Pass the CompTIA Project+ PK0-005 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

Two project team members are assigned to set up new work areas and are disagreeing about the placement of hardware and peripherals at the end users' desks. The requirements do not specify where to place the items, just what is needed in each space. Which of the following should the project manager do to resolve the conflict?

Options:

A.

Send out a survey to the potential end users to gather information about the best functional setup for work productivity.


B.

Provide clear instructions based on personal preference and aesthetics for setup of the work areas.


C.

Explain to team members that the placement of the items is not too important, as long as everything is connected and working.


D.

Facilitate a meeting between team members to review the pros and cons of the different configurations so as to encourage an amicable solution.


Expert Solution
Questions # 32:

A PM wants to provide a visual representation of how a project is organized into tasks and how the tasks relate to each other. Which of the following can the PM use?

Options:

A.

Milestone chart


B.

Gantt chart


C.

PERT chart


D.

WBS


Expert Solution
Questions # 33:

A team currently has a schedule for each sprint that changes after every iteration. The team wants to set up a repeatable schedule that would create a consistent flow of tasks and deliverables after each iteration. Which of the following should be established to best meet this goal?

Options:

A.

Task log


B.

Cadence


C.

Milestones


D.

Work breakdown structure


Expert Solution
Questions # 34:

A PM has identified all the resources involved in a project. The next step is to identify which resources are responsible for which tasks. Which of the following should be used to document this information?

Options:

A.

RFI


B.

RACI


C.

WBS


D.

SOW


Expert Solution
Questions # 35:

Which of the following would be considered operational security?

Options:

A.

Mobile device compliance


B.

Background screening


C.

Multifactor authentication


D.

Facility access


Expert Solution
Questions # 36:

Which of the following is a quantitative key performance indicator?

Options:

A.

The project sponsor ranked the graphics of an application as four out of five.


B.

The project implements the application in ten different geographical regions.


C.

The workers complete tasks on average 25% faster using a new application.


D.

The use of a multimedia interface appeals more to users under the age of 21.


Expert Solution
Questions # 37:

During the execution phase of a project, the project team faced an unexpected website downtime The project manager how a brainstorming session and the team identified causes and effects tor the problem Now the project team needs to analyze and determine whether the particular cause and effect are related by using one of the following charts. Which of the following should the team use?

A)

B)

Question # 37

C)

Question # 37

D)

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 38:

During the testing phase of a project, the regression test fails due to a specific item that is disrupting the entire system. Which of the following documents should the project manager use to identify who requested this item?

Options:

A.

Issue log


B.

Risk register


C.

Defect log


D.

Traceability matrix


Expert Solution
Questions # 39:

During the project initiation phase, a project manager needs to construct a project schedule and show the project dependencies. Which of the following should the project manager use for this task?

Options:

A.

Waterfall method


B.

Simulation method


C.

Precedence diagramming method


D.

Cost ratio analysis


Expert Solution
Questions # 40:

Government projects require that personnel submit to background screenings for certain clearance requirements. Which of the following best describes this process?

Options:

A.

Data security


B.

Operational security


C.

Physical security


D.

Digital security


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions