Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA Project+ PK0-005 Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions
Questions # 31:

To gather requirements from stakeholders, the project manager sits down with them and allows them to discuss freely. Which a following technique is the project manager utilizing?

Options:

A.

Process moving


B.

Brainstorming


C.

Interview


D.

Focus group


Expert Solution
Questions # 32:

Which of the following provides the best justification for undertaking a project?

Options:

A.

Scope statement


B.

Business case


C.

Sponsor request


D.

Project charter


Expert Solution
Questions # 33:

When assigning access, classifying information based on sensitivity is referred to as:

Options:

A.

Digital security


B.

Physical security


C.

Data security


D.

Operational security


Expert Solution
Questions # 34:

Which of the following would be considered operational security?

Options:

A.

Mobile device compliance


B.

Background screening


C.

Multifactor authentication


D.

Facility access


Expert Solution
Questions # 35:

A project manager is in the process of evaluating the probability and impact of a risk by assigning numbers such as a monetary value. Which of the following is the project manager using?

Options:

A.

Monte Carlo simulation


B.

Root cause analysis


C.

Quantitative risk analysis


D.

Risk response analysis


Expert Solution
Questions # 36:

A project team gathers weekly to review its progress. Which of the following is the project manager MOST likely to have prepared to ensure team members who are absent remain informed about assignments?

Options:

A.

Status report


B.

Project plan


C.

Change log


D.

Meeting minutes


Expert Solution
Questions # 37:

One of the key steps in controlling changes lo software is obtaining approval. Which of the following statements best describes the reason for this key objective?

Options:

A.

To send the appropriate customer notifications


B.

To avoid a negative impact on other software functionalities


C.

To ensure adequate resources are in place to implement the change


D.

To confirm that the software is a business priority


Expert Solution
Questions # 38:

Which of the following is required to provide a hardware installation with a Tier 5 redundancy level?

Options:

A.

Storage project


B.

Computer services project


C.

Database project


D.

Multitiered architecture project


Expert Solution
Questions # 39:

During the execution phase, a new PM was assigned to a project. The PM received a request to add new functionality to the system that is being developed. While the PM was conducting a preliminary review with the team, the technical lead highlighted that this functionality request was rejected during the planning phase. Which of the following documents is the best source for the PM to use to confirm this assertion?

Options:

A.

Issue log


B.

Scope statement


C.

Risk report


D.

Change log


Expert Solution
Questions # 40:

Which of the following artifacts should project team members use if they want to identify who to communicate with and at what level?

Options:

A.

Concept of operations


B.

WBS


C.

Integrated master schedule


D.

RACI


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions