Pmi-Rmp Q & A
Pmi-Rmp Q & A
106. You are in an African country and identifying risks for your project.
Your team members identify a risk that during a particular time there is a
3% probability of rain. As the probability of this risk is low, you ask team
members to note down this risk and do nothing. What risk response
strategy is this?
(a) Avoid
(b) Mitigate
(c) Accept
(d) Enhance
107. There is a risk of equipment failure and you have identified another
piece of equipment to replace it if it fails. However, there is a chance that
this equipment may not perform as well as the original equipment. What
kind of risk is this?
(a) Known risk
(b) Secondary risk
(c) Unknown risk
(d) Residual risk
108. After analyzing the risks and developing the risk response plan,
which technique helps you see if the overall project risks have decreased?
(a) EMV
(b) Latin Hypercube
(c) Tornado Analysis
(d) EVM
109. How is the nominal group technique different from the Delphi
technique?
(a) An open discussion is conducted in the nominal group technique, while
in Delphi you ask questions anonymously
(b) An open discussion is conducted in the Delphi technique, while in the
nominal group technique you ask questions anonymously
(c) In the nominal group technique, after a discussion voting takes place
to rank opinions, while in Delphi a moderator collects opinions
anonymously and compiles them
(d) Both are the same except Delphi is anonymous
110. How is an affinity diagram different from the brainstorming
technique?
(a) Both categorize risks, however, an affinity diagram uses a diagram
and brainstorming uses slips
(b) Brainstorming categorizes risks while an affinity diagram prioritizes
them
(c) Both prioritize risks but brainstorming uses a voting system
(d) Brainstorming prioritizes risks while an affinity diagram categorizes
them
Go to the Answer
Answers
Answer-1: b
Explanation: The list of stakeholders is recorded in the stakeholder register, not
in the risk register.
Go to the Question
***
Answer-2: c
Explanation: Probabilistic Estimate is not an estimate which is used in the PERT
formula.
Reference: The PMBOK Guide 5th Edition, Page: 170
Go to the Question
***
Answer-3: d
Explanation: The risk register is the only output of the Identify Risks Process.
Reference: The PMBOK Guide 5th Edition, Page: 319
Go to the Question
***
Answer-4: b
Explanation: Earned Value Management is a technique of the Control Costs
process.
Reference: The PMBOK Guide 5th Edition, Page: 215
Go to the Question
***
Answer-5: c
Explanation: In resource smoothing, activities are allowed to be delayed within
their free and total float; therefore the critical path does not change here.
Reference: The PMBOK Guide 5th Edition, Page: 180
Go to the Question
***
Answer-6: c
Explanation: Natural calamity (such as flood or earthquake) is an example of
force majeure because you cannot control it.
Go to the Question
***
Answer-7: c
Explanation: In the Plan Risk Responses process you create the plan to manage
the identified risks.
Reference: The PMBOK Guide 5th Edition, Page: 342
Go to the Question
***
Answer-8: b
Explanation: Fast-tracking increases the risks and the crashing technique
increases the cost. Although the crashing process also increases the risks, it is
less risky than fast-tracking.
Reference: The PMBOK Guide 5th Edition, Page: 181
Go to the Question
***
Answer-9: c
Explanation: In a firm-fixed-price contract the price is fixed, and if the cost
escalates it has to be borne by the seller. This type of contract should be used
when you have a very well defined scope of work. Please note that if the work is
not clearly defined, the buyer may have to bear the burden.
Reference: The PMBOK Guide 5th Edition, Page: 363
Go to the Question
***
Answer-10: b
Explanation: Budget is included in the Cost Management Knowledge area; the
budget itself is not a knowledge area.
Go to the Question
***
Answer-11: d
Explanation: During the initiation phase risk is higher because there is less
clarity on everything. However, as the project progresses, the risk goes down
gradually.
Go to the Question
***
Answer-12: d
Explanation: Lessons learned are a part of the organizational process assets.
Reference: The PMBOK Guide 5th Edition, Page: 27
Go to the Question
***
Answer-13: a
Explanation: The risk register is developed during the Identify Risks process
and then it is updated continuously throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 319
Go to the Question
***
Answer-14: b
Explanation: Secondary risks are risks that may come up as a result of
implementing the response of any identified risk.
Reference: The PMBOK Guide 5th Edition, Page: 343
Go to the Question
***
Answer-15: d
Explanation: The correct PERT formula is:
PERT= (Optimistic + 4*Most-likely + Pessimist)/6
Reference: The PMBOK Guide 5th Edition, Page: 171
Go to the Question
***
Answer-16: d
Explanation: Mitigate is a negative risk response strategy that cannot be used
with positive risks. Exploit, Accept, and Enhance are positive risk response
strategies.
Reference: The PMBOK Guide 5th Edition, Page: 344
Go to the Question
***
Answer-17: a
Explanation: An issue log is used to monitor the resolution of issues.
Reference: The PMBOK Guide 5th Edition, Page: 305
Go to the Question
***
Answer-18: b
Explanation: Schedule priority, scarce resource, and personal work style are the
main reasons for conflicts in projects. A low salary is not a source of conflict.
Reference: The PMBOK Guide 5th Edition, Page: 282
Go to the Question
***
Answer-19: c
Explanation: Residual risk is a risk that remains after implementing the
response plan.
Reference: The PMBOK Guide 5th Edition, Page: 558
Go to the Question
***
Answer-20: c
Explanation: A Pareto diagram is also known as an 80-20 principle. According to
Pareto, 80% of problems are caused by 20% of sources.
Go to the Question
***
Answer-21: a
Explanation: If a network diagram has more than one critical path, this means
you will have to manage two paths, i.e. more risks.
Go to the Question
***
Answer-22: d
Explanation: In the risk breakdown structure you can breakdown the risks
according to their category; it is a hierarchical representation of risks.
Reference: The PMBOK Guide 5th Edition, Page: 560
Go to the Question
***
Answer-23: d
Explanation: The contingency reserve is used to manage the identified risks. All
risks given in the questions are identified risks.
Reference: The PMBOK Guide 5th Edition, Page: 310
Go to the Question
***
Answer-24: d
Explanation: The project manager cannot use the management reserve without
permission from the management; he always needs permission to use the
management reserve.
Go to the Question
***
Answer-25: c
Explanation: In the insurance risk response strategy you transfer the risk to a
third party. Please note that transferring does not mean that the risk has been
eliminated. By transferring a risk, you are transferring responsibility to a third
party to manage this risk if it occurs.
Reference: The PMBOK Guide 5th Edition, Page: 344
Go to the Question
***
Answer-26: b
Explanation: In gold plating, team members add functions to make the client
happy, although it is not included in the scope. Scope creep refers to the
uncontrolled changes to the scope. Please note that in scope creep team
members do not add anything to the scope willingly. Crashing and fast-tracking
are schedule compression techniques.
Go to the Question
***
Answer-27: a
Explanation: Scope, time, and cost are collectively known as the triple
constraints.
Go to the Question
***
Answer-28: b
Explanation: Physiological needs are the lowest on Maslow’s Hierarchy of
Needs. One must fulfill his physiological needs before going for higher needs.
Go to the Question
***
Answer-29: b
Explanation: RACI matrix is a kind of responsibility assignment matrix where
you can see the relation of activity with the team members.
Reference: The PMBOK Guide 5th Edition, Page: 262
Go to the Question
***
Answer-30: b
Explanation: Risk ranking is performed under the Perform Qualitative Risk
Analysis process.
Reference: The PMBOK Guide 5th Edition, Page: 328
Go to the Question
***
Answer-31: d
Explanation: In the exploit risk response strategy, you make sure that the risk is
realized. However, in enhance you only try to realize the opportunity.
Reference: The PMBOK Guide 5th Edition, Page: 345
Go to the Question
***
Answer-32: d
Explanation: The cost baseline curve is also known as an S-Curve because
initially the cost is low and it gradually increases, and as the project ends, the
cost again goes down.
Reference: The PMBOK Guide 5th Edition, Page: 214
Go to the Question
***
Answer-33: b
Explanation: The contingency reserve is used to manage identified risks.
