What strategy did the organization use when it purchased insurance to cover likely losses from hurricanes?
A) Risk mitigation
B) Risk transference
C) Risk avoidance
D) Risk acceptance
Risk transference
The organization used risk transference. The organization purchased insurance to cover likely losses incurred if hurricanes were to strike, thereby transferring the risk to a third party to manage it. Transferring risk does not eliminate it; it transfers the responsibility of managing the risk to the third party, which in this case was the insurance agency.
Buying insurance is a classic example of risk transference in project management.
This strategy involves transferring the risk of loss to another party, in this case, an insurance company.
Which of the following project management elements helps you establish project management benchmarks or expectations, and to track and communicate the project progress?
A) Milestones
B) Schedule forecast
C) Cost forecasts
D) Issue logs
A) Milestones
Milestones help you to establish project management benchmarks or expectations, and to track and communicate the project progress. The milestones for a project should present a clear sequence of events that will incrementally build up to the completion of the approved project. The completion of milestones should be communicated to the project sponsor and project stakeholders.
Which of the following statements describe the purpose of defining the high-level scope in the project Initiation phase? (Choose two.)
A) It contains the specific budget that will be required to complete project activities.
B) It includes a schedule for producing each deliverable.
C) It serves as an input to planning the resource-related and technological requirements of the project.
D) It clarifies what will be included in the project and what is beyond the range of activities and results.
C) It serves as an input to planning the resource-related and technological requirements of the project.
D) It clarifies what will be included in the project and what is beyond the range of activities and results.
A written high-level scope definition aids in future planning of a project by identifying the requirements of the project and the specific elements to be included in the project. The high-level scope is written during project initiation and becomes part of the project charter.
A high-level scope does not include exhaustive calculations for budget. This is part of cost management planning, which occurs during the Planning phase. The project charter will include a high-level estimation of costs, but not budget calculations.
Which of the following is an item that displays KPIs pertaining to specific projects, metrics for a project’s overall performance and progress, and critical issues, and can be customized to fit the needs of the project?
A) Process diagram
B) RACI matrix
C) Project management dashboard
D) Balanced score card
C) Project management dashboard
A project management dashboard displays KPIs pertaining to specific projects, metrics for a project’s overall performance and progress, and critical issues that require further attention. The dashboard can be customized to fit the needs of the project. Dashboards are included with most project management scheduling software or can be created through the use of spreadsheet templates.
The Initiating process results in all of the following, EXCEPT:
A) the project charter
B) the project scope statement
C) the stakeholder register
D) formal authorization of the project
C) the stakeholder register
The Initiating process involves the formal authorization and beginning of a new project (or project phase). The Initiating process includes the Develop Project Charter process and the Identify Stakeholders process. The official outputs of the Initiating process are the project charter, the stakeholder register, and the stakeholder management strategy. A preliminary scope statement may be created during this process, but not the scope statement.
TXGlobal Inc. has grouped all its employees based on functional specialty, such as accounting, HR, procurement, finance, marketing, and production. To which of the following roles do the employees in these functional groups report?
A) Project coordinator
B) Functional manager
C) Project manager
D) Project expeditor
B) Functional manager
As TXGlobal Inc. has grouped all its employees based on their functional specialties, it can be categorized as a functional organization. The employees and resources report to a functional manager.
Which of the following is an example of a company’s assets that is NOT also considered intellectual property?
A) Internal client list
B) Copyrights
C) Trademarks
D) Patents
C) Trademarks
Trademarks are symbols and images that are used to represent a company or a company’s product, service, or feature. They are indicated by a ™ superscript. Examples include the image of the letters VW in a circle for Volkswagen, the Nike checkmark, and the Coca-Cola ribbon.
Which of the following is associated with regulated data and the privacy of a data subject’s electronic information in the European Union?
