Which of the following is an output of the Create WBS process?
A. Scope baseline
B. Project scope statement
C. Decomposition
D. Requirements documentation
Which of the following is an output of the Create WBS process?
A. Scope baseline
B. Project scope statement
C. Decomposition
D. Requirements documentation
During the Plan Risk Management process, assigning ___________ will help you and the project team identify all important risks and work more effectively during the identification process.
A. risk factors
B. blame
C. risk mitigation plans
D. risk categories
On a control chart, if six consecutive plot points are above the mean, then what can be established about the process?
A. The process is out of control
B. The process will be out of control after plotting the seventh point.
C. The process is in control
D. Nothing can be established
A project to construct a high-rise building is progressing very well. Stakeholders are proactive in identifying issues related to the quality of the structure, walls and floors. As a project manager, you are conducting meetings to clarify or resolve their issues. Although, you are committed to manage stakeholders concerns, you learned that some critical issues need to be deferred to the next phase of the project for resolution. What should you do in this situation?
A. You must not defer any stakeholder issues but look for alternate methods
B. You must escalate these issues to the sponsor for his advice
C. You must work with stakeholders to defer those issues
D. You must request the stakeholders to retract their issues
A project manager needed to shorten a project schedule. He decided to apply crashing, a schedule compression technique. Which of the following activities would not be an example of crashing?
A. Bringing in additional resources
B. Reducing project scope
C. Paying to expedite delivery activities
D. Approving overtime
Perform Integrated Change Control includes several configuration management activities. Which of the following is not part of Perform Integrated Change Control?
A. Change request
B. Configuration Verification
C. Configuration Status Accounting
D. Configuration Identification
The project management team performed activities such as measuring examining and verifying to determine whether work and deliverables met requirements and product acceptance criteria. Which of the following choices refers to a different set of activities than the ones just mentioned?
A. Walkthroughs
B. Prevention
C. Inspection
D. Reviews
You have identified a risk that will negatively affect your security project. You and your team have decided to use an older encryption technology because of the high risk associated with the new technology. What type of risk strategy are you using?
A. Mitigation
B. Exploitation
C. Avoidance
D. Transfer
A project is contracted as a Time & Material (T&M) type of contract. The service provider initially estimates that the total effort involved would be about 1000 hours of effort. The project is contracted at a rate of US$ 75 per hour of effort. If the project ended up with 1200 hours of effort, what would the contract payout be.
A. US$ 75,000
B. US$ 90,000
C. US$ 82,500
D. US$ 120,000
What is the MAIN reason for controlling the project scope?
A. To enable scope creep
B. To prevent changes from affecting the project
C. To ensure timely closure of the project.
D. Preventing scope creep.