Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

PMI PMI-RMP - PMI Risk Management Professional (PMI-RMP) Exam

Page: 3 / 8
Total 264 questions

A new risk manager has been hired on a project and meets with the project director. The project director supplies the project's risk register and asks the risk manager for an analysis of its effectiveness.

What two actions should the risk manager do next? (Choose two.)

A.

Check to ensure that the risk is supported by a Monte Carlo simul-ation.

B.

Check to ensure that the risks are gathered using Delphi technique.

C.

Check for risk classification and that probability and impact are identified.

D.

Check to ensure that risk origin, triggering event, and ownership is identified.

E.

Check to ensure the risk meeting agenda and supporting documents are distributed.

Three months into a program, multiple workstreams are showing issues. At this point, the program manager requires that a risk impact assessment be conducted.

What will help calculate the impact?

A.

Risk analysis

B.

Risk identification

C.

Risk treatment

D.

Risk evaluation

A complex infrastructure construction project consisting of various stakeholders with diverse attitudes and opinions is in the execution phase. The project sponsor instructed the risk manager to evaluate the project environment and identify potential risks because many conflicts have arisen.

What should the risk manager do first?

A.

Perform an assumptions and constraints analysis.

B.

Use the Wideband Delphi method.

C.

Use the brainstorming technique.

D.

Perform a strength, weaknesses, opportunities, and threats (SWOT) analysis. 

When approving the risk contingency budget for a project, the CEO notices each team has a different approach to report risks and their impacts. The CEO decides to create a new centralized risk management function to help resolve the problem.

How does centralizing the risk management function help resolve the problem?

A.

Enhance the process of identification of different Individual project risks.

B.

Allows monitoring the impact against the overall project risk exposure.

C.

Establishes risk sources and ownership for trigger monitoring.

D.

Creates a single repository for all project risk documents.

A large, land-based infrastructure project has begun. The project makes assumptions about the site conditions and has economic, technical, and environmental constraints

What should the project manager do next to determine risk impact of assumptions and constraints?

A.

Add all assumptions and constraints to the risk register.

B.

Add the risk impact of the assumptions in the risk register.

C.

Add the assumptions and constraints to the assumption log.

D.

Add the assumptions and constraints in the project charter.

A major data center initiative involves performing a sensitivity analysis to determine the center's required amount of disaster recovery. Several key stakeholders are in disagreement about which level of disaster recovery is required. The lessons learned disaster recovery plans, and the difference for this data center is its geographical location and unique climate requirements. The database includes examples from previous similar initiatives, as well as the competitor's advertised plans.

What should the risk manager do to quantify the risk?

A.

Initiate a 360-degree assessment.

B.

Consult environmental enterprise factors for benchmarks.

C.

Review organizational process assets for guidance.

D.

Consider leveraging the Delphi technique.

A risk manager is assigned to a mobile network deployment project with a strict contractually agreed-on schedule. One of the key risks identified has materialized. There is insufficient staffing because critical resources are dedicated to strategic projects in the organization. The risk manager expected the resource manager to notice this, but the resource manager thought the project experts would be alerting the team during the project.

What should the risk manager do to prevent this from happening again?

A.

Document the risks and response actions in a clear manner.

B.

Communicate with the project manager on the topic.

C.

Assign owners who will be fully accountable to managing the risks.

D.

Define the response plans and take the lead in implementing them.

A risk manager has been assigned to a new project and learns that stakeholders and project team members are spread across multiple time zones. Furthermore, many project team members have not worked together in the past. These items are identified as potential risks and added to the risk register.

How should the risk manager improve collaboration during risk planning?

A.

Gather risk information from all parties and compile all submissions into a strength, weaknesses, opportunities, and threats (SWOT) analysis template.

B.

Create a repository for project documents and related artifacts that can be accessed by all parties.

C.

Communicate program metrics to all parties and create a scorecard to measure the effectiveness.

D.

Work with the project manager to develop a start-up workshop and colocate the team if permitted. 

During project development, a risk manager notices that a major update in the country's regulations might be happening in the upcoming months. These changes will affect the materials used in building some of the components of the final product. The project team is unsure if this risk will affect the project negatively or positively.

Which tool should the project team use to determine this?

A.

Sensitivity analysis

B.

Threshold analysis

C.

Reserve analysis

D.

Strengths, weaknesses, opportunities, and threats (SWOT) analysis 

During a meeting to develop the risk management plan, the risk manager recognizes that risks may be identified that could also impact other projects that the company is pursuing. What should the risk manager do?

A.

Contact the risk managers of the other projects and inform them

B.

Include an escalation process in the risk management plan

C.

Take note of the extensive impact of these risks in the risk register

D.

Address the unique characteristics of these risks on a case-by-case basis