1. Right Answer: C
Explanation: There is an increased risk without a policy defining who has the responsibility for granting access to specific data or systems, as one could gain system access without a justified business needs. There is better chance that business objectives will be properly supported when there is appropriate ownership.Incorrect Answers:A, B, D: These risks are not such significant as compared to unauthorized access.
2. Right Answer: B
Explanation: Secondary risks are the risks that come about as a result of implementing a risk response. This new risk event must be recorded, analyzed, and planned for management.Incorrect Answers:A: A residual risk event is similar to a secondary risk, but is often small in probability and impact, so it may just be accepted.C: Infinitive risk is not a valid project management term.D: Populated risk event is not a valid project management term.
3. Right Answer: B
Explanation: Risk register update is the only output of the choices presented for the qualitative risk analysis process. The four inputs for the qualitative risk analysis process are the risk register, risk management plan, project scope statement, and organizational process assets. The output of perform qualitative risk analysis process is RiskRegister Updates. Risk register is updated with the information from perform qualitative risk analysis and the updated risk register is included in the project documents. Updates include the following important elements: Relative ranking or priority list of project risks Risks grouped by categories Causes of risk or project areas requiring particular attention List of risks requiring response in the near-term List of risks for additional analysis and response Watchlist of low priority risks Trends in qualitative risk analysis resultsIncorrect Answers:A, C, D: These are not the valid outputs for the qualitative risk analysis process.
4. Right Answer: A
Explanation: Inspection of FISMA is required to be done annually. Each year, agencies must have an independent evaluation of their program. The objective is to determine the effectiveness of the program. These evaluations include: Testing for effectiveness: Policies, procedures, and practices are to be tested. This evaluation does not test every policy, procedure, and practice. Instead, a representative sample is tested. An assessment or report: This report identifies the agency's compliance as well as lists compliance with FISMA. It also lists compliance with other standards and guidelines.Incorrect Answers:B, C, D: Auditing of compliance by external organization is done annually, not quarterly or every three year.
5. Right Answer: C,D
Explanation: The foremost root cause of project risk is: A lack of discipline in managing the software development process Selection of a project methodology that is unsuitable to the system being developedIncorrect Answers:A: The risk associated with new system is not meeting the user business needs is business risks, not project risk.B: This is not direct reason of project risk.
Leave a comment