Top 74 Project Manager Quiz Questions With Answers

Top 74 Project Manager Quiz Questions With Answers

Embark on a knowledge-enhancing journey with our blog, featuring the “Top 74 Project Manager Quiz Questions With Answers.” Whether you’re a seasoned project manager or just stepping into the role, this comprehensive quiz is tailored to sharpen your skills. From project planning intricacies to effective team management strategies, our questions cover a vast spectrum of project management essentials. Engage in a self-assessment that promises to deepen your understanding and refine your expertise. Ready to challenge yourself and discover new insights? Join us on this insightful exploration, test your project management acumen, and elevate your ability to lead successful projects with our thoughtfully curated quiz!

So, let’s move on to the quiz questions with answers.

  1. Q1. You have been assigned as the Project Manager for a new project that involves development of a new interface for your existing time management system. You have completed identifying all Possible risks along with the stakeholders and team and have calculated the probability and impact of these risks. Which of the following would you need next to help you prioritize the risks?

    Select one:
    a. Risk categories
    b. Affinity Diagram
    c. Project Network Diagram
    d. Risk rating rules

  2. Q2. Courtney is the project manager for her organization. She is working with the project team to complete the qualitative risk analysis for her project. During the analysis Courtney encourages the project team to begin the grouping of identified risks by common causes. What is the primary advantage to group risks by Common causes during effective risk analysis?

    Select one:
    a. It assist in developing effective risk responses.
    b. It helps the project team realize the areas of the project most laden with risks.
    c. It saves time by collecting the related resources. such as project team members. to analyze the risk events.
    d. It can lead to the creation of risk sssharangyourscreen.

  3. Q3. John works as a project manager for BlueWell Inc. He is determining which risks can affect the project. Which of the following inputs of the identify risks process ¡s useful in identifying risks associated to the time allowances for the activities or projects as a whole. with a width of the range indicating the degrees of risk?

    Select one:
    a. Schedule management plan
    b. Activity cost estimates
    c. Activity duration estimates
    d. Risk management plan

  4. Q4. You are the risk official ¡n Techmart Inc. You are asked to perform risk assessment on the impact of losing a network connectivity for 1 day. Which of the following factors would you include?

    Select one:
    a. Aggregate compensation of all affected business users.
    b. Financial losses incurred by affected business units
    c. Hourly billing rate charged by the carrier
    d. Value that enterprise get on transferring data over the network

  5. Q5. For which of the following risk management capability maturity levels do the statement given below is true? “Real-time monitoring of risk events and control Expectations exits as does automation of policy management:’

    Select one:
    a. Level 5
    b. Level 2
    c. Level 3
    d. Level 0

  6. Q6. You are the project manager of the NHH Project. You are working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency Plans will be implemented by the project team. What document do you and your team ¡s creating in this scenario?

    Select one:
    a. Project plan
    b. Project management Plan
    c. Resource management plan
    d. Risk management plan

  7. Q7. You are the product manager in your enterprise. You have identified that new technologies, products and services are introduced in your enterprise time-to time. What should be done to prevent the efficiency and effectiveness of controls due to these changes?

    Select one:
    a. Receive timely feedback from risk assessments and through key risk indicators, and update controls
    b. Nothing, efficiency and effectiveness of controls are not affected by these changes
    c. Add more controls
    d. Perform Business Impact Analysis (BIA)

  8. Q8. You are the project manager for your company and a new change request has been approved for your project. This change request, however, has introduced several new risks to the project. You have communicated these risk events and the project stakeholders understand the possible effects these risks could have on your project. You elect to create a mitigation response for the identified risk events. Where will you record the mitigation response?

    Select one:
    a. Risk log
    b. Project management plan
    c. Risk management plan
    d. Risk Register

  9. Q9. You are the project manager of RFT project. You have identified a risk that the enterprises IT system and application landscape is so complex that, within a few years, extending capacity will become difficult and maintaining software will become very expensive. To overcome this risk the response adopted ¡s architecture of the existing and purchase of new integrated system. In which of the following risk prioritization options would this case he categorized?

    Select one:
    a. Business case to be made
    b. Quick win
    c. Contagious risk
    d. Deferrals

  10. Q10. You are the project manager of GHT project. You have implemented an automated tool to analyze and report on access control togs based on severity. This tool generates excessively large amounts of results. You perform a risk assessment and decide to configure the monitoring tool to report only when the alerts are marked “critical’ what you should do in order to fulfill that?