Reference: The PMBOK Guide 5th Edition, Page: 310
Go to the Question
***
Answer-34: c
Explanation: Probability and impact matrix is a tool and technique of the
Perform Qualitative Risk analysis process; it helps you in ranking the identified
risks.
Reference: The PMBOK Guide 5th Edition, Page: 331
Go to the Question
***
Answer-35: d
Explanation: The RACI chart is a kind of responsibility assignment matrix (RAM)
where you can see the resources assigned to work package or activity. The RACI
chart means: Responsible, Accountable, Consult, and Inform. On the RACI chart,
you can see the accountability of the person for any activity.
Reference: The PMBOK Guide 5th Edition, Page: 262
Go to the Question
***
Answer-36: d
Explanation: CPM stands for the Critical Path Method, which is a network
analysis technique.
Go to the Question
***
Answer-37: a
Explanation: If any unidentified risk occurs, you will manage it through the
workaround.
Reference: The PMBOK Guide 5th Edition, Page: 353
Go to the Question
***
Answer-38: c
Explanation: In 5 Sigma 99.977% accuracy is desired.
Go to the Question
***
Answer-39: b
Explanation: You go for the teaming agreement with another company when
you see a big opportunity, and you alone are not capable of realizing it. In
sharing the risk response strategy, you team up with another company or go for
a joint venture to realize the opportunity.
Reference: The PMBOK Guide 5th Edition, Page: 346
Go to the Question
***
Answer-40: b
Explanation: In risk qualification, you review each risk for its probability and
impact on the project objectives.
Reference: The PMBOK Guide 5th Edition, Page: 328
Go to the Question
***
Answer-41: b
Explanation: In a decision tree diagram, a circle represents events, and a
rectangle or square represents a decision.
Go to the Question
***
Answer-42: c
Explanation: Risk triggers, which are sometimes known as risk symptoms, are a
warning sign that a risk is about to occur.
Go to the Question
***
Answer-43: a
Explanation: Risk identification is an ongoing process, so you will identify risks
throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 321
Go to the Question
***
Answer-44: d
Explanation: Aggressive communication is a made-up word; the rest are types
of communication methods.
Reference: The PMBOK Guide 5th Edition, Page: 295
Go to the Question
***
Answer-45: a
Explanation: Create WBS is a Scope Management process. WBS stands for work
breakdown structure, which is a hierarchical decomposition of the project work.
Reference: The PMBOK Guide 5th Edition, Page: 125
Go to the Question
***
Answer-46: c
Explanation: Make or Buy is a decision which you have to make during the
procurement management plan. Here you will decide whether you should
procure a particular task or if you should do it on your own.
Reference: The PMBOK Guide 5th Edition, Page: 363, 364, 365
Go to the Question
***
Answer-47: a
Explanation: In risk mitigation, you try to reduce the probability of happening
the risk or its impact. In risk transfer, you transfer the responsibility to a third
party. Exploit and enhance are positive risk response strategies.
Reference: The PMBOK Guide 5th Edition, Page: 345
Go to the Question
***
Answer-48: b
Explanation: A risk-averse person or organization is not comfortable with
digesting risks. They are not very creative or supportive towards risks. They
usually try to avoid risks unless the reward to take on the risks is high enough to
outweigh the aversion of the risk.
Go to the Question
***
Answer-49: b
Explanation: In this case you will use the Delphi Technique, because this
technique collects responses anonymously.
Reference: The PMBOK Guide 5th Edition, Page: 324
Go to the Question
***
Answer-50: d
Explanation: With the use of the internet, you can communicate with several
people simultaneously located in different geographic locations. You cannot use a
live meeting or war room because team members are located in different places.
Telephone communication will be a mess if you make a conference call with all
team members.
Go to the Question
***
Answer-51: c
Explanation: Decision tree analysis helps you in all mentioned options except
identifying risks.
Reference: The PMBOK Guide 5th Edition, Page: 339
Go to the Question
***
Answer-52: b
Explanation: The size of the management reserve is determined by the
management. Usually it lies between 5% and 10%.
Go to the Question
***
Answer-53: c
Explanation: Risk responses are determined in the Plan Risk Responses
process, and then they are updated in the risk register.
