PSP 51-75 Flashcards

(24 cards)

1
Q

What are frequently the root causes of project failure?

A

Incomplete planning and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

People involved in or affected by project activities are?

A

Stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What consumes the greatest amount of project management time?

A

Control effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A formal document that describes the project, scope, deliverable or activity?

A

A change request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The documentation prepared during the planning stage is called?

A

Project scope document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A series of small changes that accumulates to have significant impact on the project?

A

Scope creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The maximum number of access attempt per second for an access control system is known as?

A

Peak loading profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If the PPS project is part of a larger construction project?

A

A preliminary design estimate is developed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The bid bond is usually valid for?

A

Sixty (60) days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is a bidder’s conference usually scheduled?

A

About two (2) weeks after the Request for Proposal (RFP) is issued

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The first task in any risk analysis process is?

A

Perform asset value assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five (5) approaches to risk mitigation?

A
  1. Risk assumption
  2. Risk avoidance
  3. Risk limitation
  4. Risk transfer
  5. Risk hardening
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A list of the kinds of threats affecting the assets to be safeguarded?

A

Loss event profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any weakness that can be exploited by an adversary?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the risk analysis process include?

A
  1. Risk assessment
  2. Vulnerability evaluation
  3. Cost-benefit analysis
  4. Risk management alternatives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A resource of value requiring protection is?

17
Q

What is identifying threat mitigation options and selecting measures that will provide the most benefit?

A

Risk management

18
Q

What is a major output of the planning phase?

A

A requirement document

19
Q

What is the output of the design phase?

A

Bid package or construction documents

20
Q

What does the bid package consist of?

A
  1. Bidders’ instructions
  2. Specifications
  3. Drawing and schedules
  4. Hardware schedules
21
Q

What details what work is to be included in the contract?

A

Statement of Work

22
Q

How are capable and competent suppliers and contractors selected?

A

Pre-qualification process

23
Q

What will a company or government agency that seeks the lowest cost possible for a contract adopt?

A

Invitation for Bid (IFB)

24
Q

What is the most common method of procurement?

A

Request for Proposal (RFP)