    Select one:
    a. Perform quantitative analysis
    b. Optimize Key Risk indicators
    c. Apply Risk responses
    d. Update risk register

  11. Q11. You work as a project manager for BlueWell Inc. You are about to complete the quantitative risk analysis process for your project. You can use three available tools and techniques to complete this process. Which one of the following ¡s NOT a tool or technique that is appropriate for the quantitative risk analysis process?

    Select one:
    a. Data gathering and representation technique s
    b. Expert judgment
    c. Organizational process assists
    d. Quantitative risk analysis and modeling techniques

  12. Q12. Which of the following is the MOST effective inhibitor of relevant and efficient communication?

    Select one:
    a. The perception that the enterprise is trying to cover up known risk from stakeholders
    b. Q A false sense of confidence at the top on the degree of actual exposure related to IT and lack of a well-understood direction for risk management from the top down.
    c. Misalignment between real risk appetite and translations into policies
    d. Existence of a blame culture

  13. Q13. NIST SP 800-53 identifies controls in three primary classes. What are they?

    Select one:
    a. Administrative, Technical, and Operational
    b. Preventative. Detective, and Corrective
    c. Technical. Administrative, and Environmental
    d. Technical. Operational, and Management

  14. Q14. David is the project manager of the HRC Project. He has identified a risk in the project. Which could cause the delay in the project. David does not want this risk event to happen so he takes few actions to ensure that the risk event will not happen. These extra steps, however, cost the project an additional $10,000. What type of risk response has David adopted?

    Select one:
    a. Avoidance
    b. Acceptance
    c. Mitigation
    d. Transfer

  15. Q15. Walter is the project manager of a large construction project. He’ll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works ¡n the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements. Which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update ¡n this scenario considering the risk event?

    Select one:
    a. Project communications plan
    b. Project seo Management pan
    c. Project Management pan
    d. Project contractual relationship with the vendor

  16. Q16. You are the project manager of GHT project. During the data extraction process you evaluated the total number of transactions per year by multiplying the Monthly average by twelve. This process of evaluating total number of transactions is known as?

    Select one:
    a. Reasonablene5s test
    b. Simplistic and ineffective
    c. Controls total
    d. Duplicates test

  17. Q17. Your project is a project that deals with plant irrigation systems. You have discovered a byproduct in your project that your organization could use to make a profit. If your organization seizes this opportunity it would be an example of what risk response?

    Select one:
    a. Enhancing
    b. Opportunistic
    c. Exploiting
    d. Positive

  18. Q18. Which of the following processes is described in the following statement? “It is the process of exchanging information and views about risks among stakeholders. Such as groups, individuals and institutions.

    Select one:
    a. Risk Communications
    b. IRGC
    c. Risk response planning
    d. Risk governance

  19. Q19. Harry is the project manager of HOW project. He has identified a risk that could injure project team members. He does not want to accept any risk where someone could become injured on this project so he hires a professional vendor to complete this portion of the project work. What type of risk response ¡s Harry implementing?

    Select one:
    a. Mitigation
    b. Acceptance
    c. Transference
    d. Avoidance

  20. Q20. ‘You are the project manager of the KJH Project and are working with your project team to plan the risk responses. Consider that your project has a budget of $500.000 and is expected to last six months. Within the KJM Project you have identified a risk event that has a probability of 70 and and a cost impact of $350,000. When ¡t comes to creating a risk response for this event what is the risk exposure of the event that must he considered for the cost of the risk

    Select one:
    a. 350000
    b. 245000
    c. 500000
    d. 850000

  21. Q21. Your project change control board has approved several scope changes that will drastically alter your project plan. You and the project team set about updating the project Scope, the WBS. The WBS dictionary, the activity list, and the project network diagram. There are also scope changes caused to the project risks. Communication, and vendors. What also should the project manager update based on these scope changes?

    Select one:
    a. Process improvement plan
    b. Stakeholder identification
    c. Quality baseline
    d. Vendor selection process

  22. Q22. You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management I3lan will define who will be available to share information on the project risks?

    Select one:
    a. Resource management plan
    b. Communications Management plan
    c. Stakeholder management strategy
    d. Risk Management Plan

  23. Q23. You are the risk official of your enterprise. You have just completed risk analysis process. You noticed that the risk level associated with your project is less than, risk tolerance level of your enterprise. Which of following is the MOST likely action you should take?

