Chapter 4
Basics of IT and Governance (Domain 4.0)

  1. Just allowing the consequences of a negative risk to happen is which type of risk response strategy?
    1. Avoid
    2. Transfer
    3. Mitigate
    4. Accept
  2. What is the process of examining the risk and establishing the appropriate course of action should it occur called?
    1. Risk analysis
    2. Risk probability
    3. Risk response planning
    4. Risk trigger
  3. Kevin is working on a project and he wants to store information on a portable hard drive as a backup to his work computer. What two security considerations should he take into account while using removal media storage? (Choose two)
    1. Back up the data at a regular interval.
    2. Encrypt the removable hard drive to prevent unauthorized access.
    3. Lock the device in an out-of-view area such as a drawer or cabinet.
    4. Do nothing, hackers do not target small projects or businesses.
  4. A potential future event that can have either a negative or a positive impact on a project is known as which one of the following?
    1. An issue
    2. A risk
    3. A hope
    4. A requirement
  5. As you identify all the potential risks that might impact a project, you should record them in which one of the following?
    1. RACI chart
    2. Risk register
    3. Risk probability matrix
    4. Issue log
  6. The activity of selecting risks that have the greatest chance of occurring and the biggest impact on the project should they occur is called which one of the following?
    1. Three-point estimating
    2. Pareto diagraming
    3. Monitoring and Controlling
    4. Risk analysis
  7. The consequence or opportunity the risk poses to the project is known as which one of the following?
    1. Risk response plan
    2. Risk impact
    3. Risk register
    4. Risk probability
  8. Which of the following is defined as the likelihood that a risk will occur?
    1. Risk response plan
    2. Probability and impact matrix
    3. Risk register
    4. Risk probability
  9. Which of the following techniques could be used to create an initial list of risks on a project? (Choose three.)
    1. Parametric estimating
    2. Brainstorming
    3. Three-point estimating
    4. Interviews
    5. Fishbone diagrams
    6. Facilitated workshops
  10. What does it mean to share a positive risk?
    1. Assign the risk to a third party who is best able to bring about opportunity.
    2. Monitor the probability or impact of the risk event to ensure that benefits are realized.
    3. Choose to accept the consequences of the risk.
    4. Look for opportunities to take advantage of positive impacts.
  11. When determining risk probability and impact, which tool typically offers the best results?
    1. Expert judgment
    2. Parametric estimating
    3. Environmental factors
    4. Project documentation
  12. What tool would be used to prioritize and quantify risks, so the information is easy to understand and is visually informative?
    1. Probability and impact matrix
    2. Fishbone diagram
    3. Histogram
    4. Responsibility assignment matrix
  13. All of these are common potential risks to a project EXCEPT:
    1. Teams not attending status meetings
    2. Insufficient budget assigned to the project
    3. Scope changes after the project execution begins
    4. Legal ramifications resulting from the project
  14. What does it mean to exploit a positive risk?
    1. Assign the risk to a third party who is best able to bring about opportunity.
    2. Monitor the probability or impact of the risk event to ensure benefits are realized.
    3. Choose to accept the consequences of the risk.
    4. Look for opportunities to take advantage of positive impacts.
  15. At a minimum, which of the following types of information would be recorded on a risk register? (Choose three.)
    1. Risk score
    2. Risk trigger scores
    3. Risk document review
    4. Risk owners
    5. Description of risk
    6. Mitigation strategy
  16. Attempting to ensure that a risk doesn't happen at all, or eliminating the cause of a negative risk, is what type of risk response strategy?
    1. Transfer
    2. Mitigate
    3. Accept
    4. Avoid
  17. If a project team wanted to enhance a positive risk, what are they trying to accomplish?
    1. Assign the risk to a third party who is best able to bring about opportunity.
    2. Monitor the probability or impact of the risk event to ensure benefits are realized.
    3. Choose to accept the consequences of the risk.
    4. Look for opportunities to take advantage of positive impacts.
  18. What is the activity of determining and documenting any potential risks that might happen on a project?
    1. Risk planning
    2. Risk mitigation
    3. Risk avoidance
    4. Risk identification
  19. What is an individual or organization's comfort level with how likely they are to accept or avoid risk?
    1. Risk register
    2. Risk avoider
    3. Risk taker
    4. Risk tolerance
  20. Joey has been assigned a project where the deadline must be met before the start of the youth activities season, and there is a limited budget for the project. This is an example of what type of influence?
    1. Scope creep
    2. Interaction between constraints
    3. Constraint reprioritization
    4. Stakeholders opinions on the project
  21. Nermit has been working on a chart that lists all the risks that have been identified on a project, along with a numerical score of the likelihood that the risk has of occurring and the score for how impactful the results of the risk occurring would be. What is Nermit creating?
    1. Risk response plan
    2. Risk register
    3. Probability and impact matrix
    4. RACI chart
  22. A construction company has been monitoring tropical storms because of the impact a hurricane that might make landfall would have on the project. A tropical storm has just formed, and forecasters are calling for it to make landfall in a populated part of the country. The company begins to buy extra inventory in lumber and other materials. This is an example of which one of the following?
    1. Risk register
    2. Risk trigger
    3. Risk taker
    4. Risk tolerance
  23. In which project phase would a risk response plan be activated?
    1. Discovery/concept preparation
    2. Initiation
    3. Planning
    4. Execution
    5. Closing
  24. In a briefing to the CEO, the project team explains that there is a risk that the company's two biggest competitors might merge. The CEO asks about the likelihood that this will happen. What exactly is she asking for?
    1. A probability and impact matrix
    2. The risk impact
    3. The risk probability
    4. The risk register
  25. Wigit Construction has completed the risk assessment and cost estimating activities. For certain risks, they have set aside money to cover the costs resulting from possible adverse effects on the project. What are these funds referred to as?
    1. Contingency reserve
    2. Ready reserve
    3. Resource reserve
    4. Management reserve
  26. What are the two forms of acceptance when considering risk response strategies?
    1. Passive
    2. Deliberate
    3. Unintentional
    4. Active
  27. Management for Wigit Construction is concerned with understanding what the negative or positive impacts potential future events might have on a project. What is the management team asking about?
    1. Contingency planning
    2. MOU
    3. Risk
    4. Issues
  28. Every project faces the following potential risks EXCEPT:
    1. Quality defects
    2. Not staying on budget
    3. Scope creep
    4. Project not finishing on time
  29. Which of the following is a tool or technique used in identifying risks to a project?
    1. RASI
    2. SWOT
    3. RACI
    4. COQ
  30. When a change is being considered, the change control board wants to know how the changes can be reversed if needed. What is this called?
    1. Requirements change
    2. Validation
    3. Version control
    4. Regression plan
  31. What is the risk response strategy that attempts to minimize the impact or the probability of a negative risk known as?
    1. Avoid
    2. Transfer
    3. Mitigate
    4. Accept
  32. WigitCom and DewDrops have entered into a partnership to complete a project. Wigitcom wants to ensure that their trade secrets are not revealed or used by DewDrops. What type of agreement should the two organizations use?
    1. RFP
    2. NDA
    3. SLA
    4. MOU
  33. WigitCom is working on a cutover to a new phone system for an agency with a security component. During the planned outage, a problem is discovered that cannot be solved immediately. What should the project team do?
    1. Continue to implement the change.
    2. Implement the regression plan and reverse the changes.
    3. Evaluate the impact and justification of an extended outage.
    4. Identify and document the change.
  34. At the completion of a government project requiring security clearance, what document would a vendor likely be asked to sign?
    1. Service-level agreement
    2. Warranty
    3. Request for proposal
    4. Nondisclosure agreement
  35. Which of the following roles should be included in the identification of risk on a project?
    1. Subject matter experts (SMEs)
    2. Core team members
    3. Stakeholders
    4. All of the above
    5. Both B and C
  36. WigitCom is working on a revolutionary new technology that will potentially alter the entire industry. At an industry conference, a project team member is asked what the team is working on. The employee doesn't share any project details. What is most likely the cause of the employee refusing to share information?
    1. Criticality factors
    2. Cultural differences
    3. Confidentiality constraints
    4. Intraorganizational differences
  37. A government agency has two different business units that have a fleet of trash trucks to pick up garbage. To help save money, the agency decides to move the garbage collection function to a single agency and sell the trash trucks of the other agency. What type of business change is this?
    1. Business process change
    2. Outsourcing
    3. Internal reorganization
    4. Staff turnover
  38. Which of the following is not true regarding environmental, social, and governance (ESG) factors?
    1. It is imperative the project manager understands ESG as it relates to the project so that regulations, standards, and guidelines are followed.
    2. Awareness of applicable regulations and standards is an ESG factor.
    3. PII is an ESG factor that relates to the social factor.
    4. Project impact to company brand value is an ESG factor.
  39. WigitCom is constructing a new mobile ridesharing app. Users of the service will be required to share their location data to sign up for a ride. Which of the following ESG factors would the company need to consider for this project?
    1. National and local privacy laws and regulations
    2. Choosing waterfall versus an Agile approach
    3. Mitigating risk factors
    4. Critical path activities impacting project planning
  40. DewDrops is the parent company for SunRays, Inc. and DaisyChains. SunRays and DaisyChains agree to provide services to each other and outline specific performance expectations acceptable to the parent company. Which ESG factors would impact the SunRays and DaisyChains projects?
    1. Submitting to audits and inspections
    2. DewDrops data security access policy
    3. DewDrops's mission, vision, and values
    4. Risk tolerance for each of the three companies
  41. What does PII stand for?
    1. Professional infrastructure information
    2. Personally identifiable information
    3. Professional identifiable information
    4. Personal infrastructure information
  42. DewDrops has established a project team in another country. Several stakeholders are irritated because of the difficulty in getting approvals to begin work from the provincial government. This is an example of what kind of ESG factor impacting the project?
    1. Project impact to the local and global environment
    2. Awareness of applicable regulations and standards
    3. Awareness of company vision, mission statements, and values
    4. Project impact to company brand value
  43. What does PHI stand for?
    1. Personal health information
    2. Professional health initiative
    3. Protected health information
    4. Personal health initiative
  44. A new U.S. state law gives customers the ability to request what data a company is storing about their users and how the company is using this information. A global company is having to adjust their product design to conform with this requirement. Which ESG factor is the cause for the project to change in this manner?
    1. Project impact to the local and global environment
    2. Awareness of applicable regulations and standards
    3. Awareness of company vision, mission statements, and values
    4. Project impact to company brand value
  45. Which of the following data sources are considered SPII? (Choose two.)
    1. City
    2. Driver's license number
    3. First name
    4. Social Security number (SSN)
    5. Political party
  46. We Are Here for You! has done work for DewDrops in the past, and has begun to advertise and market that DewDrops is a current project client without DewDrops's consent. What ESG factor might cause DewDrops to issue a cease and desist letter to We Are Here for You! to correct this behavior?
    1. Project impact to the local and global environment
    2. Awareness of applicable regulations and standards
    3. Awareness of company vision, mission statements, and values
    4. Project impact to company brand value
  47. A project manager is assembling a team for a medical company that looks for the highest standards in ethical behavior. The manager is excited by a candidate's skills, attitude, and experience, but a background check reveals the candidate misrepresented their education and work experience. Which ESG factor likely influenced the decision to move away from this candidate?
    1. Project impact to the local and global environment
    2. Awareness of applicable regulations and standards
    3. Awareness of company vision, mission statements, and values
    4. Project impact to company brand value
  48. Which of the following is not true regarding ESG?
    1. PII is an ESG factor that relates to the social factor.
    2. It's imperative the project manager understands ESG as it relates to the project so that regulations, standards, and guidelines are followed.
    3. Awareness of applicable regulations and standards is an ESG factor.
    4. S in ESG stands for social.
    5. Project impact to company brand value is an ESG factor.
  49. DewDrops is growing rapidly. The company's leadership wants to install a system that will allow customers to interact with the company to learn more about the company's products and to obtain support. What kind of a system are they considering?
    1. JAD
    2. ERP
    3. CRM
    4. SAFe
  50. The risk response strategy that focuses on shifting the liability for a negative risk to a third party is known as which one of the following?
    1. Avoid
    2. Transfer
    3. Mitigate
    4. Accept
  51. Risk planning includes all the following activities EXCEPT:
    1. Measuring the SPI and CPI
    2. Analyzing the potential impacts of each risk
    3. Identifying all potential risks to the project
    4. Creating a response to each risk
  52. In which phase of a project would you keep an eye on risks to see if any immediate action should be taken?
    1. Discovery/concept preparation
    2. Initiation
    3. Planning
    4. Execution
    5. Closing
  53. All of the following are response strategies to positive risks EXCEPT:
    1. Mitigate
    2. Exploit
    3. Share
    4. Enhance
  54. All of the following are strategies to deal with negative risks EXCEPT:
    1. Register
    2. Avoid
    3. Mitigate
    4. Accept
  55. With a forecast for a worse than average hurricane season, a construction company is aware that certain material costs could rise if a hurricane makes landfall. They begin daily monitoring of the National Weather Service and start actively tracking any tropical storm as they form so they can quickly act to purchase materials in case a hurricane becomes a legitimate threat. What type of risk response strategy is this?
