Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

1. Strategies typically used to deal with threats or risks that may have negative impacts on project objectives if they occur include all of the

1. Strategies typically used to deal with threats or risks that may have negative impacts on project objectives if they occur include all of the following EXCEPT:

A. Interpret
B. Avoid
C. Transfer
D. Mitgate

2. Giving a part of project work to a contractor is an example of:

A. risk mitigation
B. risk assignment
C. risk assessment
D. risk deflection (transference)
E. risk assumption

3. Identify Risks is an iterative process because new risks may evolve or become known as the project progresses through its life cycle.

A. True
B. False

4. Tools and techniques of the Perform Quantitative Risk Analysis process are:

A. Contracting, contingency planning, alternative strategies, and insurance.
B. Interviewing, historical results, workarounds, and response development.
C. Checklists, damage control reports, standard allowances, and inspection.
D. Data gathering and representation techniques, quantitative risk analysis and modeling techniques, and expert judgment.

5. Strategies for positive risks include all of the following EXCEPT:

A. exploits.
B. mitigates.
C. share.
D. accept.
E. enhance.

6. According to PMI's Project Management Body of Knowledge (PMBOK), risk management concerns:

A. Threats to the project's objectives
B. Opportunities to improve on project objectives
C. Events that are certain to occur
D. All of the above
E. A and B

7. The Delphi technique has all of the following characteristics EXCEPT:

A. It is a way to reach a consensus of experts on a subject such as project risk.
B. It is a technique in which project risk experts participate anonymously.
C. It helps reduce bias in the data and keeps anyone person from having undue influence on the outcome.
D. It is based on an ancient Greek technique to ensure that actions of subordinates are aligned with the vision of senior executives.

8. Expected monetary value (EMV) analysis has all of the following characteristics EXCEPT:

A. It is a statistical concept that calculates the average outcome when the future includes scenarios that may or may not happen.
B. The EMV of opportunities will generally be expressed as positive values, while those of risks will be negative.
C. EMV analysis cannot be used effectively in decision tree analysis unless a risk-averse assumption is made.
D. EMV is calculated by multiplying the value of each possible outcome by its probability of occurrence and adding the products together.

9. As an output of the Monitor and Control Risks process, an updated risk register generally includes some or all of the following EXCEPT:

A. The work breakdown structure (WBS).
B. Outcomes of risk reassessments, risk audits, and periodic risk reviews.
C. Identification of new risk events, updates to probability, impact, priority, response plans, ownership, and other elements of the risk register.
D. Outcomes of the project's risks and of the risk responses.

10. A thorough analysis of the _____________ will help identify potential risks to the project.

A. Risk identification checklist based on historical information and knowledge.
B. Project's change control system.

C. Project's mission statement.
D. Project's schedule and budget.

Step by Step Solution

3.43 Rating (159 Votes )

There are 3 Steps involved in it

Step: 1

1 A Interpret 2 B risk assignment 3 A True 4 D Data ... blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Java Programming

Authors: Joyce Farrell

9th edition

1337397075, 978-1337397070

More Books

Students explore these related Accounting questions