    Select one:
    a. No action
    b. Update risk register
    c. Prioritize risk response Options
    d. Apply risk response

  24. Q24. You are the project manager of GHT project. You are performing cost and benefit analysis of control. You come across the result that costs of specific controls exceed the benefits of mitigating a given risk. What is the BEST action would you choose in this scenario?

    Select one:
    a. The enterprise should adopt corrective control.
    b. The enterprise should exploit the risk.
    c. The enterprise may apply the appropriate control anyway.
    d. Enterprise may choose to accept the risk rather than the cost of mitigation.

  25. Q25. What is the process for selecting and implementing measures to impact risk called?

    Select one:
    a. Risk Treatment
    b. Risk Management
    c. Risk Assessment

  26. Q26. Which of the following statements is NOT true regarding the risk management plan?

    Select one:
    a. The risk management plan is an input to all the remaining risk-planning processes.
    b. The risk management plan includes thresholds, scoring and interpretation methods, responsible parties, and budget
    c. The risk management plan is an output of the Plan Risk Management process.
    d. The risk management plan includes a description of the risk responses and triggers.

  27. Q27. You work as a project manager for BlueWell Inc. Your project is using a new material to construct a large warehouse in your city. This new material ¡s cheaper than traditional building materials. But it takes some time to learn how to use the material properly. You have communicated to the project stakeholders that you will be able to save costs by using the new material, but you will need a few extra weeks to complete training to use the materials. This risk response of learning how to use the new materials can also be known as what term?

    Select one:
    a. Cost Benefits analysis
    b. Cost of conformance to quality
    c. Benchmarking
    d. Team development

  28. Q28. An enterprise has identified risk events in a project. While responding to these identified risk events, which among the following stakeholders is MOST important for reviewing risk response options to an IT risk.

    Select one:
    a. Information security managers
    b. Internal Audited
    c. Business managers
    d. Incident response team members

  29. Q29. Mary is a project manager in her organization. On her current project she is working with her project team and other key stakeholders to identify the risks within the project. She is currently aiming to create a comprehensive list of project risks so she is using a facilitator to help generate ideas about project risks. What risk identification method is Mary likely using?

    Select one:
    a. Checklist analysis
    b. Brainstorming
    c. Expert Judgment
    d. Delphi techniques

  30. Q30. Stephen is the project manager of the GBB project. He has worked with two subject matter experts and his project team to complete the risk assessment technique. There are approximately 47 risks that have a low probability and a low impact on the project. Which of the following answers best describes what Stephen should do with these risk events?

    Select one:
    a. Because they are low probability and low impact, the risks can be dismissed.
    b. The low probability and low impact risks should be added to the risk register.
    c. The low probability and low impact risks should be added to a watch list for future monitoring.
    d. Because they are low probability and low impact. Stephen should accept the risks.

  31. Q31. Which of the following aspect of monitoring tool ensures that the monitoring tool has the ability to keep up with the growth of an enterprise?

    Select one:
    a. Impact on performance
    b. Customizability
    c. Scalability
    d. Sustainability

  32. Q32. Suppose you are working in Techmart Inc. which sells various products through its website. Due to some recent losses, you are trying to identify the most important risks to the Website. Based on feedback from several experts, you have come up with a list. You now want to prioritize these risks. Now in which Category you would put the risk concerning the modification of the Website by unauthorized parties.

    Select one:
    a. Ping Flooding Attack
    b.Denial of service attack
    c. Web defacing
    d. FTP Bounce Attack

  33. Q33. You are the project manager of a large construction project. This project will last for 18 months and will cost $750,000 to complete. You are working with your project team, experts, and stakeholders to identity risks within the project before the project work begins. Management wants to know why you have scheduled so many risk identification meeting throughout the project rather than just initially during the project planning. What is the best reason for the duplicate risk identification session?

    Select one:
    a. The iterative meetings allow the project manager and the risk identification participants to identify newly covered risk events throughout the project.
    b. The iterative meetings allow all stakeholders to participate in the risk identification processes throughout the project phases.
    c. The iterative meetings allow the project manager to communicate pending risks events during project execution.
    d. The iterative meetings allow the project manager to discuss the risk events which have passed the project and which did not happen.