    1. Mitigate
    2. Transfer
    3. Share
    4. Enhance
  56. Katie is a project manager whose last performance review just barely met the core standards of the organization. Which of the following choices would most accurately express Katie's risk tolerance?
    1. Risk avoider
    2. Risk decider
    3. Risk taker
    4. Risk observer
  57. Karen is a superstar for a company who has had several stellar performance reviews in a row. Which choice would most accurately express Karen's risk tolerance?
    1. Risk avoider
    2. Risk observer
    3. Risk decider
    4. Risk taker
  58. The project team has done an in-depth root cause analysis as to why certain risks might happen. The impact of these risks would lead to positive outcomes. What type of strategy is this project employing?
    1. Accept, negative risk strategy
    2. Exploit, positive risk strategy
    3. Enhance, positive risk strategy
    4. Transfer, negative risk strategy
  59. All of the following would be updates to the risk register following a qualitative risk analysis EXCEPT:
    1. Causes of risks
    2. Watch list of low-priority risks
    3. Risks requiring near-term responses
    4. Numerical evaluation of each risk
  60. The process of determining what impact identified risks will have on project objectives and the probability that they will occur is called what?
    1. Qualitative risk analysis
    2. Identify risk
    3. Quantitative risk analysis
    4. Risk categorization
  61. There is a section of the project management plan that contains elements of risk, including the project methodology, roles and responsibilities, stakeholder tolerances, and categories. What is this called?
    1. Risk register
    2. Risk matrix
    3. Risk response plan
    4. Risk management plan
  62. Which of the following are risk response strategies? (Choose two.)
    1. Avoidance
    2. Assumptions
    3. Acceptance
    4. Analysis
    5. Actual cost
  63. DewDrops is working on building the project team, and it is attempting to conduct interviews with company employees located in a different city. Their company practice is to interview candidates in person, but they attempted to conduct video interviews instead due to global travel restrictions related to the ongoing pandemic. What ESG factors influenced this change in direction?
    1. Project impact to the local and global environment
    2. Awareness of applicable regulations and standards
    3. Awareness of company vision, mission statements, and values
    4. Project impact to company brand value
  64. A company has a large datacenter with nearly a thousand servers and a host of enterprise applications. To align with the company's mission statement, there is a project to move away from high datacenter costs while keeping operational consistency. Which cloud environment should be pursued?
    1. PaaS
    2. IaaS
    3. XaaS
    4. SaaS
  65. What is the purpose of a data warehouse?
    1. To bring various data sources together for the purpose of analysis and decision-making
    2. To separate the data's physical location from other applications
    3. To handle extremely large data environments
    4. To bring all the company's unstructured data together in a central location
  66. WigitCom needs a third party to handle hardware and software tools for the application development team to complete a project. Which cloud model should the project team look to use?
    1. SaaS
    2. IaaS
    3. XaaS
    4. PaaS
  67. What are some disadvantages of using a platform as a service (PaaS)? (Choose three.)
    1. Increased pricing at large scales
    2. More effective application development
    3. Lack of operational features
    4. Reduced control
    5. Public, private and hybrid options
    6. Greater product visibility
  68. All of the following are advantages of using a PaaS EXCEPT:
    1. Reduced complexity
    2. Reduced control
    3. Self-ramping up or down of infrastructure
    4. Easier maintenance and enhancement of applications
  69. What is a cloud model that offers essential compute, storage, and networking resources on demand using a pay-as-you-go model?
    1. IaaS
    2. PaaS
    3. XaaS
    4. SaaS
  70. Which system would be used to help enforce document retention requirements for an IT project's documentation, including project plans and deliverables?
    1. Data warehouse
    2. Enterprise resource planning (ERP)
    3. Customer relationship management (CRM)
    4. Content management system (CMS)
  71. All of the following would be considered drivers of adopting a SaaS application EXCEPT:
    1. Decrease the need to update and maintain traditional client-server applications.
    2. Standardization of the HTTPS protocol providing lightweight security.
    3. Reduced costs of developing new software services.
    4. Organization is forced to remain current as the hosting company updates features.
  72. What is a software application that manages back-office activities such as accounting, human resources, supply chain, operations, and procurement called?
    1. Enterprise resource planning (ERP)
    2. Customer relationship management (CRM)
    3. Content management system (CMS)
    4. Database management system (DBMS)
  73. Which software platform would a company use to easily track all communications and nurture the experience people have with their products and services?
    1. Enterprise resource planning (ERP)
    2. Customer relationship management (CRM)
    3. Content management system (CMS)
    4. Database management system (DBMS)
  74. A transit company is looking to set up an application where riders can get from one location to another using a software application to coordinate all the legs of their journey. Which of the following identifies what type of model this is?
    1. IaaS
    2. PaaS
    3. XaaS
    4. SaaS
  75. In a multitiered architecture, in which tier does the user interact with the system?
    1. Presentation
    2. Processing
    3. Data
    4. Application
  76. What does MFA stand for?
    1. Multifactor architecture
    2. Multifactor authentication
    3. Mid-tier form architecture
    4. Middle factor authentication
  77. Kaysie is applying for a job working on a passenger space flight project for a government agency. To help confirm her employment, what steps might be required for Kaysie to be hired as the project manager? (Choose two).
    1. Background screening
    2. Branding restrictions
    3. Service-level agreement
    4. Clearance requirements
  78. Desiree has pulled into the parking lot at work and is approaching a door where she must scan her badge to gain entrance into the building. Which security concept does this action represent?
    1. Facility access
    2. Background screening
    3. Multifactor authentication
    4. Removable media considerations
  79. When determining if a project team can view privileged information, which three elements must the team member possess to be allowed to view the information? (Choose three.)
    1. Personally identifiable information (PII)
    2. A need to know the information
    3. Security clearance
    4. Protected health information (PHI)
    5. Access to the information
    6. Industry specific compliance
  80. A project is working on a new industry changing technology. To help protect this information, they mark this information as confidential and lock up all key documents and files when there is no one in the room. Why are these documents marked as confidential?
    1. To project national security
    2. To protect trade secrets
    3. To coverup wrongdoing
    4. To identify removable media considerations
  81. DewDrops Medical has made a breakthrough in anxiety treatment with the development of a new medication. What is the best way for the company to protect their intellectual property?
    1. File for a patent.
    2. File for a trademark.
    3. File for a copyright.
    4. File for multifactor authentication.
  82. We Are Here for You! temp agency has hired a firm to create a catchy new jingle that will help customers remember the name and purpose of the company when the company advertises. When they complete the song, what is the best way for the company to protect their intellectual property?
