1. Right Answer: B
Explanation: As preventive control and prevention is preferred over detection and recovery, therefore, private and key-based encryption should be adopted for managing risks.Incorrect Answers:A, C, D: As explained in above section preventive control and prevention is preferred over detection and recovery, hence these are less preferred way.
2. Right Answer: A
Explanation: Conducting a feasibility study begins once initial approval has been given to move forward with a project. It includes an analysis to clearly define the need and to identify alternatives for addressing the need.Incorrect Answers:B: Acquiring software involves building new or modifying existing hardware or software after final approval by the stakeholder, which is not a phase in the standardSDLC process. If a decision was reached to acquire rather than develop software, this task should occur after feasibility study and defining requirements.C: Requirements of the project is being defined after conducting feasibility study.D: This is latter phase in project development process.
3. Right Answer: B
Explanation: The Communications Management Plan will direct John on the information to be communicated, when to communicate, and how to communicate with external stakeholders.The Communications Management Plan aims to define the communication necessities for the project and how the information will be circulated. TheCommunications Management Plan sets the communication structure for the project. This structure provides guidance for communication throughout the project's life and is updated as communication needs change. The Communication Managements Plan identifies and defines the roles of persons concerned with the project. It includes a matrix known as the communication matrix to map the communication requirements of the project.Incorrect Answers:A: The Risk Response Plan identifies how risks will be responded to.C: The Project Management Plan is the parent of all subsidiary management plans and it is not the most accurate choice for this questionD: The Risk Management Plan defines how risks will be identified, analyzed, responded to, and controlled throughout the project.
4. Right Answer: D
Explanation: A risk register is an inventory of risks and exposure associated with those risks. Risks are commonly found in project management practices, and provide information to identify, analyze, and manage risks. Typically a risk register contains: A description of the risk The impact should this event actually occur The probability of its occurrence Risk Score (the multiplication of Probability and Impact) A summary of the planned response should the event occur A summary of the mitigation (the actions taken in advance to reduce the probability and/or impact of the event) Ranking of risks by Risk Score so as to highlight the highest priority risks to all involved. It records the initial risks, the potential responses, and tracks the status of each identified risk in the project.Incorrect Answers:A: The project scope statement does document initially defined risks but it is not a place that will record risks responses and status of risks.B: The project charter does not define risks.C: The risk low-level watch list is for identified risks that have low impact and low probability in the project.
5. Right Answer: D
Explanation: Physical or logical system access should be assigned on a need-to-know basis, where there is a legitimate business requirement based on least privilege and segregation of duties. This is done by user authentication.Incorrect Answers:A: Monitoring and recording unsuccessful logon attempts does not address the risk of appropriate access rights. In other words, it does not prevent unauthorized access.B: Forcing users to change their passwords does not ensure that access control is appropriately assigned.C: Challenge response system is used to verify the user's identification but does not completely address the issue of access risk if access was not appropriately designed in the first place.
Leave a comment