0% found this document useful (0 votes)
184 views6 pages

PMP Risk

Uploaded by

sitheeq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
184 views6 pages

PMP Risk

Uploaded by

sitheeq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
1. Which knowledge area process attempts both to increase the probability and impact of favourable events and to decrease the likelihood and effect of events that can have adverse consequences on the project ? A. Project Quality Management B. Project Risk Management C. Project Procurement Management D. Project integration Management 2. In the Project Risk Management knowledge area, the initial risk register is produced during the ___ process, ‘A Plan Risk Management B. Identify Risks Perform Qualitative Risk Analysis _D. Perform Quantitative Risk Analysis 3. During which Project Risk Management knowledge area processes can the risk register be updated ? A Plan Risk Management, Identify Risk, and Perform Qualitative Risk Analysis 8. Identify Risk, Perform Qualitative Risk Analysis and Perform Quantitative Risk Analysis C. Perform Qualitative Risk Analysis, Perform Quantitative Risk Analysis, Plan Risk Responses, and Monitor and Control Risks D. Identify Risk, Plan Risk Response. and Monitor and Control Risks 4, Your project used linear values of 0,1, 0.3, 0.5, 0.7 and 0.9 in analyzing the probability and impact of risks, The values correspond to very low, low, moderate, high, and very high, respectively. A project risk with a moderate probability and a high impact will have a risk rating of A.1.20 8.0.71 0.20 0.0.35 5. The Identify Risks process uses several tools and techniques. Which information gathering technique would be most appropriate if you need to work primarily with subject matter experts to identify the project risks ? A. Brainstorming B. Delphi technique —_C. interviewing D. Root cause analysis 6. Your project used linear values of 0.1, 0.3, 0.5, 0.7 and 0.9 in analyzing the probability and impact of risks. From the following list of descriptions, which will most likely be assigned to the values respectively ? A. Moderate, neutral, average, high and void 8. Low, medium, high average, and very low C. Very low, low, moderate, high, and very high D. Very high, high, moderate, low, and very low 7. Using decision tree analysis, you calculated that Project A has an expected monetary value (EMV) of $65,000. In contrast, Project B has an EMV of $75,000. Which project is a better option ? A. Project A, because it has a lower EMV 8. Project 8, because it has a higher EMV C, Neither project, because the difference in EMV is not significant D. Both, in order to maximize the results 8. Given a false decision node with a cost of $-50M with scenario probablities of A (55%, $100M) and B (45%, $25M), what is the EMV for this decision node ? ‘4.0.00 816.25 66.25 0. 75.00 9. Given a false decision node with a cost of $-50M with scenario probabilities of A (55%, $100M) and B (45%, $25M), what are the net path values for A and B, respectively ? A. $27.50M and $-11.25M. B. $50,00M and $-25.00M €.$55.00M and $11.25M —_. $72.50M and $2.50M 10. Which of the following risk response strategies are appropriate for negative risks or threats ? A. Avoid, transfer, and/or mitigate _B. Exploit, share and/or enhance C. Avoid, transfer, and/or recognize 0. Share, enhance, and/or recognize 111. Which risk response strategies are appropriate for positive risks or opportunities ? A. Avoid, transfer, and/or mitigate _B. Exploit, share, and/or enhance C. Avoid, transfer, and/or recognize _D. Share, enhance, and/or recognize 12, Which risk response strategy can be applied to both negative risks (threats) and positive risks (opportunities) ? A.Mitigate B. Exploit —_C. Share D. Accept 13. Which of the following statements best characterizes residual risks and secondary risks ? ‘A. Secondary risks arise if the risk response generated a residual risk that is much larger than the original risk that was identified in the risk register. B, Secondary risks remain after the implementation of planned responses, whereas residual risks arise as a direct outcome of implementing a risk response. C. Residual risks remain after the implementation of planned responses, whereas secondary risks arise as a direct outcome of implementing a risk response. D. Risk response strategies for negative risks or threats generate residual risks, whereas positive risks or opportunities result in secondary risks. 14, In the middle of your project, you noticed that some risks positively and negatively impacted your budget ‘and schedule contingency. What do you need to perform to determine If you have adequate contingency to cover the remaining project risks ? A. Risk reassessment 8. Risk audits C. Variance and trend analysis D, Reserve analysis 15. The following lists contain outputs of the Monitor and Control Risks process except for _ ‘A. Risk register updates and change requests B. Project management plan updates and change requests C. Organizational process assets updates and project management plan updates D. Risk register updates and risk-related contract decisions 16. The previous project manager left you a spreadsheet that summarized uncertain events with the following columns : probability, impact, priority and ownership. You are most likely looking at what type of document ? A. Risk register B. Requested changes C. Recommended corrective actions D. Recommended preventive actions 17. The set of project management activities including identification analysis, planning responses, and monitoring and controlling of risks in the project is part of carrying out A. Risk identification _B. Project risk analysis _C. Project risk management D. Project risk mitigation 18, Most of the project risk management processes are performed as part of which process group A.Closing ——-B.Executing C. Initiating _. Planning 19.The project director advises you that a project should have a balance between risk taking and risk avoidance. This policy is implemented in a project using which of the following ? ‘A.Risk responses —_B, Risk