Uploaded by Puneet Gandhi

ITAE004 MCQ

advertisement
Q. Which of the following tools was developed by Kaoru Ishikawa,?
 Cause and Effect Diagram
 Tornado diagram
 Event trees
 Discrete Event Simulation
Q. Which of the following threats is intentional threat?
 Failure to update the information required for the execution of a project
 A sudden breakdown in a machine
 Hurricanes
 Modification in the database of an organisation
Q. Which of the following means lack of reliability on any measurement arising out of
limited precision of measurement?
 Variability
 Uncertainty
 Criticality
 Probability
Q. In which of the following does the failure of one event lead to the failure of another
event?
 Portfolio of risk
 Schedule risk analysis
 Cost risk analysis
 Cascading risks
Q. Which of the following practices is followed when enabling a risk mitigating plan?
 Incorporate changes in scope
 Perform cost-benefit analysis only once
 Prioritise countermeasures
 Exclude the existing countermeasure in
Q. Which of the following standards is used in gap analysis?
 COBIT
 ISO
 NIST
 All of these
Q. _____ measures the size of an error in percentage terms.
 MAPE
 MAD
 MSD
 Standard deviation
Q. Which of the following categories implies that threats exploiting a vulnerability
may result in loss of assets or resources which may affect an organisation's
operations and reputation?
 High-risk category
 Medium-risk category
 Low-risk category
 No-risk category
Q. Who needs to determine the main aim behind conducting of risk analysis, while
planning a risk analysis?
 CEO
 Risk analyst
 Department manager
 General manager
Q. Which of the following letters is Used to denote pessimistic time?
A
B
M
P
Q. ______ used in the field of medicine to check the behaviour of clinical risk
models.
 Cause and effect diagram
 Decision tree
 Influence diagram
 ROC Curve
Q. The probability that the risks faced by Adobe will actually materialize will be:
 Between 0 and 1
 Between 1 and 2
 Between 2 and 3
 Between 3 and 4
Q. Which of the following techniques carries out numerous experiments taking
possible input values to determine the corresponding output values for that
experiment?
 What if Scenario
 Simulation
 Regression analysis
 None of These
Q. If the variables move in opposite direction, what is the correlation coefficient.
0
1
 -1
 Between 1 and 2
Q. Which of the following statements is true for tornado diagram?
 The length of a bar signifies the level of sensitivity of the objective of a project
to a risk
 The risks are presented in a ascendent
 The beginning of a bar indicates variable
 The risks are presented in a descending order, with the variable having the
maximum impact on the top and the one having the minimum impact at the
bottom.
Q. The boundaries of a project are defined in _____
 Project plan
 Project scope
 Project analysis
 Project report
Q. What is the degree of quadratic objective function?
1
3
2
4
Q. Which of the following types of exploit exploits system's vulnerability without
requiring any prior access to the vulnerable system?
 Local exploit
 Global exploit
 Remote exploit
 Technical exploit
Q. Which of the following letter denotes forecasting error?
F
A
E
R
Q. Which of the following tools was developed by kaoru Ishikawa?
 Cause and Effect Diagram
 Tornado diagram
 Event trees
 Discrete Event Simulation
Q. What was Adobes' major issue in terms of getting consumers' insight?
 Lack of good quality data
 Unavailability of a holistic view
 Problems in cross-functional collaborations
 All of these
Q. The results and recommendations of the BIA are then reported to _____
 Employees
 Suppliers
 Higher authorities
 Clients
Q. What is the weaknesses in a project that makes it prone to risk is called?
 Threat
 Vulnerability
 Exploit
 Danger
Q. Which of the following analysis is conducted by a business to identify the gap
between current state and future state?
 SWOT analysis
 Gap analysis
 Business impact analysis
 Customer analysis
Q. Which of the following method does not reflect the level of risk?
 Single-point estimate
 Three-point estimate
 Two-point estimate
 Zero-point estimate
Q. Which of the following sensitivity measures/indices ascertains the relative
importance of an activity?