    1. File for a patent.
    2. File for a trademark.
    3. File for a copyright.
    4. File for multifactor authentication.
  83. A project team has created an awesome logo for the new product they are creating that identifies the unique device customers can buy. What is the best way to protect their intellectual property?
    1. File for a patent.
    2. File for a trademark.
    3. File for a copyright.
    4. File for multifactor authentication.
  84. A project team is working for a national department of defense in the creation of new technology to assist medical teams on the battlefield. What is the best answer on why this information might be classified?
    1. To protect intellectual property
    2. To protect national security information
    3. To protect trade secrets
    4. To establish background screening requirements
  85. A project team working on an industry changing technology has a computer policy preventing USB drives from being accessed from the project team's computers. What type of physical security does this policy represent?
    1. Data classification
    2. Multifactor authentication
    3. Mobile device considerations
    4. Removable media considerations
  86. What are all the reasons a company may lock down the use of removable media on the corporate network? (Choose two.)
    1. To prevent malware and virus
    2. To make users work experience harder
    3. To prevent loss of protected data
    4. To comply with the company's mission, vision, and value
  87. Which law established protected health information and the rules governing its release?
    1. OSHA
    2. HIPPA
    3. DoCRA
    4. PgMP
  88. Which of the following would not be considered personally identifiable information?
    1. Name
    2. Social Security number
    3. Date of birth
    4. Census data
  89. What is the process used to document, identify, and authorize changes in an IT environment?
    1. Organizational change management
    2. Executive oversight
    3. Change control
    4. Promote to production
  90. The project team is ready to make a change to a web application already in use by an organization. Which artifact should the project manager refer to in rolling out the changes?
    1. Downtime/maintenance window schedules
    2. Customer notifications
    3. Tiered architecture
    4. Data warehouse
  91. The project team has been asked to identify what actions will be taken if a given IT change has a problem or causes a nonrepairable outage. What has the project team been asked to create?
    1. Automate tests
    2. Risk assessment
    3. Rollback plan
    4. Validation checks
  92. David is the IT change manager supporting a large energy company. In support of an upcoming project change, he has established emails to be sent two weeks in advance, a week in advance and the day of the changes so users can expect an outage and a new layout when the service comes back online. What is David working on?
    1. Rollback plan
    2. Notifications
    3. Validation checks
    4. Maintenance windows
  93. Jarred is a virtualization engineer on a project that is rolling out a configuration change to the whole server farm. After the change, he runs a script that checks to make sure all servers are back online and that their applications are running. What part of the change control process did he perform?
    1. Check downtime schedule.
    2. Execute a rollback plan.
    3. Execute validation checks.
    4. Send customer notifications.
  94. While on a project, Jen has been asked to make a change to an e-commerce application responsible for 90 percent of the organization's revenue. She starts to analyze how long the change might take, what security vulnerabilities exist, and what downstream processes might be impacted by the change. What part of the change control process is Jen performing?
    1. Risk assessment
    2. Automated testing
    3. Release management
    4. Promote to production
  95. The project team is setting up an application that will record all the steps in a timekeeping process. They can then run the steps whenever the team updates the software code. What did the project team set up?
    1. Rollback plan
    2. Automated testing
    3. Manual testing
    4. Risk assessment
  96. The project team is doing all their work in a development environment. They move any changes to a testing environment for validation before they promote the code to production. What operational change control process concept does this represent?
    1. Automate testing
    2. Manual testing
    3. Tiered architecture
    4. Enterprise architecture
  97. Eva has completed the software upgrade related to a project-required change. She calls Wally and asks him to verify the changes by logging in and entering a record to confirm the application is working. What is she asking Wally to do?
    1. Automated testing
    2. Manual testing
    3. Risk assessment
    4. Requirements definition
  98. The project team has been asked to add some additional functionality to an existing application. A business analyst sits down with the stakeholders to be walked through what the application needs to do, how it needs to look, and what other applications or reports the data needs to be shared with. What part of the change control process is the business analyst performing?
    1. Requirements definition
    2. Customer notifications
    3. Release management
    4. Rollback planning
  99. Denise is part of a change control meeting where she presents her proposed change, the timing and communication to stakeholders, and her rollback plan. She gets a green light to proceed. What was Denise seeking during the meeting?
    1. Nothing, this was purely information.
    2. Clarification of the maintenance window.
    3. Approval of the change.
    4. Validation of the change.
  100. One project team member has been placed on a performance improvement plan while assigned to a project. The rest of the project team is upset because they do not see management correcting any of this team member's behaviors. What is causing this misunderstanding?
    1. Cultural difference
    2. Confidentiality constraints
    3. Rapport building
    4. Criticality factors
  101. Which of the following is an example of linkable data becoming SPII?
    1. When the link connects an individual's name to a corporate website
    2. When an individual is shown to live within a specific zip code
    3. When the computer IP address is shown
    4. When an individual's name is linked to their Social Security number
  102. A medical laboratory has a secure door that can only be accessed through a retinal scan and by scanning an authorized badge. What security concept is being enacted in this scenario?
    1. Branding restrictions
    2. Scrum retrospective
    3. Legal and regulatory impacts
    4. Facility access
  103. Wigit Construction has focused on implementing sustainable practices into its processes and has been hired to build a new bridge over a rail line and a wildlife open space. The triple constraints would imply that the project manager work with time, budget, and scope as it relates to quality in getting this project done. What two aspects of sustainable practices should also govern the project manager's approach to completing this project? (Choose two.)
    1. Ensure pollution prevention in the construction to preserve the wildlife habitat.
    2. Create a fund to help convince local decision-makers to waive environmental regulations.
    3. Create a task force to ensure property rights for the rail line and the wildlife habitat are maintained.
    4. Maintain speed of completion as the most important factor even if crews must work long hours for weeks on end.
  104. Time, budget, and scope are considered the triple constraints to tactical project management. What are the three factors that influence sustainable project management from a strategic context?
    1. Environmentally sound, viral social media, economically viable
    2. Economically viable, on time, on budget
    3. Environmentally sound, socially responsible, economically viable
    4. Economically viable, environmentally sound, return on investment
  105. Which authentication method requires the user to provide two or more pieces of verification evidence to log into your account?
    1. Certificate-based authentication
    2. Token-based authentication
    3. Multifactor authentication
    4. Biometric authentication
  106. For a sustainable-driven company, which of the following is not an area to be evaluated when planning the procurement activities of a project?
    1. Suppliers' past performance or reputation
    2. Unique local requirements of the supplier or project site
    3. Focus on lowest bidder to control costs
    4. The sustainable goals of the provider
  107. Risk management focuses on identifying all the positive and negative events that might impact the success of a project or activity. Which of the following would be considered a nontechnical risk?