analysis. C. Risk identification _D. Risk classification 20. One of the tools used to manage risk in a project is a table showing the various thresholds for different levels of risks in the project. What is this table called ? A. Risk register 8. Probability and impact matrix C. Issues log D. Impact scales 21, Who is responsible for identifying risks in a new project ? A. Project manager 8. Project sponsor _C. Any project personnel _D. The main stakeholders 22. What is the document that contains a list of identified risks, responses to the risks, the root cause of the risk, the risk category, and additional information about the identified risks called ? A. Risk management plan B. Project issues log C. Risk-related contract decisions _D. Risk register 23, As art of your responsibility for managing risks in your project, you rate risks as low, medium or high. What tool would you typically use to define these ratings ? ‘A. Probability impact matrix 8. Risk register updates . Assumption analysis D. Checklist analysis 24, A new member of your project team suggests that you use a specific technique for quantitative risk analysis. She says that you should calculate information on the lowest, highest and most likely costs of the WBS elements in the project plan. This technique Is an example of 5 ‘A. Three-point estimates for costs _B, Probability and impact assessment C. Probability distributions D. Sensitivity analysis 25. What is the process of project planning that involves developing options, determining actions to enhance ‘opportunities, and reducing threats to project objectives called ? A. Perform qualitative risk analysis 8. Plan risk responses C. Perform quantitative risk analysis. Probability impact matrix 26. You have been given responsibility for developing a risk register for your project. Through which process is. this document created ? A. Plan Risk Responses B. Perform Quantitative Risk Analysis C. Identify Risks D. Perform Qualitative Risk Analysis 27. Acommon risk management strategy is to shift the negative impact of a threat, and ownership of the response, to a third party. What is the technique called ? A.Exploit ——_B. Avoid C. Mitigate. Transfer 28. Your team is developing a part of the risk management plan. For some of the risks. the team decides that a response plan will be executed only when certain predefined conditions exist. What is the term given to this type of risk strategy ? A.Contingent B. Sharing C. Exploit. —_—D. Enhance 29, You are managing risk of a project using the risk management plan. How often should you monitor the project work for new and changing risks ? A. At the beginning of a project planning 8. Continuously throughout the project lifecycle At the beginning of each project phase -—D. At the end of each project phase 30, Information such as identified risks, of low-priority risks are examples from which of the following ? ‘A. Risk management plan _B. Approved change requests. C. Risk register contents D. Work performance information ‘owners, agreed responses, actions, warning signs and a watch list, 31, Identifying and documenting the effectiveness of risk responses in dealing with identified risks and the root causes, and of the effectiveness of the risk management process, is called a ‘A.Risk mitigation _B. Risk identification _C. Risk analysis D. Risk audit 32. A.consultant has been reviewing outputs that resulted from carrying out the Monitor and Control Risks process. She lists a number of actions that are required to bring the project into compliance with the project, management plan. What are these actions called ? A. Recommended preventive actions 8. Risk register updates C. Recommended corrective actions _D. Project management plan updates 33, Which one of the following is the best way to prepare a response to unknown risks ? ‘A. Ignore them, B. Prepare a risk response C. Plan to treat them the same way as the known risks D. Allocate management reserves against them 34, Which of the following statement is false about risk management plans ? A Risk management plan is a subset of the project management plan 8, The Plan Risk Management process produces the risk management plan as an output C. The risk management plan should be updated frequently D. Risk management plans may include budgeting, timing and tracking details 35. Which of the following techniques is used in the Identify Risks process ? A. WBS B. Delphi C.Decomposition _D. Structured analysis 36. A risk register typically contains the following except, A. Ust of potential responses B, Result of root cause analysis C. Work breakdown structure D. List of identified risks 37. Which of the following risk categorization grouping criteria leads to the most effective risk responses ? ‘A. Root causes B. Source of risk C. Areas of WBS D. Project phase 38, In quantitative analysis and modeling, sensitivity analysis will typically use a (n) to compare the relative importance and impact of variables with a high degree of uncertainty against variables that are more stable. A. Decision tree diagram 8. Tornado diagram Expected monetary value, Control chart 38. In any project, risks can be negative (threats) or positive (opportunities). Which of the following is not a strategy for dealing with negative risks 2 A.Exploit —B. Mitigate. Avoid D. Transfer 40 In any project, risks can be negative (threats) or positive (opportunities). Which of the followings not a strategy for dealing with positive risks ? A.Exploit —B. Enhance —_C, Share D. Increase 41/. Which of the following is an input to the Monitor and Control Risks process ? ‘A. Updated WBS B. Project management plan .Change requests _D. Project organization chart ‘48 Which of the following is not an input, too! or technique used in risk monitoring and control ? A Status meetings 8, Project staff rewards scheme . Variance and trend analysis, 0. Technical performance measurement i | B D G D D A G D A B & D A A B ci D A B c D Answer : Risk 23, 24, 25. 26. 27. 28, 29. 30. BL 32 33. 34, 35, 36. C a 3 | 40.[a 11, 2 5 14 35 16. 77 78 19 0 2 22 [A

You might also like