Reference: The PMBOK Guide 5th Edition, Page: 342
Go to the Question
***
Answer-54: c
Explanation: In enhance, exploit and share risk response strategies, no reserve
is needed because they are positive risk response strategies which do not require
the use of any reserve. However, the mitigation technique requires the use of the
contingency reserve because here you are managing negative risks.
Go to the Question
***
Answer-55: c
Explanation: In the execution phase you will carry out the work-related
activities, and therefore, most of the identified risk will be faced in this phase.
Go to the Question
***
Answer-56: c
Explanation: Performance reports will be sent to the stakeholders you have
decided on during the Plan Communication Management process.
Reference: The PMBOK Guide 5th Edition, Page: 296
Go to the Question
***
Answer-57: a
Explanation: Sending information from one place to another is known as
transmit message.
Reference: The PMBOK Guide 5th Edition, Page: 293
Go to the Question
***
Answer-58: c
Explanation: Change requests must always be formally written.
Go to the Question
***
Answer-59: b
Explanation: First of all you analyze the risk. It is also possible that the
probability of this risk happening is too low. Once you qualify the risk, you will
proceed with the next action based on your risk analysis.
Go to the Question
***
Answer-60: b
Explanation: In exploit risk response strategies, you do everything to ensure
that the opportunity is realized. Please note that in enhance you also try to
realize the opportunity but you do not ensure that opportunity is realized.
Reference: The PMBOK Guide 5th Edition, Page: 345
Go to the Question
***
Answer-61: a
Explanation: Communication Channel = n*(n-1)/2, (where n is the number of
members)
=15(15-1)/2 = 105
Reference: The PMBOK Guide 5th Edition, Page: 292
Go to the Question
***
Answer-62: b
Explanation: Communication channel= 6(6-1)/2= 15
New communication channel = 9(9-1)/2=36
New communication channel = 36-15=21
Reference: The PMBOK Guide 5th Edition, Page: 292
Go to the Question
***
Answer-63: a
Explanation: Making eye contact and repeating the sentence are examples of
active listening.
Go to the Question
***
Answer-64: b
Explanation: This is an example of accept risk response strategy where you
simply accept the risk and do nothing except note it down.
Reference: The PMBOK Guide 5th Edition, Page: 345
Go to the Question
***
Answer-65: a
Explanation: Fishikawa diagram is also known as a Fishbone diagram, Ishikawa
diagram, and root cause analysis diagram.
Reference: The PMBOK Guide 5th Edition, Page: 236
Go to the Question
***
Answer-66: c
Explanation: In interview you approach individual stakeholders and ask
questions to get their output.
Go to the Question
***
Answer-67: a
Explanation: Expected Monetary Value = Probability * Impact
EMV = 0.3*500
= 150
Go to the Question
***
Answer-68: b
Explanation: The risk register includes all risks regardless of whether they
positive or negative, and it is continuously updated throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 327
Go to the Question
***
Answer-69: b
Explanation: In the Conduct Procurements process, you select the seller.
Reference: The PMBOK Guide 5th Edition, Page: 371
Go to the Question
***
Answer-70: b
Explanation: If you have a stakeholder who requests many changes, involve
him from the start of the project so that he can agree with and be aware of
everything going on in the project.
Go to the Question
***
Answer-71: c
Explanation: Of course you will analyze the suggestion before reaching any
conclusion. You cannot take action on any advice unless you review the request
and analyze its impact on any other project objective or parameters.
Go to the Question
***
Answer-72: b
Explanation: This is an official formal request which must be sent in a formal
written form of communication. Change request is always a formal written
communication.
Go to the Question
***
Answer-73: c
Explanation: Low-priority risks are kept on the watch list for future monitoring.
You cannot ignore any low-rated risk because you never know when it may
become a high-ranking risk.
Reference: The PMBOK Guide 5th Edition, Page: 330
Go to the Question
***
Answer-74: d
Explanation: Salary, working conditions, and a good relationship with the boss
are important but they are not a motivating factor. They don’t motivate you to
work harder. Career growth is a motivating factor which encourages you to
perform better and prove yourself.
Go to the Question
***
Answer-75: a
Explanation: Accept risk response strategy can be used with both types of risks.
