To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Some new sample questions:
Question:
At the beginning of a small project the risk manager facilitates workshops to identify and analyze risks. At the end of the sessions a stakeholder says that there should be no need to meet again about the risk register now that it’s complete since it is such a short and simple project.
How should the risk manager respond to this comment?
A. Compromise by updating the risk register at the end of each phase only.
B. The risk register must only be updated if a change is approved during the project.
C. Insist on continuous review and updating of the risk register during the project.
D. Agree on the condition that the risk register be updated if the project environment changes.
Question:
A risk manager is working on the risk management plan for a new digital platform and realizes the project sponsor who is the IT manager has not been invited to the project team meetings. The IT manager is concerned that the IT infrastructure is unable to host the new platform the team is creating. The risk manager asks the IT manager to be included in the meetings
What should the IT manager’s role be in the project team meetings’?
A. The IT manager should be added as a project sponsor.
B. The IT manager should refine the project baseline plans
C. The IT manager should be included as a risk owner
D. The IT manager should lead the infrastructure execution
Question:
An organization is executing two projects—Project A and Project B—simultaneously A previously identified risk will impact the schedule for Project
A. While executing the mitigation plan a number of residual risks are identified that could provide cost savings for Project B. Which action should the risk manager for Project A take?
A. Continue executing the planned risk mitigation to avoid any additional schedule impact to Project A.
B. Consult with Project B’s risk manager and determine where synergies might exist between the risk management plans for both projects.
C. Review the findings in Project A’s closure documents and propose a new organizational process for portfolio risk management.
D. Combine the risk registers for Project A and Project B and determine if there are any additional cross-project opportunities to exploit.
Question:
A risk manager is collaborating with project stakeholders and the project team to identify risks in a construction project. The risk manager intends to use an approach that engages stakeholders based on information such as scope baseline and project estimates while also determining risk impacts based on this approach.
Which risk identification approach should the risk manager use to achieve this goal?
A. Strengths, weaknesses, opportunities, and threats (SWOT) analysis
B. Assumptions and constraints analysis
C. Brainstorming technique
D. Delphi technique
……