1. Right Answer: D
Explanation: All risks, their responses, and other characteristics are documented in the risk register. As the project progresses and the conditions of the risk events change, the risk register should be updated to reflect the risk conditions.Incorrect Answers:A: The risk management plan addresses the project management's approach to risk management, risk identification, analysis, response, and control.B: The project management plan is the overarching plan for the project, not the specifics of the risk responses and risk identification.C: The risk response plan only addresses the planned risk responses for the identified risk events in the risk register.
2. Right Answer: A
Explanation: When you are hiring a third party to own risk, it is known as transference risk response.Risk transfer means that impact of risk is reduced by transferring or otherwise sharing a portion of the risk with an external organization or another internal entity.Transfer of risk can occur in many forms but is most effective when dealing with financial risks. Insurance is one form of risk transfer.Incorrect Answers:B: The act of spending money to reduce a risk probability and impact is known as mitigation.C: When extra activities are introduced into the project to avoid the risk, this is an example of avoidance.D: Exploit is a strategy that may be selected for risks with positive impacts where the organization wishes to ensure that the opportunity is realized.
3. Right Answer: A
Explanation: The activity duration estimates review is valuable in identifying risks associated to the time allowances for the activities or projects as a whole, with a width of the range indicating the degrees of risk.Incorrect Answers:B: The activity cost estimates review is valuable in identifying risks as it provides a quantitative assessment of the expected cost to complete scheduled activities and is expressed as a range, with a width of the range indicating the degrees of risk.C: A Risk management plan is a document arranged by a project manager to estimate the effectiveness, predict risks, and build response plans to mitigate them.It also consists of the risk assessment matrix.D: It describes how the schedule contingencies will be reported and assessed.
4. Right Answer: B,C,D
Explanation: Loss of integrity refers to the following types of losses: An e-mail message is modified in transit A virus infects a file Someone makes unauthorized changes to a Web siteIncorrect Answers:A: Someone sees company's secret formula or password comes under loss of confidentiality.
5. Right Answer: C
Explanation: Review of the enterprise's strategic plan is the first step in designing effective IS controls that would fit the enterprise's long-term plans.Incorrect Answers:A: The IT strategic plan exists to support the enterprise's strategic plan but is not solely considered while designing information system control.B: Review of the existing IT environment is also useful and necessary but is not the first step that needs to be undertaken.D: The present IT budget is just one of the components of the strategic plan.
Leave a comment