    1. Project budget is lacking to complete the project.
    2. Local regulations require 30 percent of the project team to live within the country.
    3. The speed to market of the product will determine the market winner.
    4. The time to complete the project is insufficient for the requirements requested.
  108. WigitCom has a project to open a store in a new country in which it has never done business before. This new country has laws called the consumer bill of rights, which outline a company's responsibility to collecting private data as well as a consumer's ability to see and/or restrict the collection of this data. Which ESG factor would influence WigitCom's project activities?
    1. Project impact to the local and global environment
    2. Awareness of appliable regulations and standards
    3. Awareness of company vision, mission statements, and values
    4. Project impact to company brand value
  109. In May 2018, Europe enacted the GDPR with widespread implications to privacy and the treatment of data. What does GDPR stand for?
    1. Greater Data Privacy and Remediation
    2. General Data Protection Regulation
    3. Greater Discovery for Protecting Remote Access
    4. General Data Privacy Regulation
  110. The Payment Card Industry Data Security Standards (PCI DSS) address the handling and management of payment card data. This act covers all aspects of payment card data handling, including acquiring, transmitting, storing, and processing these data. What is the PCI DSS an example of?
    1. Industry-specific compliance
    2. Personally identifiable information
    3. Regulatory impacts
    4. Country-specific privacy stipulation
  111. The Sarbanes–Oxley Act is a 2002 U.S. law and was enacted to protect against fraudulent financial transactions by corporations. Sarbanes–Oxley would be an example of which compliance consideration?
    1. Industry-specific compliance
    2. Protected health information
    3. Country-specific compliance regulation
    4. National security information
  112. Deploying a new information system into production while failing to safeguard security and privacy would have all of these inherent risks EXCEPT:
    1. Disclosure of information
    2. Unauthorized access to systems and information
    3. Failing a project gate review
    4. Breach of legal requirements
  113. All of the following are used in an Agile approach to project management EXCEPT:
    1. Burndown charts
    2. WBS
    3. Continuous requirements gathering
    4. Sprint planning
  114. Which information security concept addresses where and how your data is stored?
    1. Digital security
    2. Physical security
    3. Network and system security
    4. Application security
  115. Sam has been assigned to work remotely in the United States on a project in South America. Why might Sam have to take additional precautions to store data beyond his company's ordinary data practices?
    1. To enhance the brand value to the company brought on by the project
    2. To protect national security information since data is flowing internationally
    3. To align to local security laws governing where and how to store data
    4. To take advantage of a new data warehouse being constructed
  116. Which of the following are examples of physical security considerations? (Choose three.)
    1. Network uptime and availability
    2. Smoke and fire alarms
    3. Access control systems
    4. User authentication
    5. Risk management polices
    6. Data backups
  117. Which of the following is not an area of application security?
    1. Data backup and availability
    2. Data sharing and role-based access control
    3. Project management software data encryption
    4. User authentication
  118. Which of the following is both a serious risk management issue and a compliance/legal matter?
    1. Branding restrictions
    2. Anything as a service
    3. Data security classification
    4. Data privacy
  119. The commitment to keep a person's or organization's information private and protect unauthorized disclosure of information from being disclosed is known as which of the following?
    1. Confidentiality
    2. Security clearance
    3. Privacy
    4. Data sensitivity
  120. Which project management tool helps determine whether a system, process, or program involving personal information raises privacy risks?
    1. Multitiered architecture
    2. Privacy impact assessment
    3. Service-level agreement
    4. Backlog prioritization
  121. Crystal has applied for a job supporting a national space program and has been asked to complete documentation that will allow a thorough review of her trustworthiness to work on the project. Which information security concept is in play for this applicant?
    1. Clearance requirements
    2. Facility access
    3. Background screening
    4. Access on a need-to-know basis
  122. What is the purpose of establishing security clearances for project team members?
    1. Democratize data to even the playing field for all.
    2. Create needed overhead to keep people employed.
    3. Allow vetted individuals access to restricted information.
    4. Protect the team members' personally identifiable information.
  123. Project team members are required to get a badge that opens electronic locks for access to where a new product is being created. Which type of security access does this represent?
    1. Physical security
    2. Operational security
    3. Digital security
    4. Application security
  124. A project has developed a new political polling application to help in an upcoming election. The application was originally developed for a single state's use, but now there seems to be a market for the application across the country. Which of the following is not one of the actions the project team should take next?
    1. Assess legal and regulatory impacts for a national rollout
    2. Identify country- and state-specific privacy regulations
    3. Enable multifactor authentication for project team members
    4. Conduct a privacy impact assessment
  125. WigitCom's project manager is ready for the team to promote new code to production. In talking with the business, they decide the third Sunday between 8 p.m. and 11 p.m. would be the most ideal as business is the slowest during that time. What did the project manager and business just negotiate?
    1. Promote to production plan
    2. Automated testing
    3. Customer notifications
    4. Maintenance window
  126. Which of the following are reasons to build sustainability into project management practices?
    1. Reduces resource turnover
    2. Reduces project crisis situations
    3. Minimizes project cancellations and interruptions
    4. Creates a competitive advantage
    5. All of the above
    6. None of the above
  127. A project is underway to expand service to a new country. This new country has laws called the consumer bill of rights governing the collection of private data as well as a consumer's ability to see and/or restrict the collection of this data. Since the project team is part of a global company, would they have to adhere to these regulations?
    1. No, as a global company they need to manage their service to the global need and not the local company.
    2. No, the company was not doing business when the law was passed.
    3. Yes, to avoid fines or a loss of the ability to do business in country, they must conform to the law.
    4. Yes, as a gesture of goodwill, the company should start out following the law and then use their leverage later to avoid compliance.
  128. A project manager is working on a new ride share system in the United States. The project manager is aware of the GDPR law that was passed in Europe. Although the project is based in the United States, why might the project manager need to adhere to the GDPR?