A) COPPA
B) GLBA
C) PIPEDA
D) GDPR
D) GDPR
The General Data Protection Regulation (GDPR) is associated with privacy of your electronic information in the European Union (EU) or European Economic Area (EEA). In general terms, the GDPR provides individuals with the controls to grant or revoke a company’s permission to use data collected online
Your project team has created a custom clothing inventory management system based on a predetermined client profile. The model client has the following requirements for an application:
The budget is capped at $50,000
There are five product SKUs to migrate
At least two employees are available to manage the system
Which of the following is NOT a risk of using a product developed for a predetermined client?
A) It can offer an over-abundance of features and functionality.
B) It might not find a target audience.
C) It can be an incorrect match to product needs.
D) It can be an optimized solution for specific audiences.
B) It might not find a target audience.
You are managing a project for a local children’s museum. You are given a chart that shows the attendance statistics grouped by age since the project began.
Which type of tool have you been given?
A) histogram
B) Ishikawa diagram
C) control chart
D) scatter diagram
A) histogram
You have been given a histogram. Histograms are charts used to assess the quality of deliverables and the performance of the project.
A histogram is a graphical representation of the distribution of numerical data.
Doris, the project manager, is overseeing a technical project that requires basic knowledge of a certain application. Two developers on the team want to learn the application, and ask Doris to send them on a week-long training session.
Doris determines that sending both resources to this training would harm the project schedule. The schedule will only allow one team member to attend the training. Doris needs to mitigate this situation to keep the project on track. She wants to allow both individuals to work with her to come up with a decision on who will attend the training. Which conflict resolution technique should she use?
A)Withdraw/avoid
B)Compromise/reconcile
C)Smooth/accommodate
D)Force/direct
C) Smooth/accommodate
Doris should use the compromise/reconcile conflict resolution technique. This technique takes suggestions from both parties involved in conflict and tries to come to a compromise
This technique involves taking suggestions from both parties and trying to reach a mutually acceptable solution.
Which of the following characteristics is NOT one of the primary elements of a Scrum retrospective?
A) It urges the team to discuss alternative ideas that increase efficiency.
B) It helps the team focus primarily on hindrances.
C) It helps in team formation and enhances team bonding within the team.
D) It helps build the team’s sense of ownership and time and effort management.
B) It helps the team focus primarily on hindrances
As this is a negatively worded question, the correct answer is helping the team focus primarily on hindrances that are beyond the control of the team. The Scrum retrospective does NOT help the team to focus primarily on hindrances that are beyond the control of the team. Hindrances are often beyond the team’s control. Focusing on them would lower the team’s morale.
This technique would not involve the team members in the decision-making process.
Which of the following options are threats to the security of mobile devices? (Choose all that apply.)
A) Theft
B) End-of-life devices or OSes
C) Application permissions
D) Unsecured Wi-Fi connections
E) Malicious applications
F) Remote access restrictions
A) Theft
B) End-of-life devices or OSes
C) Application permissions
D) Unsecured Wi-Fi connections
E) Malicious applications
This approach ensures both team members feel involved in the decision.
Metroil Inc. has set up a tool for stakeholders and departments to view key performance indicators specific to individual projects including their overall performance, progress, and concerns. Which tool was provided?
A) Dashboard
B) Issues log
C) Action items list
A) Dashboard
A project dashboard can be viewed by stakeholders and departments to share information relating to the overall performance, progress, and concerns of specific projects.
Which of the following options is true regarding a project manager’s level of authority within a functional organization?
A) Moderate to high authority
B) Total authority
C) High authority
D) Limited or no authority
D) Limited or no authority
In a functional organization, a project manager has little or no authority to make decisions.
Mayuri is managing a software migration project. The software being implemented aims to track various customer data in order to achieve customer retention and inform future marketing strategies. Which type of software project is Mayuri managing?
A) ERP
B) CRM
C) EDRMS
D) CMS
B) CRM
Mayuri is handling a migration to a CRM system. A customer relationship management (CRM) system is a type of software that assists with managing and tracking customer data, for the purpose of achieving customer satisfaction and retention. Examples of data collected include product purchases, support inquiries and complaints, and shopping preferences
Steven, the project manager, is reviewing a request to move one team member, Sarah, to a different task based on her skill set. Steven feels that Sarah is more suited to the new task and will complete it more quickly than her original task. Steven evaluates the impact of the change and lists its justification. Which of the following project constraints should Steven evaluate to find the impact of the requested change? (Choose two.)