 Criticality Index
 Cruciality Index
 Significance Index
 Schedule Sensitivity
Q. What is the risk related to ruling political party is called?
 Technical risk
 External risk
 Political risk
 Management risk
Q. The type of data that Adobe requires for better management of its risk can be:
 Qualitative data
 Quantitative data
 Both qualitative and quantitative da
 None of these
Q. Which of the following methods was invented by Olaf Helmer and Norman Dalkey
of the RAND Corporation in the 1950s for the US Air Force to predict the impact of
technology on warfare?
 Expert judgement method
 Delphi method
 Moving averages method
 Sales force composite method
Q. ________ used in the field of medicine to check the behaviour of clinical risk
models.
 Cause and effect diagram
 Decision tree
 Influence diagram
 ROC Curve
Q. How can organisation check if the failure of a single server does not affect the
performance of other servers?
 By measuring the load
 By adding a new server
 By removing an existing serve
 All of these
Q. Which of the following is a possible reason for project delay?
 Loss of goodwill
 Burden of additional costs
 Non-availability of quality resources
 Taxation
Q. Which of the following means lack of reliability on any measurement arising out of
limited precision of measurement?
 Variability
 Uncertainty
 Criticality
 Probability
Q. Which of these is related to Market Risk?
 Interest Rate
 Production
 Employees
 Advertisement
Q. Cost of design is an example of _____ costs.
 Indirect
 Direct
 Miscellaneous
 All of these
Q. Which of the following categories implies that threats exploiting a vulnerability
may result in loss of assets or resources which may affect an organisation's
operations and reputation?
 High-risk category
 Medium-risk category
 Low-risk category
 No-risk category
Q. What are the are the limitations associated with budget constraints, time, and
access to information in risk-based approach called?
 Uncertainties
 Certainties
 Frame conditions
 Consequences
Q. Which of the following methods assumes that what happened in the immediate
past will happen in the immediate future as well?
 Moving averages method
 Exponential smoothing methods
 Trend projection method
 Naive method
Q. Which of the following is a part of the CBA report?
 Details of the threat/vulnerability pair that is
 Recommended countermeasure to mitig
 Likelihood percentage and impact scor
 All of these
Q. Which of the following represents the value placed exactly at the centre of the
distribution series?
 Mean
 Median
 Mode
 Variance
Q. Which of the following should be implemented which record all the changes made
to the document and maintain all its versions?
 Training
 Version control
 Physical controls
 Technical controls
Q. In ______________ the best likely estimate of each input variable is used to
determine the outcome of the analysis.
 Financial management
 Risk analysis
 Risk mitigation
 Budgeting
Q. Which of the following method does not reflect the level of risk?
 Single-point estimate
 Three-point estimate
 Two-point estimate
 Zero-point estimate
Q. Which of the following indicates the combined effect of severity, occurrence, and
detection?
 Risk assessment number
 Risk log
 Risk priority number
 Risk criticality level
Q. Which of the following shapes is used to depict a function in an influence
diagram?
 A rounded rectangle
 A rectangle
 An oval
 A hexagon
Q. Which of the following statements is true about milestone?
 It depicts interdependencies between the milestones.
 It reflects uncertainty
 It does not provide the schedule of a project in a clear and concise manner
 The chart may become complicated for a project having a large number of
milestones
Q. What is process of process of bringing the steel to an optimal state by using a
disciplined heating cooling schedule called?
 Extraction
 Simulation
 Annealing
 Engineering
Q. Which of the following is a contract between a service provider and a customer
defining the level of service to be provided?
 Service level agreement
 Legal agreement
 Buyer's level agreement
 Relationship development agreement
Q. In a decision tree, decisions are represented by _____
 Squares
 Rectangles
 Circles
 Pentagons
Q. Which of the following standards is used in gap analysis?
 COBIT
 ISO
 NIST
 All of these
Q. Adding a password to a system, making additions to project Scope are examples
of ________
 Modification
 Interception
 Fabrication
 Interruption
Q. Which of the following constraints puts the upper limit on some function of a
decision variable?
 ==
≤
=
≥
Q. The standard deviation of any distribution is always
 Negative
 zero
 Positive
1
Q. Which of the following steps of the management of vulnerability involves
determining of the severity of the impact when vulnerabilities are exploited by
threats?
 Discover
 Assess
 Report
 Verify
Q. Which of the following helps project managers to determine dness of the
countermeasure by comparing its costs benefits?
 Investment analysis
 SWOT analysis
 Cost-benefit analysis
 Gap analysis
Q. What is the weaknesses in a project that makes it prone to risk?
 Threat
 Vulnerability
 Exploit
 Danger
Q. Which of the following should be implemented which record all the changes made
to the document and maintain all its versions?
 Training
 Version control
 Physical controls
 Technical controls
Q. What type of assumptions contradict the major principle of risk analysis, which is
to provide an unbiased report?
 Conservative
 Perceptive
 Pro-active
 Preventive
Q. Which of the following categories of NSUAP describes the sources of the numeral
or its production process?
 Assessment
 Numeral
 Pedigree
 Spread
Q. Which of the following contains historical data that can be used to create a list of
potential risks for the current project?
 Risk registers
 Risk repository
 Checklists
 Balance sheets
Q. ______ is the maximum possible time required to complete the activities of the
projects.
 Optimistic time
 Pessimistic time
 Most likely time
 Unlikely time
Q. Which of the following indicates the combined effect of severity, occurrence, and
detection?
 Risk assessment number
 Risk log
 Risk priority number
 Risk criticality level
Q. What is the document created during the early stages of a project to log potential
risks in a new project called?
 Risk plan
 Risk register
 Risk log
 Risk register and Risk Le
Q. Which type of relationship is shown by ROC Curve?
 Positive
 Inverse
 Zero
 Negative
Q. Products going from off-line mode to on-line mode pose which kind of risk?
 Financing Risk
 Operating Risk
 Market Risk
 Systematic Risk
Q. The sequence of the scheduled activities that takes the longest time to complete
is known as the_______.
 Project Schedule
 Critical path
 Project plan
 Scope of the project
Q. Which of the following is the most common type of spreadsheet error?
 inappropriate use of basic operators
 Input of wrong data
 Incorrect representation of variables
 Accidental errors
Q. Which of the following is not a responsibility of risk analysis team?
 Identify and acknowledge the threat
 Evaluate the probability of a risk's
 Manage the least prioritised risk
 Review the project activities, re-estimate existing risks,
Q. In which step of the process of creating the next generation of solutions, a
random gene is inserted in an offspring to maintain the diversity in population?
 selection
 Mutation
 Crossover
 Rejection
Q. In risk analysis ______ is determined on the basis of consequences of failure.
 Probability
 Level of criticality
 Chances of success
 Probability and Level of Critici
Q. Which of the following should be maintained within the allocated budget?
 Projected profits
 Projected losses
 Costs
 Changes in scope
Q. Which of the following is the main source of uncertainty?
 Abundance of information
 Measurement error
 Conflicting nature of information
 Lack of information or data
Q. In which century did Charles Darwin gave the theory of evolution?
 Seveteenth century
 Mid nineteenth century
 Mid eighteenth century
 Sixteenth century
Q. Which of the following is a part of the CBA report?
 Details of the threat/vulnerability pair that is to be mitigated
 Recommended countermeasure to mitigate risk
 Likelihood percentage and impact score of the threat/vulnerability
 All of these
Q. Which of the following statements is true?
 The planning of risk analysis ends with the problem definition
 The first question that any risk analyst needs to ask, why to identify the risks
 While planning a risk analysis, an analyst needs to determine the main aim
behind conducting of analysis
 Risk analysis should be carried just once in a b…
Q. Who assimilates the information received from the questionnaires and develops
the copies of the information received in Delphi technique?
 Manager
 Organiser
 Departments head
 Facilitator
Q. Which of the following issues can affect the perception of a project to the
neighbouring public?
 Legal issues
 Political issues
 Social issues
 Financial issues
Q. _______ can help project managers to ascertain the best solutions to mitigate
project risks.
 P- | Matrix
 Iteration
 Feasibility test
 Threat-Likelihood-Impact Matr
Q. Which of the following values describes the location of the distribution?
 Mode
 Median
 Standard deviation
 Mean
Q. In which of the following categories of threats does project data become
unavailable or unusable or get destroyed?
 Interception
 Modification
 Interruption
 Fabrication
Q. Which of the following categories implies that threats exploiting a vulnerability
may result in loss of assets or resources which may affect an organisation's
operations and reputation?
 High-risk category
 Medium-risk category
 Low-risk category
 No-risk category
Q. If you enter a wrong formula, what type of spreadsheet errors have you made?
 Inappropriate use of basic operators
 Incorrect representation of variables
 Accidental errors
 Input of wrong data
Q. Which of the following is the smallest level of a deliverable which cannot be
broken down further.
 Work group
 Work package
 Project timelines
 Work deliverable
Q. Which of the following is not a responsibility of risk analysis team?
 Identity and acknowledge the threats of every within a project
 Evaluate the probability of a risk's occurrence
 Manage the least prioritised risks only
 Review the project activities, review status identified risks, re-estimate existing
risks, and new ones
Q. What type of skills must be presented in a risk analyst to understand the financial
aspect of the risk and work on Financial tools.
 Decision-making skills
 Industry and market knowledge
 Negotiation skills
 Financial acumen
Q. Which of the following statements is true about the moving/ forecasting method?
 They cannot be modified for time series with
 They can be easily adjusted for past errors
 They cannot be easily modified for making future
 They are not ideal for situations where prepared
Q. Which of the following can be used to plot trend plots?
 Cumulative percentiles
 Mean
 Standard deviations
 All of these
Q. What are the are the limitations associated with budget constraints, time, and
access to information in risk-based approach called?
 Uncertainties
 Certainties
 Frame conditions
 Consequences
Q. ______ measures the size of an error in percentage terms.
 MAPE
 MAD
 MSD
 Standard Deviation
Q. Which of the following refers to adjusting the project schedule according to the
availability of resources?
 Resource levelling
 Resource scheduling
 resource allocation
 All of these
Q. Which of the following contains historical data that can be used to create a list of
potential risks for the current project?
 Risk registers
 Risk repository
 Checklists
 Balance sheets
Q. Which of the following can be a result of threats in a project?
 Loss of confidentiality
 Loss of integrity
 Loss of availability of required re
 All of these
Q. In risk analysis, ________ is determined on the basis of consequences of failure.
 Probability
 Level of criticality
 Chances of success
 Probability and Level of Criticality
Case Study:
Q. What was Adobes major issue in terms of getting consumers insight?
 Lack of good quality data
 Unavailability of a holistic view
 Problems in cross-functional collaboration
 All of these
Q. The type of data that Adobe requires for better management of its risk can be:
 Qualitative data
 Quantitative data
 Both qualitative and quantitative data
 None of these
Q. The probability that the risks faced by Adobe will actually materialize will be;
 Between 0 and I
 Between 1 and 2
 Between 2 and 3
 Between 3 and 4
Q. Which of the following provide the probability statements which are essential in
the decision making process?
 Mean
 Relative measures of spread
 Cumulative percentiles
 Median
Q. What is the price of the product paid by an organisation for developing or
implementing countermeasures called?
 Initial purchase cost
 Facility cost.
 Training cost
 Direct cost
Q. In which of the following types of risk, uncertainties in the cash flow of a business
are dealt with?
 Strategic risk
 Financial risk
 Operational risk
 Credit risk
Q. Which of the following methods of forecasting assumes that the trend is linear
through the historical data points?
 Trend projection method
 Double exponential smoothing
 The single exponential smoothin
 Moving averages method
Q. What are the are the limitations associated with budget constraints, time, and
access to information in risk-based approach called?
 Uncertainties
 Certainties
 Frame conditions
 Consequences
Q. In which of the following categories of threats does project data become
unavailable or unusable or get destroyed?
 Interception
 Modification
 Interruption
 Fabrication
Q. Which of the following statements is true?
 The infrastructure of a projects does not require to planned at an early stage
 The infrastructure remains same for all type of projects.
 In the absence of adequate infrastructure, ther be major delays in the
completion of a project.
 It is the sole responsibility of the project man plan and arrange the required
infrastructure throughout the execution of a project.
Q. Which of the following helps businesses to helps to calculate the completion time
of the entire project.
 Cost risk analysis
 Schedule risk analysis
 Cost breakdown structure
 All of these
Q. What type of assumptions contradict the major principle of risk analysis, which is
to provide an unbiased report?
 Conservative
 Perceptive
 Pro-active
 Preventive
Q. What sort of data is income?
 Ratio
 Interval
 Ordinal
 Nominal
Q. Which of the following helps businesses to helps to calculate the completion time
of the entire project.
 Cost. risk analysis
 Schedule risk analysis
 Cost breakdown structure
 All of these
Q. In ________ , the best likely estimate of each input variable is used to determine
the outcome of the analysis.
 Financial management
 Risk analysis
 Risk mitigation
 Budgeting
Q. Which of the following calculates the difference between the squares of the
errors?
 MAPE
 MAD
 MSD
 Correlation coefficient
Q. Which of the following is a technique used to evaluate potential financial, safety,
regulatory, legal contractual and reputational effect of risk on business operations?
 Business planning
 Business impact analvsis
 SWOT analysis
 Customer analysis
Q. Under which group, Solver add-in option can be found on the Data tab in
Microsoft Excel?
 Forecast Sheet
 Analyze
 Outline
 Data tools
Q. Which of the following practices is followed when enabling a risk mitigating plan?
 Incorporate changes in scope
 Perform cost-benefit analysis only
 Prioritise countermeasures
 Exclude the existing countermeasure
Q. In which type of approach, the initial word of WBS element would comprise a
verb, such as construct, make, design and test?
 Noun-type approach
 Verb-type approach
 Organisational approach
 Functional approach
Q. What is the degree of quadratic objective function?
1
3
2
4
Q. Which of the following components of linear programming is also known as a
coefficient or constant?
 Feasibile region
 Parameter
 Linearity
 Constraint
Q. While creating a business plan, a bank identifies that the opportunity is risky.
Therefore, it decides not to pursue it. What type of risk management options is
adopted by the bank?
 Avoid the risk
 Accept the risk
 Control the risk
 Transfer the risk
Q. _____ is an exploit in which multiple systems access the bandwidth or resources
of a targeted system, thereby blocking its normal traffic.
 SQL injections
 Distributed denial of service
 Denial of service
 All of these
Q. Which of the following methods was invented by Olaf Helmer and Norman Dalkey
of the RAND Corporation in the 1950s for the US Air Force to predict the impact of
technology on warfare?
 Expert judgement method
 Delphi method
 Moving averages method
 Sales force composite method
Q. Which of the following statements is true for tornado diagram?
 The length of a bar signifies the level
 The risks are presented in a ascent
 The beginning of a bar indicates
 The risks are presented in a d
Q. Which of the following statistical tools plots two variables along horizontal and
vertical axes?
 Receiver Operating Characteristic
 Scatter Plot
 Tornado diagram
 Pie chart
Q. _________ is the maximum possible time required to complete the activities of
the projects.
 Optimistic time
 Pessimistic time
 Most likely time
 Unlikely time
Q. Which of the following estimates is the shortest possible time within which the
project can be completed?
 Optimistic time
 Pessimistic time
 Most likely time
 Critical time
Q. Which of the following methods is also known as the grassroots approach?
 consumer market survey method
 Expert judgement method
 Sales force composite method
 Delphi method
Q. Which of the following statements is true
 End-to-and security is not required to be installed on the systems and devices
used in project management.
 Managing threat is the sole responsibility of a project manager
 The CEO of the company must monitor the environment regularly to identify
potential threats that are likely to impact a project.
 Access to the systems must only be given to authorised personnel.
Q. Which of the following methods is used to solve LP problems in Microsoft Excel's
Solver?
 SUMPRODUCT
 Simplex LP
 GRG Linear
 GRG Nonlinear
Q. Which of the following is the most common type of spreadsheet error?
 Inappropriate use of basic operators
 Input of wrong data
 Incorrect representation of variables
 Accidental errors
Q. Which of the following is a financial source of risk
 Goodwill loss
 Poor product or service quality
 Change in the ruling party
 Stock market fluctuations
Download