Free CRISC Exam Braindumps (page: 81)

Page 80 of 451

John is the project manager of the NHQ Project for his company. His project has 75 stakeholders, some of which are external to the organization. John needs to make certain that he communicates about risk in the most appropriate method for the external stakeholders. Which project management plan will be the best guide for John to communicate to the external stakeholders?

  1. Risk Response Plan
  2. Communications Management Plan
  3. Project Management Plan
  4. Risk Management Plan

Answer(s): B

Explanation:

The Communications Management Plan will direct John on the information to be communicated, when to communicate, and how to communicate with external stakeholders.

The Communications Management Plan aims to define the communication necessities for the project and how the information will be circulated. The Communications Management Plan sets the communication structure for the project. This structure provides guidance for communication throughout the project's life and is updated as communication needs change. The Communication Managements Plan identifies and defines the roles of persons concerned with the project. It includes a matrix known as the communication matrix to map the communication requirements of the project.

Incorrect Answers:
A: The Risk Response Plan identifies how risks will be responded to.

C: The Project Management Plan is the parent of all subsidiary management plans and it is not the most accurate choice for this question

D: The Risk Management Plan defines how risks will be identified, analyzed, responded to, and controlled throughout the project.



Adrian is a project manager for a new project using a technology that has recently been released and there's relatively little information about the technology. Initial testing of the technology makes the use of it look promising, but there's still uncertainty as to the longevity and reliability of the technology. Adrian wants to consider the technology factors a risk for her project. Where should she document the risks associated with this technology so she can track the risk status and responses?

  1. Project scope statement
  2. Project charter
  3. Risk low-level watch list
  4. Risk register

Answer(s): D

Explanation:

A risk register is an inventory of risks and exposure associated with those risks. Risks are commonly found in project management practices, and provide information to identify, analyze, and manage risks. Typically a risk register contains:
A description of the risk
The impact should this event actually occur The probability of its occurrence
Risk Score (the multiplication of Probability and Impact)
A summary of the planned response should the event occur
A summary of the mitigation (the actions taken in advance to reduce the probability and/or impact of the event)
Ranking of risks by Risk Score so as to highlight the highest priority risks to all involved.
It records the initial risks, the potential responses, and tracks the status of each identified risk in the project.

Incorrect Answers:
A: The project scope statement does document initially defined risks but it is not a place that will record risks responses and status of risks.

B: The project charter does not define risks.

C: The risk low-level watch list is for identified risks that have low impact and low probability in the project.



You are the administrator of your enterprise. Which of the following controls would you use that BEST protects an enterprise from unauthorized individuals gaining access to sensitive information?

  1. Monitoring and recording unsuccessful logon attempts
  2. Forcing periodic password changes
  3. Using a challenge response system
  4. Providing access on a need-to-know basis

Answer(s): D

Explanation:

Physical or logical system access should be assigned on a need-to-know basis, where there is a legitimate business requirement based on least privilege and segregation of duties. This is done by user authentication.

Incorrect Answers:
A: Monitoring and recording unsuccessful logon attempts does not address the risk of appropriate access rights. In other words, it does not prevent unauthorized access.

B: Forcing users to change their passwords does not ensure that access control is appropriately assigned.

C: Challenge response system is used to verify the user's identification but does not completely address the issue of access risk if access was not appropriately designed in the first place.



You are the project manager of GHT project. You have identified a risk event on your current project that could save $670,000 in project costs if it occurs. Your organization is considering hiring a vendor to help establish proper project management techniques in order to assure it realizes these savings. Which of the following statements is TRUE for this risk event?

  1. This risk event should be accepted because the rewards outweigh the threat to the project.
  2. This risk event should be mitigated to take advantage of the savings.
  3. This risk event is an opportunity to the project and should be exploited.
  4. This is a risk event that should be shared to take full advantage of the potential savings.

Answer(s): C






Post your Comments and Discuss ISACA CRISC exam with other Community members:

CRISC Discussions & Posts