    1. They would not; the laws of the United States are the only ones that matter.
    2. For ease of scalability, in case the application is ever moved to Europe.
    3. They would not, since the application would never be used in Europe.
    4. When data on European citizens is stored, companies must abide by the GDPR.
  129. Why might a company consider choosing to integrate sustainability concepts into their project management practices?
    1. Organizations want to assume the responsibility for the societal impacts of their products and services.
    2. Organizations want to avoid the risk associated with their products and services.
    3. Organizations want their customers to assume responsibility for the societal impacts of their products and services.
    4. Organizations do not want to integrate sustainability into their projects because it is bad for the bottom line.
  130. What is the “triple bottom line” in creating sustainability in project management?
    1. Balance between time, money, and scope as it pertains to quality
    2. Harmony between time, scope, and economic sustainability
    3. Balance between social sustainability, environmental sustainability, and scope as it pertains to quality
    4. Harmony between economic, social, and environment sustainability
  131. Where should the identification of relevant environmental and social risks and impacts be recorded?
    1. They are not recorded as part of a project.
    2. They are recorded in the risk register.
    3. They are recorded in the meeting minutes.
    4. They are recorded in the issue log.
  132. Which ESG factor shows up as a criterion for deciding whether to take on a project and how to execute that project?
    1. Environmental
    2. Social
    3. Governance
    4. None of the above
  133. Which ESG factor considers the relationships among stakeholders who take part in or are influenced by a project?
    1. Environmental
    2. Social
    3. Governance
    4. None of the above
  134. Which ESG factor directs the way a project will be led as well as the regulations and standards that may dictate how the project will unfold and what processes must be followed?
    1. Environmental
    2. Social
    3. Governance
    4. None of the above
  135. Which of the following are reasons to build sustainability into project management practices?
    1. Increases resource turnover
    2. Maximizes project crisis situations
    3. Ensures project cancellations and interruptions
    4. Creates a competitive advantage
    5. All of the above
    6. None of the above
  136. Which ESG factor is most likely to get overlooked in project planning and execution?
    1. Environmental
    2. Social
    3. Governance
    4. All of the above
    5. None of the above
  137. Questions such as “Will the customer experience service be disrupted?,” “Will the project team be expected to work extended hours?,” and “How will a new organizational structure affect diversity?” are related to which ESG factor?
    1. Environmental
    2. Social
    3. Governance
    4. Organizational
  138. WigitCom planned a project to decommission a datacenter but failed to consider how to properly dispose of retired servers, monitors, and network gear. The original plan had an activity to select the lowest bidder for the disposal, but a local regulation requires this type of equipment be disposed of through a certified electronics recycler. Which two ESG factors contributed to this project change? (Choose two.)
    1. Environmental
    2. Social
    3. Governance
    4. Organizational
  139. Which of the following would be potential project impacts regarding governance? (Choose two.)
    1. Pollution of the local environment's water supply and landfills
    2. Project delays due to failing to consider regulatory requirements on the project schedule
    3. Rework due to failing to meet standards related to personal data
    4. Project team members not being appropriately compensated for overtime
  140. For a sustainable-driven company, which of the following is not an area to be evaluated when planning the procurement activities of a project?
    1. Suppliers' past performance or reputation
    2. Unique local requirements of the supplier or project site
    3. Ability to comply with industry standards such as HIPPA or PCI
    4. The ability to adhere to meet time deadlines over all other requirements
  141. DewDrops just launched a new vision to be the model for sustainable practices in their industry. A project is nearing completion when this new mission was announced through a press release. What steps, if any, should the project team take to account for this change in vision?
    1. Do nothing; stakeholders will understand the project was almost complete when this was announced.
    2. Put a warning on their product that the product will likely change in the future because of this announcement.
    3. Perform a sustainability impact assessment to see if there are deliverables that need to be changed and update the project plan if so.
    4. Move forward “as is” and incorporate the new philosophy into future projects.
  142. The CEO of a large corporation has asked to be granted access to all digital files for a new project. Why might the CEO be denied this request despite being the highest-ranking individual in the organization?
    1. Does not have clearance.
    2. Does not have access.
    3. Does not have a need to know.
    4. This request should always be granted.
  143. A software development project has changed project managers from Ellen to Michelle. Using the principle of least privilege, which level of access should Michelle be given to look at the project data?
    1. Michelle should be granted the same access as Ellen.
    2. Michelle should only be granted high-level access to data until she has been on the project longer.
    3. Michelle does not need access granted to her to perform her duties on the project.
    4. Michelle should be granted access to all information in the organization.
  144. A project manager has asked for a legal review of a contract before it is awarded. The email the project manager receives from the legal team includes language stating “This correspondence represents privileged and confidential communication between a client and their attorney.” What type of data security protocol does this warning provide?
    1. Multifactor authentication
    2. Access on a need-to-know basis
    3. Data classification
    4. Background screening
  145. Anvay is part of the IT security team and has been asked to grant permissions for a new employee to see the engineering team's file share. What step should Anvay take prior to performing this task?
    1. Grant the access immediately.
    2. Check the business justification and compare to established security protocols.
    3. Do not grant the access.
    4. Grant the access after an established waiting period.
  146. A project team member is being terminated from a project involved with the development of intellectual property effective immediately. What is the appropriate course of action for the project manager?
    1. Brief the terminated employee on brand restrictions.
    2. Perform a background screening and check clearance requirements.
    3. Immediately revoke the terminated employee's permissions.
    4. Wait for guidance from human resources before doing anything.
  147. A list of steps undertaken to undo a release and restore a system to its original state is known as what?
    1. Risk assessment
    2. Anything as a service
    3. Continuous integration process
    4. Rollback plan
  148. Which form of quality assurance for a software release would include team members following a checklist and performing actions such as data entry, validating functionality, and viewing reports?
    1. Automated testing
    2. Turing testing
    3. User acceptance testing
    4. Manual testing
  149. A system needs to be taken offline for maintenance to be performed. The project manager reviews the RACI chart and finds the dispatch center has to be informed about the outage. What change control step should the project manager take?
    1. Perform a risk assessment.
    2. Send customer notifications.
    3. Perform software validation checks.
    4. Release the software.
  150. A company has gone through a rapid growth cycle and now has several one-off systems for activities like the company's finances, supply, and human resources. The leaders of the company want to have a system that brings these activities together. What kind of system would meet these needs?
    1. CRM
    2. LAN
    3. ERP
    4. XaaS
  151. WigitCom has incorporated a sustainable focus into their project to build a new videoconferencing platform. Which of the following is not one of the elements the project manager would need to consider when adopting a more sustainable approach?
    1. Work-line balance of the project team to reduce burnout
    2. Limiting unnecessary travel of the project team to reduce emissions
    3. Creating a compensation model to get the most affordable project team
    4. Creating equitable hiring practices to support innovation and social inclusion
  152. WigitCom has built a new application to allow customers to share their homes to guests who want to use the home for their vacation. They are excited for the opportunities this new software will provide to the property owners and renters alike. Which laws would make the most sense to design against from the inception of the project?
    1. GDPR
    2. HIPP-A
    3. PMBOK®
    4. PRINCE2
  153. Trevor is the project manager over a civil engineering project, and one of the risks of the project has the potential for a sinkhole in the area where a road is supposed to be built. The project team reports that a sinkhole did in fact form in this area. Which two items are true about this event? (Choose two.)
