus too much on negotiating contracts, since most vendors are
What agile concept is closely related to value stream mapping?A. Maximize business value B. Eliminate waste C. Incremental integration D. Minimize resource usage
Identify the incorrect agile principle and its implications.A. Businesspeople and developers must work together daily throughout the project: it is mandatory for the stakeholders and the team to meet
Which of the following tasks should not be conducted when assessing project risk level?A. Identify new risks B. Assess probabilities C. Assess impacts D. Confirm risks are expired
How should Andrew and his team on the construction project working with local on-site officials communicate the risk levels to these people?A. Give them access to a collaborative platform, so they
Trevor and his team are monitoring project risk levels for a major IT project with many high-ranking key stakeholders of a certain age and from across the world. In that process they prepare reports
Trevor and his team are monitoring project risk levels. Which of the following tasks is the least important?A. Assess secondary and residual risks B. Assess the project risk level C. Prepare reports
Ian and his team are updating relevant project documents with aggregated and summarized risk data. What needs to be done?A. Achieve lessons learned B. Update the project management plan C. Update the
When Ian and his team are updating relevant project documents with aggregated and summarized risk data, who or what is the least likely source of data?A. Project team B. Sponsor C. Work performance
Ian and his team are in the process of updating relevant project documents. Which of the following risks should be closed out as expired?A. A risk that has been mitigated so probability and impact
Ian and his team are in the process of updating relevant project documents. Currently, they are updating the risk register. What data is likely to be updated?A. Change status for expired risks B.
Ian and his team are in the process of updating relevant project documents. Which of the following is the least relevant to update with aggregated and summarized risk data?A. Risk register B. Lessons
Ian and his team are monitoring residual and secondary risks. Which of the following tasks is the least important?A. Monitor risk response and document residual risk B. Monitor risk response for
Ian has identified some risks and documented them in the risk register. When assessing the impact of residual and secondary risks, which is most important?A. The project manager can do it.B. It can
Some years ago, an oil platform burned in the Mexican gulf and there was a risk that oil would pollute the sea. Various chemicals were used to avoid this. However, it turned out that these chemicals
Ian has identified some risks and documented them in the risk register. They found a risk where the impact has been greatly reduced due to the risk response. However, probability is still high, and
Ian has identified some risks and documented them in the risk register. Which of them should be considered a residual risk?A. A risk that arises due to another risk response.B. It is just another
When gathering and analyzing performance data, which of the following tasks is the least important?A. Reconcile performance data and reports from risk-relevant work packages B. Analyze data to
When gathering and analyzing performance data, what is the most important aspect of the baseline?A. It helps the team to stay within the schedule.B. It supports formal change control.C. It is
Pete and his team are in the process of gathering and analyzing performance data. They want to monitor impacts against overall project risk exposure, but whom would be affected?A. The enterprise B.
Pete and his team are in the process of gathering and analyzing performance data. There seems to be a schedule concern with the performance of several teams working predictive. What can Pete and his
Pete and his team are in the process of gathering and analyzing performance data. Currently they are examining schedule risk. Should they reconcile data from both work and planning packages?A. Yes,
Which of the following tasks is the least important when implementing risk responses?A. Execute the risk response plan(s)B. Assess the watchlist C. Encourage stakeholders to provide feedback on the
Roger and his team are working with the key stakeholders to encourage them to provide feedback on the risk responses. What could Roger and his team do to further this?A. Tell the key stakeholders to
Roger hears this statement from the sponsor: “The contingency plan is the last line of defense against the risk.” What is the most exact respond?A. Yes, you are right.B. Yes, you are right, but
What might be the consequence for Georg and his team for not having a contingency plan for a high-impact risk?A. Without the plan in place, the project cannot avoid the risk.B. Without the plan in
When should Victor and his team execute the contingency plan of a certain risk dealing with the risk of the organization not using the implemented solution?A. The plan is to lessen the damage of the
Victor and his team are discussing the goals of executing the risk response plans. Which of the following states one or more of these goals?A. Determining ways to keep the risk contingency budget
When dealing with the planning of risk responses, which of the following tasks is the least important?A. Illustrate and communicate the effectiveness of the risk response strategies B. Allocate
Andy, the team lead, wants to allocate responsibilities for managing risk responses. What kind of responsibilities would most likely be allocated?A. Help the risk owner watch the risk B. Support the
Pete, the project manager, wants to assess the effectiveness of the risk response mitigation actions on a risk regarding lack of resources for the implementation of the solution. How can Pete, when
When would be a good time for Pete, the project manager of a major project, to be using a workaround?A. When his client asks him to do so B. When all options have been tried C. As he sees fit D. When
Pete, the project manager of a major project, has a risk with a high probability and a huge negative impact. Which risk response strategy should he try out first?A. Exploit B. Mitigate C. Transfer D.
Tommy and his team are struggling with key stakeholders who only work with negative risks. Which of the following risk response strategies would work for both positive and negative risks?A. Mitigate
Tommy, the agile Scrum product owner, has selected a risk response strategy where he works with a partner who provides more resources, which should increase the probability of the risk. What strategy
Tommy, the agile Scrum product owner, has empowered the key stakeholders to independently identify threats and opportunities. This has been working; however, most stakeholders only identify threats,
Tommy, the agile Scrum product owner, has empowered the key stakeholders to independently identify threats and opportunities. The stakeholders report the following to Tommy. Which one should he take
Roger and his team are assessing project compliance objectives against organizational strategic objectives. They have identified the importance of the various governance requirements. Which of the
When assessing project compliance objectives against organizational strategic objectives, which of the following project artifacts would be most helpful?A. Risk register B. Issue log C. Budget D.
Tom has conducted a detailed study of business activities, dependencies, and infrastructure. Which kind of analysis has he just conducted?A. SWOT analysis B. Benchmarking C. Impact analysis D. Trend
Emma and her agile Scrum team want to perform an impact analysis. Which of the following is the least of her concerns?A. Project scope B. Schedule cost C. Resources D. Environment
Tony, the expert planner, and his team are in the middle of assessing project risk complexity. Which of the following tools and techniques should not be applied?A. SWOT analysis B. Ishikawa diagram
Tony, the expert planner, and his team are in the middle of assessing project risk complexity. Which of the following tools and techniques should be applied?A. SWOT analysis B. Earned value
Tony is an expert planner. Which tool or technique used in scheduling may support Tony when forecasting?A. Critical path analysis B. Critical chain analysis C. Expected monetary value D. Earned value
Which of the following tasks should not be conducted when performing the quantitative analysis?A. Analyze risk data and process performance information against established metrics B. Analyze a
Tony has examined his schedule and found the standard deviation of the tasks in his plan. Which tool or technique, when performing the quantitative analysis, may provide a similar type of outcome for
A team has just performed a qualitative analysis and now plans on performing the quantitative analysis. What is the big difference between qualitative analysis and quantitative analysis?A. The
A team wants to perform a forecast and trend analysis. What information would be required?A. New information B. Historical information C. New and historical information D. None of the above
John and his team are still working on performing quantitative analysis. They found a technique they can use to calculate the project’s risk contingency. What technique did they most likely
John and his team are still working on performing the quantitative analysis. They would like a tool or technique that can tell them the probability that the schedule is completed in 11 or 23 days.
John and his team are about to embark on performing a quantitative analysis. Which of the following tools and techniques does not fit that description?A. Monte Carlo B. Probability and impact
John, the product owner, has just engaged a new Scrum master to coach the key stakeholders on performing the qualitative analysis. What would be a good topic for the sessions?A. Expected monetary
Pete and his team have prioritized risks based upon the impact but the assessment is not complete - what else does Peter and his needs to include when prioritizing risks?A. Urgency B. Uncertainty C.
When estimating the impact of an identified risk, “Missing configuration hardware,” which of the following would be best applied?A. Time B. Cost C. Scope D. Uncertainty
Risks in the RBS use classifications from the risk management plan. However, which of the following is the least likely categorization?A. Organizational B. Project management C. Issues D. Technical
Tony and his agile team are using an RBS and now discover that one category, project management, has been empty. What are the consequences for Tony and his team?A. They should identify some project
Which of the following is the least beneficial for Paul and his team in using a risk breakdown structure?A. Provide a classification, e.g., environment B. Categories for the identified risks C.
The team is in the process of performing the qualitative analysis of the identified risk. What factors are assessed?A. Time and money B. Probability and likelihood C. Probability and impact D. Impact
Eddy and Peter have developed a risk register and now need to update it. Which of the following information is least likely to be updated when a risk response is triggered?A. Description B.
Eddy and Peter are in the process of developing a risk register for the ERP project. Which of the following content should not be included?A. Risk ID B. Categorization C. Source D. Author
The team is faced with the risk of not being able to solve a technical issue due to some missing hardware configuration. What is the risk origin here?A. The team B. Missing hardware configuration C.
Freddy, the agile coach, is discussing with his agile Scrum team who should have risk ownership of the DevOps environment. Who would be the best owner?A. The product owner and he/she owns the
Roger is developing a risk register for his first risk workshop. During the workshop he and some SMEs are going to classify some risks. Which of the following would be the best classification?A.
Roger is developing a risk register for his first risk workshop. During the workshop he and some SMEs are going to examine various risk attributes. Which of the following is not a risk attribute?A.
Freddy, the agile coach, is discussing with his agile Scrum team what is a good example of a risk impact. Which of the following statements should he put forward as a good example?A. John, the
Freddy, the agile coach, is working with Pete, the project manager of a hybrid project, on documenting risk triggers and thresholds based on context/environment. They have assessed, confirmed, and
Freddy, the agile coach of a Scrum team, is working with the product owner to empower the key stakeholders to challenge existing thresholds. How should that be done?A. The key stakeholders should
Pete and his team need to document risk compliance thresholds. How do they perform the update?A. Against updated risk data B. Against the risk triggers C. Against the risk consequences and/or impact
Paul and his team are in the process of documenting risk triggers. The risk is the probability of activity (activity X) on the critical path being delayed. Which of the following would be the best
Paul and his team are having a hard time explaining the term “risk trigger” to the key stakeholders. What would be a suitable alternative?A. Information radiator B. Warning signs C. Risk impacts
Paul and his team have examined the assumption and constraint analysis. They have categorized and leveraged the results of the assumption and constraint analysis. Several tasks need to be completed.
Paul and his team have examined the assumption and constraint analysis. They are in doubt whether this analysis takes both positive and negative effects on project objectives into account. What is
Paul and his team have identified various assumptions and constraints that can be false. They also figured out that if the assumptions and constraints are false, then they would affect the project
Kim, the newly appointed project manager for the healthcare project, and her dedicated team are working on the assumption and constraint analysis where they have identified a constraint on resources
Kim, the newly appointed project manager for the healthcare project, and her dedicated team are working on the assumption and constraint analysis. Which of these statements is a constraint?A. Product
Kim, the newly appointed project manager for the healthcare project, and her dedicated team are working on the assumption and constraint analysis. Which of these statements is an assumption?A.
Kim, the newly appointed project manager for the healthcare project, is starting to conduct various risk identification exercises. Which of the following is the least important of these tasks?A.
Irving has just completed a detailed risk identification exercise with his team and key stakeholders. What should they do next?A. Update lessons learned B. Perform detailed analyses of risk
Donald, the project manager, learned a mnemonic technique during a PMP training course. The term was BIRDS and was used to identify risk. His notes stated that S = SWOT analysis, D = Delphi, R =
Donald and his team have gathered all kinds of risk identification data to be analyzed. Which of these resources should he and his team not consider?A. All kinds of documents B. A bunch of audio
Ian and his agile Scrum team are in the process of identifying risks. Which of the following tools and techniques can help identify risks and is aligned with the agile way of working?A. Brainwriting
Brian, the product owner, meets with the key stakeholders to discuss the rules of engagement. Which of the following statements or rules should be applied by project?A. Everyone should be able to
Brian, the product owner, wants to train, coach, or educate the stakeholders on risk principles and processes to create a shared understanding of principles and processes and foster engagement in
Joan and her team are planning the risk management activities with the stakeholders. Now they have leveraged the stakeholder analysis done by the project manager. However, more work is needed. Which
Joan and her team want to leverage the stakeholder analysis to plan and lead the risk management activities with stakeholders. How can this work be best applied?A. It illustrates the skills and
Erik and his team are in the process of documenting the risk management plan. They have defined risk roles and responsibilities, prepared a list of the key artifacts/resources that will be used to
Mary is trying to explain to the project’s key stakeholders how the risk breakdown structure (RBS) can be used to support the project and the risk management plan. Which statement best supports her
Pete and his agile team are discussing the possible use of a RAM or RACI diagram. Which of the following statements is correct in that regard?A. The RACI chart is the only type of RAM.B. The RACI
John and his team are in the process of documenting the risk management plan. Part of this work is assigning organizational risk roles and responsibilities. To support this they have agreed upon
John and his team have just changed the RBS into a fishbone diagram and presented it to the key stakeholders. One of them asked, “What is illustrated as the sides and head of the fish?”A. The
John and his team have just presented the risk breakdown structure to the key stakeholders. The stakeholders had a hard time understanding it, so John and his team plan to remake the RBS into a
John and his team have identified the following risks: unclear customer structure, user not committed to project, and management and users disagree. In which risk category should these risks be
John is working with his team on identifying possible risk categories to validate the current RBS. Which of the identified categories is the least useful?A. Commercial risks B. Requirements risks C.
Showing 1 - 100
of 3756
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last
Step by Step Answers