Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Three months into a program, multiple workstreams are showing issues. At this point, the program manager requires that a risk impact assessment be conducted.

What will help calculate the impact?

A.

Risk analysis

B.

Risk identification

C.

Risk treatment

D.

Risk evaluation

After starting a new pipeline project, a risk manager schedules an initial meeting with the project sponsor. For the meeting, the project sponsor requests a presentation of the risks that have the most impact on achieving the project objectives.

What should the risk manager do to facilitate the sponsor ' s ask?

A.

Monte Carlo analysis

B.

Qualitative risk analysis

C.

Sensitivity analysis

D.

Quantitative risk analysis

A project lihat was in the execution phase for the last six months was put on hold and was eventually cancelled after numerous scope related challenges. It was decided to re-plan the scope and divide the project into multiple projects to have better insight into end objectives. As part of the project start up. the project manager is developing the risk planning for the project.

What three artifacts should the project manager consult or review during this process? (Choose three.)

A.

Project contracts

B.

Lessons learned registers from analogous projects

C.

Risk register

D.

Risk management plan

E.

Code of regulations

A project team has just initiated a large project to move an organization ' s headquarters to another location. The risk manager has scheduled a risk identification session but notices that the project charter, work breakdown structure (WBS). and scope statement are not available.

What should the risk manager consider?

A.

Aligning with the project manager to hold an open brainstorm session with all stakeholders will suffice.

B.

The ideal solution is to find alternate documents that provide good visibility on the environment.

C.

The risk identification process can be carried out as long as the project statement is available.

D.

Risk evaluation will be challenging without these elements as a frame of reference.

A software development project team was preparing for a phased release when an unknown and unexpected risk occurred with potential for delaying one of the features for the planned release. The project team decided to go ahead with the release and address this missing feature at a later date. One of the end users learned about this and strongly opposed the planned release.

What should the risk manager have done to prevent this situation?

A.

Engaged the sponsor and informed them of the decision to remove the planned feature.

B.

Engaged the stakeholders more in risk management activities and decisions to get their buy-in and support.

C.

Performed proper risk identification at the project outset to ensure this risk was identified and mitigated.

D.

Created a schedule buffer in the plan to deal with unknown risks if and when they occurred. 

The project manager leading a company ' s digital signature initiative for engineering drawings has identified threats and opportunities using a strengths, weaknesses, opportunities, and threats (SWOT) analysis.

What are two potential threats or opportunities under the SWOT analysis? (Choose two.)

A.

The management team agreeing to include more resource for the digital signature initiative.

B.

The organization ' s professional engineers having reservations about possible information tampering.

C.

A growing number of competitors with digital signatures.

D.

An elimination of manual steps associated with recording wet signatures

E.

The growing adoption of mobile communications in the industry.

A project team has completed the risk response plan for a newly identified major project risk. Some team members argue the plan does not totally eliminate the risk, considering the effort required to implement it, and feel the planned response should be thrown out altogether.

What should the risk manager do in this situation?

A.

Accept the response because there are no secondary risks were identified.

B.

The response plan should be discontinued and the risk should be accepted and dealt with if it occurs.

C.

Accept the residual risk as it is compatible with the organization ' s risk appetite.

D.

All identified risks must be addressed because they might significantly impact the project if they occur. 

A risk manager for a hospital extension project is leading a project team in developing a risk management plan. One team member is responsible for conducting risk identification. The team member just joined the team and is struggling to ensure the coverage of all risks that might arise in this complex project.

How should the risk manager address this concern?

A.

Develop a risk breakdown structure {RBS) to identify possible risks.

B.

Develop a risk impact analysis to assess the consequences of possible risks

C.

Develop a probability and impact matrix to analyze possible risks.

D.

Create a risk register to capture and track possible risks. 

A risk manager is integrated into a team overseeing a crucial software development project. During the information gathering phase, the risk manager notices significant weaknesses in the maturity of the risk management process. The team needs to establish a more structured approach to managing risks, including the documentation of strategies, ownership structures, and details about the organization ' s project risk baseline.

What should the risk manager do?

A.

Prioritize the risk management plan.

B.

Arrange the risk mitigation plan.

C.

Create a risk action plan with risk owners.

D.

Prioritize the risk register.

During a risk identification session, the risk manager notices that subject matter experts (SMEs) are reluctant to participate because some risks could expose the poor maturity of processes in other business units. Which risk analysis technique should the risk manager use?

A.

Strengths, weakness, opportunities, and threats (SWOT) analysis

B.

Delphi technique

C.

Decision tree analysis

D.

Probability impact matrix