Project Management Professional: Sample Exam Questions & Answers 2

Thursday, October 30, 2008

Sample Exam Questions & Answers 2

1. All of the following are true about lag except

A. the successor task must start later relative to the predecessor task.

B. the successor task should start later relative to the predecessor task but this can be altered by other aspects of network logic.

C. it can be used with all of the dependency relationship types.

D. it is represented in network logic tables and diagrams with a plus (+) sign.

2. The four types of risk response plans are

A. Avoidance, Acceptance, Mitigation and Transfer

B. Acceptance, Insurance, Mitigation and Transfer

C. Avoidance, Contingency Planning, Insurance and Mitigation

D. Acceptance, Mitigation, Contingency Planning, and Transfer

3. The Request Seller Responses process

A. often represents a significant project cost when extensive subcontractor contributions are needed.

B. involves obtaining responses from prospective sellers on how project needs can be met.

C. involves the receipt of bids or proposals and the application of the evaluation criteria to select a provider.

D. requires significant negotiation skills to complete with predictable success.

4. The recommended first step in integrated change management is to

A. do a preliminary assessment of the change request.

B. update the change disposition file.

C. notify the requestor that the change request has been received.

D. add the change request to the agenda for the next meeting of the review committee.

5. Which of the following would not suggest that the task could be completed sooner by adding more resources?

A. A programming task includes screen development and data modeling.

B. A telephone installer must connect ten new telephone lines into the trunk line array (a 0,6 x 0,4 meter metal box).

C. A three by four meter room must be painted.

D. Several experiments must be conducted in which the response of mice to various dosages of a new drug will be assessed.

6. Market demand, business needs and technological advances are all potentially reasons for conducting a project. This basis is captured in which document?

A. Enterprise environmental factors.

B. Preliminary project scope statement.

C. Project selection criteria.

D. Project charter

7. Cost budgeting is the process of

A. allocating the project budget to the various identified work activities in order to establish a basis for the project estimate.

B. reconciling the project budget to the various identified work activities in order to establish a basis for the project contingency reserve.

C. allocating the overall cost estimate to individual work activities to establish the basis for the project contingency reserve.

D. aggregating the estimated costs of individual schedule activities or work packages to establish a total cost baseline for measuring project performance.

8. Scope verification is the process of

A. progressively elaborating and documenting the project work that produces the product of the project.

B. obtaining formal acceptance of the project scope by the stakeholders.

C. subdividing the major product deliverables into smaller, more manageable components.

D. influencing the factors that create scope changes to ensure that changes are agreed upon, determining that a scope change has occurred and managing the changes when and if they occur.

9. Software development and automotive engineering belongs to which area of expertise?

A. General management knowledge and skills

B. Understanding the project environment

C. Specialized project knowledge

D. Application area knowledge

10. Bankruptcy of a major supplier was initially judged to be a low probability risk and no risk containment strategy was planned. The supplier did, in fact, go bankrupt. The team must now re-examine their risk plan. Which of the following tool and techniques are most relevant?

A. Variance and trend analysis.

B. Technical performance measurement.

C. Risk audits.

D. Risk reassessment.


ANSWERS:

1.B(A lag refers to a desired delay in the start of a successor task relative to the predecessor task and can be used with any dependency type as FS+, SS+ or FF+ the amount of the desired delay. However, if other predecessor tasks in the network require longer than this delay period to complete, the successor task will start later than the specified delay period. [6.2.2.5]
2.A(The four types of risk responses are 1) Avoidance (change the plan to eliminate the risk), 2) Transference (shift the consequences to a third party), 3) Mitigation (reduce the probability and/or consequences to an acceptable threshold, and 4) Acceptance (acknowledge the risk but take no specific action at this time). [11.5.2.1, 11.5.2.3]
3.B(“The Request Seller Responses process obtains responses, such as bids and proposals, from prospective sellers on how project requirements can be met.” [12.3]
4.A(Not all change requests and worth the time and effort to do a complete benefit/cost analysis. There may not be time (because of approaching deadlines) to implement a change regardless of its merit. The change may have already been considered in a slightly different form. The change may not be consistent with project objectives. A preliminary screening assessment is necessary. Meredith and Mantel, pp 536-539 [4.6]
5.B(Duration compression is only feasible when the work can be meaningfully divided into smaller, largely independent pieces. Screen development and data modeling are clearly distinct. One painter can paint two walls and another painter can paint the other two walls. Different researchers can each be responsible for one of the experiments. It is probably not feasible to have more than one person working in a 60 x 40 centimeter area. [6.5.2.3]
6.D(Projects are usually chartered and authorized as a result of one or more of the following: Market demand, business need, customer request, technological advance, legal requirement or social need. [4.1]
7.D(Answer D is the PMBoK definition. Although in practice answer A is often true, it is not recommended by PMI as best practice. Answers B and C are activities in risk management. [7.2]
8.B(“Scope verification is the process of obtaining the stakeholder’s formal acceptance of the completed project scope and associated deliverables.” [5.4]
9.D(Application areas are categories of projects that have common elements significant in such projects but are not needed or present in all projects. They are usually defined in terms of functional departments, technical elements (software development), management specializations and industry groups (automotive). [1.5.2]
10.D(“…if a risk emerges that was not anticipated in the risk register … the planned response may not be adequate. It will then be necessary to perform additional response planning to control the risk.” [11.6.2.1]

No comments: