1. Right Answer: C
Explanation: The manage stakeholder expectations process can create change requests for the project, which can cause new risk events to enter into the project.Change requests are requests to expand or reduce the project scope, modify policies, processes, plans, or procedures, modify costs or budgets or revise schedules. These requests for a change can be direct or indirect, externally or internally initiated, and legally or contractually imposed or optional. A ProjectManager needs to ensure that only formally documented requested changes are processed and only approved change requests are implemented.Incorrect Answers:A: The project management plan updates do not create new risks.B: The organizational process assets updates do not create new risks.D: The project document updates do not create new risks.
2. Right Answer: C
Explanation: A control or countermeasure which does not overlap in its performance with another control or countermeasure is considered as distinct. Hence the separation of controls in the production environment rather than the separation in the design and implementation of the risk refers to distinct.Incorrect Answers:A: Trusted source refers to the commitment of the people designing, implementing, and maintenance of the control towards the security policy.B: Secure controls refers to the activities ability to protect from exploitation or attack.D: The separation in design, implementation, and maintenance of controls or countermeasures are refer to as independent. Hence this answer is not valid.
3. Right Answer: D
Explanation: By establishing definitions for the level of probability and impact a project manager can reduce the influence of bias.Incorrect Answers:A: This is not a valid statement for reducing bias in the qualitative risk analysis.B: Positive and negative stakeholders are identified based on their position towards the project goals and objectives, not necessarily risks.C: Root cause analysis is a good exercise, but it would not determine risk bias.
4. Right Answer: A
Explanation: When a new regulation for safeguarding information processed by a specific type of transaction is being identified by the IT manager, then the immediate step would be to understand the impact and requirements of this new regulation. This includes assessing how the enterprise will comply with the regulation and to what extent the existing control structure supports the compliance process. After that manager should then assess any existing gaps.Incorrect Answers:B, C, D: These choices are appropriate as well as important, but are subsequent steps after understanding and gap assessment.
5. Right Answer: C
Explanation: When the risk level is less than risk tolerance level of the enterprise than no action is taken against that, because the cost of mitigation will increase over its benefits.Incorrect Answers:A: This is not a valid answer, as no response is being applied to such low risk level.B: Risk register is updates after applying response, and as no response is applied to such low risk level; hence no updating is done.D: This is not a valid answer, as no response is being applied to such low risk level.
Leave a comment