    1. The risk has now become an issue.
    2. The project team accepted this risk.
    3. The risk trigger has happened, calling for a response.
    4. This needs to go through the change control process.
  154. The project team is trying to update a software application that exists on a single-server environment. This is complicated testing, development, quality assurance, and training. What type of solution could they recommend to help the development of this application?
    1. Automated testing
    2. Requirements definition
    3. Tiered architecture
    4. Continuous deployment process
  155. WigitCom has a problem on an e-commerce website that is causing an outage resulting in a million dollars of lost revenue every hour. In which environment should changes be made?
    1. Testing
    2. Production
    3. Quality assurance
    4. Development
  156. In IT service management, what is the standard traditionally used for change control methods guiding the entire IT life cycle?
    1. Information Technology Infrastructure Library (ITIL)
    2. Project Management Body of Knowledge (PMBOK®)
    3. Business Analysis Body of Knowledge (BABOK)
    4. Awareness Desire Knowledge Ability Reinforcement (ADKAR)
  157. Which type of change management focuses on service transitions such as moving from one vendor to another or getting all your departments on board with a new ERP platform?
    1. Organizational change management
    2. On-premises change control
    3. Cloud change control
    4. Shift change management
  158. Which change control method is divided into areas of focus such as business model, governance, and the use of a platform?
    1. Organizational change management
    2. On-premises change control
    3. Cloud change control
    4. Shift change management
  159. All of the following are challenges with cloud change management EXCEPT:
    1. Siloed communications
    2. Restricted approval process
    3. Rapid approval process
    4. Legacy business processes lacking agility
  160. Which change control approach needs to facilitate faster change processes?
    1. Organizational change management
    2. On-premises change control
    3. Cloud change control
    4. Shift change management
  161. Which change control approach typically needs abundant planning for capacity upgrades and other infrastructure changes?
    1. Organizational change management
    2. On-premises change control
    3. Cloud change control
    4. Shift change management
  162. Which change management philosophy is focused on the adoption of new business process, tools, and support models?
    1. Organizational change management
    2. On-premises change control
    3. Cloud change control
    4. Shift change management
  163. Which process refers to the planning, design, scheduling, testing, and deploying of new applications or upgrades?
    1. Cloud change control
    2. Incident or problem management
    3. On-premises change control
    4. Software release control
  164. Which type of management is primarily concerned with how changes flow through preproduction environments?
    1. Problem management
    2. Release management
    3. Change management
    4. Project management
  165. Wigit Construction has been tasked with repaving a bridge that is a major thoroughfare for a large metropolitan community. They are allowed to shut down traffic from midnight until five in the morning for two weeks straight. What would this five-hour block be called in operational change control terms?
    1. Release management
    2. Validation check
    3. Work breakdown structure
    4. Maintenance window
  166. Kayla has been working during an outage to upgrade a production database to its most current version. The upgrade is behind schedule, and she has three hours of work to complete in the next 45 minutes. What change control process should she execute?
    1. Perform validation checks.
    2. Initiate the rollback plan.
    3. Start automated testing.
    4. Modify the downtime window.
  167. The build and unit testing stages of a software release process where every version committed triggers an automated build and test is known as which of the following?
    1. Cloud change control
    2. Anything as a service
    3. Continuous integration/continuous deployment process
    4. Tier architecture/promote to production process
  168. What is a development process where programmers commit code to repositories frequently and ideally several times a day known as?
    1. Continuous integration
    2. Software release management
    3. Software as a service
    4. Enterprise resource planning
  169. The collection of hardware and software that determines how fast computations can be made, when systems are connected, and what storage is available is known as which of the following?
    1. Infrastructure as a service
    2. Multitiered architecture
    3. Electronic document and record management systems
    4. Computing services
  170. What is the correct definition of storage?
    1. The processing power, memory, networking, and other resources needed for computational success of a program
    2. The process through which digital data is saved and recovered through computer technology
    3. A structured set of data held in a computer with multiple channels for access
    4. A connected set of computers used to exchange data and share resources with each other
  171. What is the definition of a database?
    1. The processing power, memory, networking, and other resources needed for computational success of a program
    2. The process through which digital data is saved and recovered through computer technology
    3. A structured set of data held in a computer with multiple channels for access
    4. A connected set of computers used to exchange data and share resources with each other
  172. In terms of information technology, what is the best way to describe a network?
    1. The processing power, memory, networking, and other resources needed for computational success of a program
    2. The process through which digital data is saved and recovered through computer technology
    3. A structured set of data held in a computer with multiple channels for access
    4. A connected set of computers used to exchange data and share resources with each other
  173. The facilities department has all the blueprints and support plans for the corporate buildings they manage. Which of the following would be the appropriate location to store this information?
    1. Enterprise resource planning (ERP)
    2. Customer relationship management (CRM)
    3. Electronic document and records management system (EDRMS)
    4. Database management system (DBMS)
  174. May has completed her work for the week. She logs into a system to record her time and billing for the week. When she completes that task, she moves to another part of the system to record her expenses for reimbursement purposes. What kind of system is May logged into?
    1. Data warehouse
    2. Customer relationship management
    3. Enterprise resource planning
    4. Content management systems
  175. Max has been assigned as the project manager for a new IT project. She has been assigned an account code to track and report on all budget and spending items related to the project. Which software application does the organization assign and use this code?
    1. Financial systems
    2. Software as a service
    3. Data warehouse
    4. Project management information system
  176. The marketing department of DewDrops has just completed a campaign for a service in a new area. The team wants to share their data and findings with the rest of the company to help other departments and the corporate leadership look for trends and help guide future decision-making. Where should the team upload this information?
    1. Data warehouse
    2. Cloud storage
    3. Print the data and distribute hard copies
    4. To a PaaS provider
  177. Which cloud model is a software licensing and delivery model where software is licensed on a subscription basis and is centrally hosted?
    1. IaaS
    2. PaaS
    3. XaaS
    4. SaaS
  178. What would you call detailed explanations of how to execute a process, method, task, or program that also outlines precise steps needed to successfully complete the item?
    1. Anything as a service
    2. Data warehouse
    3. Documentation
    4. Computing services
  179. Which system would you use to process expense reports, make entries into the general ledger, or process PCard (purchasing card) or POs (purchasing orders)?
    1. Content management systems
    2. Data warehouse
    3. Electronic document and record management systems
    4. Financial systems
  180. Will works taking phone calls from the public dealing with a variety of issues, including billing, adding or ending service, or complaints about service quality. What type of system would Will be using to research the caller's history and find meaningful information related to their account?