Reference: The PMBOK Guide 5th Edition, Page: 344
Go to the Question
***
Answer-76: d
Explanation: Risk identification is an iterative process; therefore, risks will be
identified throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 321
Go to the Question
***
Answer-77: b
Explanation: The Perform Quantitative Risk Analysis is a complex and time-
consuming process, usually performed on large and complex projects, and
ignored on low-cost non-important projects.
Go to the Question
***
Answer-78: c
Explanation: Since you are giving this task to another party, it is a transfer risk
response strategy.
Go to the Question
***
Answer-79: d
Explanation: Exploit is a positive risk response strategy where you ensure that
the risk is realized.
Go to the Question
***
Answer-80: a
Explanation: The three strategies for negative risks are: avoid, transfer, and
mitigate. The three strategies for positive risks are: exploit, enhance, and share.
The last strategy is “accept,” which can be used with both types of risks.
Go to the Question
***
Answer-81: b
Explanation: In a joint venture, you team with another company to share the
opportunity. This is an example of a share risk response strategy.
Reference: The PMBOK Guide 5th Edition, Page: 346
Go to the Question
***
Answer-82: a
Explanation: Risk identification is an ongoing process; you will identify them
throughout the project. However, as you identify a new risk, you will note it down
in the risk register and analyze it for the next action.
Go to the Question
***
Answer-83: a
Explanation: In a decision tree diagram, a rectangle or square represents a
decision and a circle represents events.
Go to the Question
***
Answer-84: d
Explanation: Stakeholder identification is an iterative process, and hence it will
be performed throughout the project.
Go to the Question
***
Answer-85: b
Explanation: Risk categories, definitions of risk probability and impact,
methodologies, etc. are determined in the Plan Risk Management Process.
Reference: The PMBOK Guide 5th Edition, Page: 317
Go to the Question
***
Answer-86: a
Explanation: The project budget consists of the cost baseline and management
reserve. The cost baseline consists of the work package cost estimate plus
contingency reserve.
Reference: The PMBOK Guide 5th Edition, Page: 213
Go to the Question
***
Answer-87: a
Explanation: As the risk tolerance is low for your stakeholders, they are risk-
averse and in this case, you will have fewer risks on the watch list.
Go to the Question
***
Answer-88: c
Explanation: This is a property of a uniform distribution where you have two
values: maximum and minimum.
Go to the Question
***
Answer-89: b
Explanation: If your stakeholders are risk seekers, this means they will want to
manage even a small risk to avoid issues with the project. In this case, the
number of risks will be higher.
Go to the Question
***
Answer-90: a
Explanation: Risk attitude, probability, and impact definitions are determined in
the plan risk management process.
Go to the Question
***
Answer-91: c
Explanation: Bowtie method helps you analyze and demonstrate causal
relationships in high-risk scenarios.
Go to the Question
***
Answer-92: d
Explanation: If any unidentified risk occurs, you will manage it through a
workaround.
Go to the Question
***
Answer-93: b
Explanation: As this is an unidentified risk, you will manage it with the
management reserve. To use the management reserve, you need the
management’s approval.
Go to the Question
***
Answer-94: c
Explanation: When the project starts there is the greatest potential for risks.
This goes down as the project progresses.
Go to the Question
***
Answer-95: a
Explanation: This is an example of an active accept risk response strategy
where you are keeping a contingency reserve to manage the risk if it occurs.
Go to the Question
***
Answer-96: c
Explanation: This is an example of a passive accept risk response strategy
where you are doing nothing except acknowledging the risk.
Go to the Question
***
Answer-97: d
Explanation: A risk that remains after even applying the risk response strategy
is known as a residual risk.
Go to the Question
***
Answer-98: b
Explanation: Monte Carlo and Latin Hypercube techniques let you know if the
overall project risk has been reduced or not after developing the risk response
strategies.
Go to the Question
***
Answer-99: c
Explanation: In the nominal group technique, after a discussion, you vote to
rank the ideas for further discussion. In Delphi, you send a questionnaire to
stakeholders anonymously so they can give their input without any fear.
Go to the Question
***
Answer-100: d
Explanation: In an affinity diagram you categorize risks while brainstorming is
used to rank the ideas through group discussion.
Go to the Question