Project Management Professional (PMP) - Online Sample Test for Certification exam Preparation
Which of the following tool/ technique are unplanned responses to risks that were previously unidentified?
Project risk reviews
Risk response audits
You have been hired as a project manger for a local community college. The community college wants you to design and develop a custom student registration web site, so that student can select and register for their classes online. Your project is nearly complete. However near the end of the project your team experienced some technical difficulties that caused cost overrun and schedule delays. This information may be useful in future projects in all of the following activities except:
You are the project manager within an information technology department of a large retailer In order to allow for better real-tracking, in inventory control, and supply chain management, in inventory control, and supply chain management, your company in financing a project to install and to install and deploy RFID on all items of merchandise. As the project manager, you’ve just completed the select sellers’ process, and selected 5 different vendors on your qualified sellers list who has responded to your company’s RFP. One of the vendors remaining the qualified sellers list is RFID-PM Inc. although you have no financial interest in this company, one of yours old high school buddies, Terence, sits on the board of directors of this company. Is there a conflict of interest in this situation?
Depending on the depth of your friendship with Terence, a conflict of interest could exist
In order to protect your privacy, you only have to disclose your relationship with RFID-PM, Inc. if you are directly Questioned
Since neither you nor your family members has any financial interests in this company there is no conflict of interest
Because of your friendship with Terence, a conflict of interest exist that must be disclosed immediately
Which of the following statements are true regarding project risk management?
None of the statements are true
Qualitative risk analysis involves numerically analyzing the impacts of identified risks
Risk monitoring and control involves tracking identified risks and executing risk response
Risk identification involves how to plan and execute risk management activities
Risk management planning involves determining which risks might affect the project
You r the project manager at a large accounting firm in the United States. Throughout the year your firms provides both the consulting services and accounting/auditing services to XYZ Widgets, Inc, a publicity traded company listed on a New York stock exchange. Currently your project involves auditing and financial statements to XYZ widgets, in the preparation of annual shareholders meeting. While your team is in the midst of project execution, you are informed that your project is cancelled due to new SEC regulations. Specially a new SEC rule prohibits accounting firm from providing both auditing services and consulting services to the client, due to the potential conflicts of interest that could rise from such business relationship. As a result your project is cancelled and budget for your project is cut. For necessary budget your project team is banned and your project members go their separate ways. Which of the following types of project ending is this considered?
Which of the following tools/techniques can be used to help ensure that project work tasks will NOT be duplicated by multiple team members?
Change control board
Work authorization system
Change control system
The Monitor and Control Project Work process is performed to monitor project processes and performance. Which of the following are you LEAST concerned with during this process?
Maintaining the integrity of baselines by releasing only approved changes
Providing information to support status reporting
Analyzing and tracking project risks
Assessing performance to determine whether corrective actions are necessary
Comparing actual performance against project management plan
You are the project manager within and information technology department of a large retailer. You are responsible for updating the network infrastructure of the company. As a project manager, you are in the Select Sellers process, and have four different vendors on your qualified sellers list. One of the vendors on your list has invited you to lunch to a very highclass and expensive restaurant. In fact, a meal can cost anywhere from $500-$1000 USD. What should you do?
You should review your company’s policy on the type of gifts you can accept
You can accept the invitation, as there shouldn’t conflict of interest with this invitation
You can accept the invitation, since such lunch invitations are generally okay, regardless of how expensive the meal is.
You should decline the invitation, as this may give appearance of impropriety
You should decline the invitation, as you have not selected a vendor yet. This may give an unfair advantage to the seller
Keeping up with the growth was becoming a problem for a privately owned Chinese financial services company. Although it easily lured business from state-owned competitors, low skill levels and weak accounting systems threaten the company’s cash flow. Moreover, poorly invested assets were delivering inadequate returns. Hence, you have been assigned over an existing project to upgrade the IT system to allow for an expansion. Specifically, the IT upgrade will enable the company to serve more competitors, expand the product line, gain market share, and win more licenses. The previous project manager for the project lacked an understanding of project management principles. In fact, upon close investigation, you’ve determined that the project lacks clearly defined project deliverables and lacks management control. Which of the following would be the BEST approach to resolve these short comings?
Implement a network authorization system
Subdivide the project deliverables into smaller, more manageable components until the work is defined to the work package level
Implement a project control system
Incorporate a system life cycle approach to the project
Integrate a lessons learned for each project phase
Which of the following is true regarding configuration control board?
A CCB describes how change request will be managed and tracked
A CCB is a collection of procedures that describes how to submit change request
A CCB defines the level of authority needed to approve changes
A CCB has the authority to approve or project request
1. PMP Practice Test - 8
2. PMP Practice Test - 7
3. PMP Practice Test - 6
4. PMP Practice Test - 5
5. PMP Practice Test - 4
6. PMP Practice Test - 3
7. PMP Practice Test - 2
8. PMP Practice Test - 1
9. PMP Mock Exam - 10
10. PMP Mock Exam - 9
11. PMP Mock Exam - 8
12. PMP Mock Exam - 7
13. PMP Mock Exam - 6
14. PMP Mock Exam - 5
15. PMP Mock Exam - 4
16. PMP Mock Exam - 3
17. PMP Mock Exam - 2
18. PMP Mock Exam - 1
19. PMP Sample Test - 10
20. PMP Sample Test - 9
21. PMP Sample Test - 8
22. PMP Sample Test - 7
23. PMP Sample Test - 6
24. PMP Sample Test - 5
25. PMP Sample Test - 4
26. PMP Sample Test - 3
27. PMP Sample Test - 2
28. PMP Sample Test - 1
29. PMP Mock Test - 10
30. PMP Mock Test - 9
Most Dangerous Animal in the World
The Best Cars
Unique Potato Chips Flavors