  34. Q34. You are a project manager for your organization and you’re working with four of your key stakeholders. One of the stakeholders is confused as to why you’re not discussing the current problem in the project during the risk identification meeting. Which one of the following statements best addresses when a project risk actually happens?

    Select one:
    a. Risk triggers are warning signs of when the risks will happen.
    b. Risk can happen at any time in project.
    c. Project risks are always in the future.
    d. Project risk are uncertain as to when they will happen.

  35. Q35. You are the project manager of GFT project. Your project involves the use of electrical motor. It was stated ¡n its specification that ¡f its temperature would increase to 500 degree Fahrenheit the machine will overheat and have to be shut down for 48 hours. If the machine overheats even once it will delay the project’s arrival date. So to prevent this you have decided while creating response that ¡f the temperature of the machine reach 450, the machine will be paused for at least an hour so as to normalize its temperature. This temperature of 450 degree is referred to as?

    Select one:
    a. Risk response
    b. Risk trigger
    c. Risk event
    d. Risk identification

  36. Q36. You are working with a vendor on your project. A stakeholder has requested a change for the project, which will add value to the project deliverables. The vendor that you’re working with on the project will be affected by the change. What system can help you introduce and execute the stakeholder change request with the vendor?

    Select one:
    a. Cost change control system
    b. Scope change control system
    c. Schedule change control system
    d. Contract change control system

  37. Q37. You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

    Select one:
    a. Resource Management Plan
    b. Risk Management Plan
    c. Stakeholder management strategy
    d. Communications management Plan

  38. Q38. There are five input the quantitative risk analysis process. Which one of the following is NOT an input to quantitative risk analysis process?

    Select one:
    a. Enterprise environment factor
    b. Risk register
    c. Risk management Plan
    d. Cost management Plan

  39. Q39. The only output of qualitative risk analysis ¡s risk register updates. When the project manager updates the risk register he will need to include several pieces of information including all of the following except for which one?

    Select one:
    a. Watch list of low-priority risks
    b. Risk probability impact matrix
    c. Trends quantitative risk analysis
    d. Risks Groped by categories

  40. Q40. Which of the following ¡s MOST appropriate method to evaluate the potential impact of legal, regulatory. And contractual requirements on business objectives?

    Select one:
    a. Communications with business process stakeholders
    b. Compliance oriented business impact analysis
    c. mapping of compliance requirements to policies and procedures
    d. Compliance oriented gap analysis

  41. Q41. You are the project manager of the GHT Project. This project will last for 18 months and has a project budget of $567,000. Robert, one of your stakeholders, has introduced a scope change request that will likely have an impact on the project costs and schedule. Robert assures you that lie will pay for the extra time and costs associated with the risk event. You have identified that change request may also affect other areas of the project other than just time and cost. What project management component is responsible for evaluating a change request and its impact on all of the project management knowledge areas?

    Select one:
    a. Project change control system
    b. Risk anal sis
    c. Integrated change control
    d. Configuration management

  42. Q42. You work as a project manager for BlueWell Inc. Management has asked you to work with the key project stakeholder to analyze the risk events you have identified in the project. They would like you to analyze the project risks with a goal of improving the project’s performance as a whole. What approach can you use to achieve this goal of improving the project's performance through risk analysis with your project stakeholders?

    Select one:
    a. Use Qualitative risk quickly analysis to quickly assess the probability impact of risk events
    b. Focus on the high-priority risks through qualitative risk analysis
    c. Involve stakeholders for risk ¡identification only in the phases where the project directly affects them.
    d. Involve subject matter experts in the risk analysis activities

  43. Q43. Wendy has identified a risk event in her project that has an impact of $75,000 and a 60 percent chance of happening. Through research, her project team learns that the risk impact can actually be reduced to just $15,000 with only a ten percent chance of occurring. The proposed solution will cost $25,000. Wendy agrees to the $25,000 solution. What type of risk response ¡s this?

    Select one:
    a. Mitigation
    b. Transference
    c. Enhancing
    d. Avoidance

  44. Q44. Which of the following is described by the definition given below? “It is the expected guaranteed value of taking a risk:

    Select one:
    a. Risk premium
    b. Certain Value assurance
    c. Certainty equivalent value
    d. Risk Value guarantee

  45. Q45. Mary is the project manager for the BLB project. She has instructed the project team to assemble, to review the risks. She has included the schedule management plan needed for the quantitative risk analysis process. Why is the schedule management plan needed for quantitative risk analysis?

    Select one:
    a. Mary will utilize the schedule controls to determine how risks may be allowed to change the project schedule.
    b. Mary will utilize the schedule controls and the nature of the schedule for the quantitative analysis of the schedule.
    c. Mary will schedule when is s are likely to happen and affect the project schedule.
    d. Mary will use the schedule management plan to schedule the risk identification meetings throughout the remaining project.

  46. Q46. You arc an experienced Project Manager that has been entrusted with a project to develop a machine which produces auto Components. You have scheduled meetings with the project team and the key stakeholders to identify the risks for your project. Which of the following is a key output of this process?

    Select one:
    a. Risk management Plan
    b. Risk Categories
    c. Risk Register
    d. Risk Breakdown Structure

  47. Q47. Judy has identified a risk event in her project that will have a high probability and a high impact. Based on the requirements of the project, Judy has asked to change the project to remove the associated requirement and the associated risk. What type of risk response is this?

    Select one:
    a. Avoidance
    b. Transference
    c. Not a risk response, But a change request
    d. Exploit

  48. Q48. You are working in an enterprise. You project deals with important files that are stored on the computer. You have identified the risk of the failure of operations. To address this risk of failed, you have guided the system administrator sign off on the daily backup. This scenario ¡s an example of which of the following?

    Select one:
    a. Risk acceptance
    b. Risk mitigation
    c. Risk Avoidance
    d. Risk transference

  49. Q49. Your company is covered under a liability insurance policy, which Provides various liability coverage for information security risks, including any physical damage of sets, hacking attacks. etc. Which of the following risk management techniques is your company using?

    Select one:
    a. Risk transfer
    b. Risk mitigation
    c. Risk acceptance
    d. Risk avoidance

  50. Q50. The Identify Risk process determines the risks that affect the project and document their characteristics. Why should the project team members be involved ¡n the Identify risk process?

    Select one:
    a. They are the individuals that will need a sense of ownership and responsibility for risk events.
    b. They are the individuals that will most likely cause and respond to the risk events.
    c. They are the individuals that will l have the best responses for identified risks events within the project.
    d. They are the individuals that are most affected by the risk events.

  51. Q51. You are the project manager for BlueWell Inc. You have noticed that the risk level in your project increases above the risk tolerance level of your enterprise. You have applied several risk responses. Now you have to update the risk register in accordance to risk response process. All of the following are included in the risk register EXCEPT for which item?

    Select one:
    a. Risk triggers
    b. Network diagram analysis of critical path activities
    c. Agreed upon response Strategies
    d. Risk owners and their responsibility

  52. Q52. Jenny is the project manager for the NBT projects. She is working with the project team and several subject matter experts to perform the quantitative risk analysis process. During this 1OCSS she and the project team uncover several risks events that were not previously identified. What should Jenny do with these risk events?

    Select one:
    a. The events should be entered into qualitative risk analysis.
    b. The events should risk analysis.
    c. The event should be entered into the risk register
    d. The event should be determined if they need to be accepted or responded to.

  53. Q53. You are working as the project manager of the ABS project. The project ¡s for establishing a Computer network ¡n a school premises. During the project execution. The school management asks to make the campus Wi-Fl enabled. You know that this may impact the project adversely. You have discussed the change request other stakeholders. What will be your NEXT step?

    Select one:
    a. Analyze the impact
    b. Update project management plan.
    c. Update risk management plan.
    d. Issue a change request.

  54. Q54. You are the project manager of a SGT project. You have been actively communicating and working with the project stakeholders. One of the outputs of the “manage stakeholder expectations” process can actually create new risk events for your project. Which output of the manage stakeholder expectations process can create risks?

    Select one:
    a. An organizational process asset updates
    b. Project document updates
    c. Project management plan updates
    d. Change requests

  55. Q55. Ben works as a project manager for the MJH Project. In this project, Ben is preparing to identify stakeholders so he can communicate project requirements. Status, and risks. Ben has elected to use a salience model as part of his stakeholder identification process. Which of the following activities best describes a salience model?

    Select one:
    a. Grouping the stakeholder based on their level of authority (“power”) and their active involvement (“influence’) ¡n the project.
    b. Describing classes of stakeholder based on their power (ability to impose their will), urgency (need for immediate attention), and legitimacy (their ii involvement is appropriate).
    c. Grouping the stakeholder on their level of authority (“power”) and their level or concern (“interest”) regarding the project outcomes.
    d. Influence/impact grid, grouping the stakeholders based on their active involvement (“influence”) ¡n the project and their ability to affect changes to the project’s planning or execution (“impact”).

  56. Q56. You arc completing the qualitative risk analysis process with your project team and are relying on the risk management plan to help you determine the budget. Schedule for risk management, and risk categories. You discover that the risk categories have not been created. When the risk categories should have been created?

    Select one:
    a. Risk identification process
    b. Create work breakdown structure process
    c. Define Scope process
    d. Plan risk management process

  57. Q57. You are the project manager of the NKJ Project for your company. The project’s success or failure will have a significant impact on your organization’s profitability for the coming year. Management has asked you to identify the risk events and communicate the event’s probability and impact as early as possible in the project. Management wants to avoid risk events and needs to analyze the cost-benefits of each risk event ¡n this project. What term is assigned to the low-level of stakeholder tolerance in this project?

    Select one:
    a. Risk-reward mentality
    b. Mitigation-ready project management
    c. Risk evidence
    d. Risk utility Functions

  58. Q58. Which of the following ¡s the MOST important reason to maintain key risk indicators (KR1s)?

    Select one:
    a. Complex metrics require fine tuning
    b. In order to avoid risk
    c. Threats and vulnerabilities change overtime
    d. Risk report is needed to be timely

  59. Q59. You are the project manager of GHT project. Your hardware vendor left you a voicemail saying that the delivery of the equipment you have ordered would not arrive on time. You identified a risk response strategy for this risk and have arranged for a local company to lease you the needed equipment until yours arrives. This ¡s an example of which risk response strategy?

    Select one:
    a. Transfer
    b. Avoid
    c. Mitigate
    d. Acceptance

  60. Q60. Fred is the project manager of a large project in his organization. Fred needs to begin planning the risk management plan with the project team and key stakeholders. Which plan risk management process tool and technique should Fred use to plan risk management?

    Select one:
    a. Information gathering techniques
    b. Variance and trend analysis
    c. Planning meetings and analysis
    d. Data gathering and representations techniques

  61. Q61. Which of the following is the priority of data owners when establishing risk mitigation method?

    Select one:
    a. Antivirus controls
    b. Intrusion detection
    c. Platform accurately
    d. User entitlement changes

  62. Q62. Which of the following is NOT true for risk governance?

    Select one:
    a. Risk governance requires reporting once a Year.
    b. Risk governance SCOKS to reduce risk exposure and vulnerability by fining gaps in risk policy.
    c. Risk governance is a systemic approach to decision making processes associated to natural and technological risks.
    d. Risk governance is based on the principles of cooperation, participation, mitigation and sustainability, and ¡s adopted to achieve more effective risk management.

  63. Q63. You are the IT manager in Bluewll inc. you identify a new regulation for safeguarding the information processed by a specific type of transaction. What would be the First action you will take?

    Select one:
    a. Assess whether existing controls meet the regulation
    b. Meet with stakeholders to decide how to comply
    c. Analyze the key risk in the compliance process
    d. Update the existing security privacy policy

  64. Q64. Shelly ¡s the project manager BUF project for her company. In the project Shelly needs to establish some rules to reduce the influence of risk bias during the qualitative risk analysis process. What method can Establish take to best re e the influence of risk bias?

    Select one:
    a. Establish Definition of the level of probability and risk events
    b. Definitions of the risk cause rather than the person identifying and impact of risk event
    c. Establish risk boundaries
    d. Group stakeholders according to positive and negative stakeholders and then complete the risk analysis

  65. Q65. You work as the project manager for Bluewell Inc. There has been a delay ¡n your project work that ¡s adversely affecting the project schedule. You decide, with your stakeholders’ approval, to fast track the project work to get the project clone faster. When you fast track the project, what ¡s likely to increase?

    Select one:
    a. Quality control concerns
    b. costs
    c. Risk
    d. Human resource needs

  66. Q66. You work as a Project Manager for Inc. You have to measure the probability, impact, and risk exposure. Then, you have to measure how the selected risk response can affect the probability and impact of the selected risk event. Which of the following tools will help you to accomplish the task?

    Select one:
    a. Project network diagrams
    b. Cause and effect diagrams
    c. Delphi technique
    d. Decision tree Analysis

  67. Q67. Thomas is a key stakeholder in your project. Thomas has requested several changes to the project scope for the Project you are managing. Upon review of the proposed changes, you have discovered that these new requirements are laden with risks and you recommend to the change control board that the changes be excluded from the project scope the change control board agrees with you. What component of the change control system communicates the approval or proposed change request?

    Select one:
    a. Integrated change control
    b. Configuration management system
    c. Change log
    d. Scope change control system

  68. Q68. You are the project manager of a HGT project that has recently finished the final compilation process. The project customer has signed off on the project completion and you have to do few administrative closure activities. In the project, there were several large risks that could have wrecked the project but you and your project team found some new method to resolve the ricks without affecting the project costs or project completion date. What should you do with the risk response that you have identified during the project’s monitoring and contorting process?

    Select one:
    a. Include the risk responses in the organizations lessons learned database.
    b. Include the risk responses in the risk management plan
    c. Include the risk responses in the project management plan.
    d. Nothing the risk responses re included in the project’s risk register already.

  69. Q69. Which of the following BEST describes the utility of a risk?

    Select one:
    a. The potential opportunity of the risk
    b. The finance incentive behind the risk
    c. The usefulness of the risk to individual groups
    d. The mechanics of how a risk works

  70. Q70. Ben is the project manager of the CMH Project for his organization. He has identified a risk that has a low probability of happening, but the impact of the risk event could save the project and the organization with a significant amount of capital. Ben assigns Laura to the risk event and instructs her to research the time, cost, and method to improve the probability of the positive risk event. Gen then communicates the risk event and response to management. What risk response has been used here?

    Select one:
    a. Sharing
    b. Exploit
    c. Enhance
    d. Transference

  71. Q71. You are the project manager of HGT Project. You are ¡n the first Phase of the risk response process and are doing following tasks: Communicating risk analysis results. Reporting risk management activities and the state of compliance, interpreting independent risk assessment findings, and identifying business opportunities. Which of the following process are you performing?

    Select one:
    a. Mitigating risk
    b. Tracking Risk
    c. Articulating Risk
    d. Reporting risk

  72. Q72. Your project spans the entire organization. You would like to assess the risk of your project but worried about that some of the managers involve the project could affect the outcome of any risk identification meeting. Your consideration ¡s based on the fact that some employees would not want to publicly identify risk events that could declare their supervision as poor. You would like a method that would allow participants to anonymously ¡identify risk events. What risk identification method could you use?

    Select one:
    a. Isolated
    b. Delphi technique
    c. Root cause analysis
    d. SWOT analysis

  73. Q73. Jane ¡s the project manager of the NHJ Project for his company. He has identified several positive risk events within his project and he thinks these events can save the project time and money. Positive risk events, such as these within the NHJ Project are referred to as?

    Select one:
    a. Benefits
    b. Residual risk
    c. Opportunities
    d. Contingency risk

  74. Q74. There are four inputs to flic Monitoring and Controlling Project Risks process. Which one of the following will NOT help you? the project manager, to prepare for risk monitoring and controlling?

    Select one:
    a. Change requests
    b. Risk Register
    c. Work performance Information's
    d. Project Management Plan

Answers: project manager Quiz Questions

  1. d
  2. d
  3. c
  4. b
  5. a
  6. d
  7. a
  8. d
  9. a
  10. b
  11. c
  12. d
  13. d
  14. c
  15. c
  16. a
  17. c
  18. a
  19. c
  20. b
  21. c
  22. b
  23. a
  24. d
  25. a
  26. d
  27. b
  28. c
  29. b
  30. c
  31. c
  32. c
  33. a
  34. c
  35. b
  36. d
  37. d
  38. a
  39. b
  40. b
  41. c
  42. b
  43. a
  44. c
  45. b
  46. b
  47. a
  48. b
  49. a
  50. a
  51. b
  52. c
  53. a
  54. d
  55. b
  56. d
  57. d
  58. c
  59. c
  60. c
  61. d
  62. a
  63. a
  64. a
  65. c
  66. d
  67. a
  68. a
  69. c
  70. c
  71. c
  72. b
  73. c
  74. a