A) Project scope
B) Project cost
C) Project schedule
D) Project quality
C) Project schedule
D) Project quality
Based on the information from the scenario, Steven should evaluate the impact of the requested change on project costs and project schedule. Project costs need to be evaluated because the team member being moved to the task may cost more or less than the original team member. The project schedule needs to be evaluated because the project manager feels that Sarah will complete the task more quickly than the original team member would.
After project members enter a password, the project website prompts them to provide answers to security questions, such as the name of a childhood sweetheart or the color of your first car. What type of multifactor authentication is this?
A) Something you know
B) Something you do
C) Something you have
D) Something you are
A) Something you know
Any security question is something you know. This includes a password, a PIN, the name of a childhood sweetheart, the color of your first car, or the answer to a similar question.
You are the manager of a project that is creating a new application for your company’s sales department. During the project, the sales department supervisor moves to another department, and a new supervisor is hired from outside the company. Which project document needs to be updated?
A) Budget
B) Schedule
C) Stakeholder register
D) Issue log
C) Stakeholder register
When a new supervisor is hired, the stakeholder register needs to be updated. The purpose of the stakeholder register is to document the list of personnel impacted by a project, and their influence over and interest in the project. You would also need to update the communication plan.
Using your project’s WBS, you have created an activity list identifying the activities to be performed for the project. What is the NEXT step you should take?
A) Estimate the duration of each activity.
B) Create a project schedule based on the identified list of activities.
C) Identify dependencies between activities and order the activities in a logical order of completion.
D) Update the project charter to include the list of activities that will be required for the project.
C) Identify dependencies between activities and order the activities in a logical order of completion.
The next step you should take is to identify dependencies between activities and order the activities in a logical order of completion. After identifying the activities to be performed in a project during Planning, these activities must be sequenced into a logical order that reflects any dependencies between the activities.
Which process prevents privilege creep?
A) permission auditing
B) security clearances
C) background checks
D) usage auditing
A) permission auditing
Permission auditing and review ensures that users have the appropriate permissions to complete the tasks that are part of their job. By implementing permission auditing and review, you ensure that privilege creep does not occur.
In which of the following environments would you build your application?
A) Production
B) Beta
C) Development
D) Staging
C) Development
The development environment is where software is developed by writing the code that makes the software operational.
The new security plan for your organization states that all data on your servers must be classified to ensure appropriate access controls are implemented. Which statements are true of information classification? (Choose three.)
A) A data custodian must determine the classification of an information asset.
B) A data owner must determine the information classification of an asset.
C) Data classification refers to assigning security labels to information assets.
D) The two primary classes of data classification deal with military institutions and commercial organizations.
E) The two primary classes of the data classification scheme apply to nonprofit organizations and financial institutions
B) A data owner must determine the information classification of an asset.
C) Data classification refers to assigning security labels to information assets.
D) The two primary classes of data classification deal with military institutions and commercial organizations.
Data classification refers to assigning security labels to information assets. The data owner must determine the information classification of an asset. Data classification is the most crucial method used to ensure data integrity. It is the responsibility of the data owner to decide the level of classification that the information requires. One purpose of information classification is to define the parameters required for security labels. After being classified, it is difficult to declassify data.
There are two main data classification systems: commercial and military. The types of commercial data classification are as follows:
Confidential: Sensitive information that requires special protection from unauthorized modification or deletion. This is the only common category between the commercial and military classification systems
NuTex Inc. is a company based in Europe, working on a project for a customer based in a different time zone in a rural area of Ecuador. Dave Jones, a project manager, must establish a communication plan for future meetings and discussions between the developers and the customer. The project sponsor wants daily meetings scheduled. Which of the following communication methods would BEST accommodate time zone differences?
A) Emails throughout the day
B) Enterprise social media posts at a pre-scheduled time every day
C) Voice conference at a pre-scheduled time every day
D) Video conference at a pre-scheduled time every day
C) Voice conference at a pre-scheduled time every day