    1. Enterprise resource planning (ERP)
    2. Customer relationship management (CRM)
    3. Content management system (CMS)
    4. Database management system (DBMS)
  181. Nancy has been hired on to a project to help manage the social media presence and develop a website communicating the timing and upcoming products and services the project will deliver. Which software should she use to manage the website?
    1. Electronic document and records management system (EDRMS)
    2. Content management system (CMS)
    3. Customer relationship management (CRM)
    4. Enterprise resource planning (ERP)
  182. Software development kits (SDKs), user guides, run books, and product manuals are all examples of which of the following?
    1. Data warehouse
    2. Customer relationship management
    3. Documentation
    4. Content management systems
  183. The project team has been asked to turn over all relevant records regarding the project and to assign the documents a category determining how long to keep the documentations after the project is completed. Where should the project manager look to evaluate which categories should be used?
    1. Organizational retention schedule
    2. Project charter
    3. Project management information systems
    4. Data warehouse
  184. A local government organization has determined the cost of hosting a disaster recovery site is prohibitive and so they are seeking a service provider capable of meeting their recovery time and recovery point objectives. What type of cloud model is this agency looking to use?
    1. Software as a service (SaaS)
    2. Platform as a service (PaaS)
    3. Anything as a service (XaaS)
    4. Infrastructure as a service (IaaS)
  185. With the adoption of the European Union's General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), which organizational business unit becomes a more important stakeholder for projects?
    1. Legal
    2. Public relations
    3. Finance
    4. Information technology
  186. Which privacy consideration law requires integrating specific data protection practices into business offerings as well as adding processes to address data subject requests?
    1. GDPR
    2. CCPS
    3. HIPPA
    4. All of the above
    5. None of the above
  187. Which discipline helps legal departments stay in compliance with emerging laws on an ongoing basis?
    1. Project management
    2. Asset management
    3. Change management
    4. Internal and external audit
  188. All of the following are reasons project management needs to be involved to achieve regulatory compliance EXCEPT:
    1. Regulations change over time.
    2. Data is being collected on an exponential pace.
    3. Laws of other countries do not carry regulatory impact.
    4. New regulations are constantly being enacted.
  189. All of the following are risks of noncompliance of country, state, or province-specific privacy regulations in project management EXCEPT:
    1. Increase in security breaches
    2. Increase in consumer privacy considerations
    3. Loss of productivity
    4. Reputational damage
  190. A steering committee is questioning a proposed budget item in a project budget to ensure compliance with privacy laws. The committee debates the need for this activity to be completed as it carries a high cost. What is the best argument the project manager can make for the investment in compliance?
    1. Compliance is the cost of doing business.
    2. Noncompliance saves the company money and can be struck.
    3. No one will find out if the project does not perform that activity.
    4. Noncompliance costs the company more money.
  191. Which of the following are not risks of failing to comply to regulatory requirements? (Choose two.)
    1. Penalties and fines
    2. Gain a competitive advantage
    3. Compliance litigation
    4. Reputational damage
    5. Restricted access to markets and product delays
    6. Regulated out of business
  192. What is a project manager's responsibility to behave ethically?
    1. Project managers abide by a code of ethics.
    2. It depends on the organization.
    3. Project managers must focus on schedule, budget, and scope above all things.
    4. Ethical behavior does not apply to project management.
  193. Professionals who act in an honest, responsible, and respectful way are exhibiting which type of behavior?
    1. Unethical
    2. Criminal
    3. Ethical
    4. Regulatory
  194. In which project life cycle phase should the regulatory impact assessment process begin?
    1. Discovery/concept preparation
    2. Initiation
    3. Planning
    4. Execution
    5. Closing
  195. All of the following would be considered basics for compliance in project management EXCEPT:
    1. Add compliance activities to the project schedule.
    2. Ensure regulatory management responsibility is assigned.
    3. Monitor changes in regulation.
    4. Manage compliance risk and activities as its own project.
  196. Wigit Construction has been hired to create a new highway road signage system for a large state. They have undertaken this project in other states as well, so they have a solid boilerplate for their project activities. Does a regulatory scan still make sense for this project due to repeatability of successful projects delivered in other states?
    1. No, highway and constructions projects are beholden to national laws and regulations, so compliance is assured.
    2. Yes, state-level regulations may differ, and a regulatory scan will help to illuminate the requirements.
    3. No, highway projects are not concerned with privacy implications as it serves a public good.
    4. Yes, even as a non-value-added activity, the documentation of performing the step will reduce future liability.
  197. In 2015, the U.S. federal government enacted the Program Management Improvement and Accountability Act. What area of compliance is this area focused on?
    1. Privacy
    2. Project management
    3. Financial management
    4. Healthcare
  198. A company utilizing its offshore team has just won a contract to work on replacing a government agency's financial system. The contract stipulates there is personally identifiable information stored in the system and has a service-level agreement enforcing this clause. What steps if any should the project manager take as the project team is built?
    1. Educate the team on the importance of cybersecurity.
    2. Educate the team on the contract clause and their responsibilities.
    3. Educate the team on personally identifiable data and how to handle it.
    4. All of the above.
    5. Only A and C.
  199. Benched resources are when the project has which of the following issues?
    1. Individuals who are finished with the project but have not yet started a new assignment
    2. Individuals who have too much work for them to be able to complete the project
    3. A lack of talent in the industry, which leads to a shortage of qualified personnel on the project
    4. Individuals ordered to the sidelines because of their performance
  200. In which of the following situations would team-building efforts provide the most impact on a project? (Choose three.)
    1. Team discord
    2. Schedule changes
    3. Missed deliverables
    4. Project phase completion
    5. Lessons learned meeting
    6. Change in project manager
  201. Which of the following statements is true regarding a SWOT analysis?
    1. Strengths/weaknesses are external to the organization; opportunities/threats are internal to the organization.
    2. Strengths/weaknesses/opportunities/threats are all external to the organization.
    3. Strengths/weaknesses are internal to the organization; opportunities/threats are external to the organization.
    4. Strengths/weaknesses/opportunities/threats are all internal to the organization.
  202. In the project management context, what does COQ stand for?
    1. Cost of quality
    2. Critical to quality
    3. Cost of quantities
    4. Critical of quantities
  203. Which of the following would you need in the calculation of the risk score? (Choose two.)
    1. SPI
    2. Risk impact
    3. CPI
    4. Risk probability
    5. Risk trigger scores
    6. EAC
  204. What is the critical chain method?
    1. Schedule network analysis technique
    2. Dependency model
    3. Signature path for project charter approval
    4. Earned value method
  205. Harry works for a research and development firm trying to create a revolutionary new product. The likely risk tolerance for the company is which one of the following?
    1. Very high
    2. High
    3. Low
    4. Very low
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset