Which of the following is a consideration when determining a project's ESG factors?
A. Project management methodology
B. IT infrastructure security
C. Proper accounting practices
D. Corporate values compliance
Explanation: Corporate values compliance is a consideration when determining a project’s ESG factors, because it reflects how a project aligns with the ethical standards and social responsibility of the organization. Corporate values compliance can help to enhance the reputation, trust, and loyalty of the organization among its stakeholders, as well as to avoid legal or regulatory issues that may arise from violating the values. Corporate values compliance can also influence the project scope, objectives, deliverables, and stakeholders, as well as the project management methodology, processes, and practices. The other options are not directly related to ESG factors. Project management methodology is the approach or framework that guides how a project is planned, executed, monitored, and controlled. IT infrastructure security is the protection of the hardware, software, network, and data components of a project from unauthorized access, use, modification, or destruction. Proper accounting practices are the rules and standards that govern how financial transactions and statements are recorded, reported, and audited for a project.
Several months after a project has ended, a project team member is still charging time to the project and is unable to charge time to new projects. Which of the following did the project manager neglect to do?
A. Remove the team member's access.
B. Release the project resources.
C. Collect the stakeholders' feedback.
D. Have the closeout report approved.
The quarterly financial report displays losses from a project even though the project was completed successfully several weeks ago. Which of the following actions should the project manager perform next?
A. Remove access.
B. Complete the project sign-off.
C. Release the resources.
D. Outline the lessons learned.
Explanation: The project sign-off is the formal acceptance of the project deliverables by the client, stakeholder, or customer. It also marks the closure of the project and the release of the final payment. If the project sign-off is not completed, the project may still incur costs and liabilities, which can explain the losses in the financial report. Therefore, the project manager should complete the project sign-off as soon as possible to avoid further losses12.
A project manager and team are reviewing a task that is supposed to take nine days to complete and cost $3,000. There is a 20% chance that an associated risk related to changing requirements could occur, resulting in rework that would add an additional five days and $1,000 in costs. Which of the following represents the total amount that should be budgeted for the task?
A. 9 days and $3,000
B. 10 days and $3,200
C. 12 days and $3,800
D. 14 days and $4,000
Explanation: The total amount that should be budgeted for the task is calculated by adding the expected value of the risk to the original estimate. The expected value of the risk is the product of the probability and the impact of the risk. In this case, the expected value of the risk is 0.2 x (5 days and $1,000) = 1 day and $200. Therefore, the total amount that should be budgeted for the task is 9 days and $3,000 + 1 day and $200 = 10 days and $3,2001.
A project was closed according to the planned project schedule. Security teams later identified that one of the contractors stole data after the project's closure. Which of the following would have most likely prevented the data from being stolen?
A. Removing access
B. Closing contracts
C. Project sign-off
D. Project evaluation
Explanation: Removing access means revoking the contractor’s permissions to access the project data, systems, and devices after the project is closed. This is a crucial security measure to prevent unauthorized access, misuse, or theft of sensitive data by external parties. Closing contracts, project sign-off, and project evaluation are important steps in the project closure process, but they do not necessarily prevent data theft by themselves. They may involve formal agreements, documentation, and feedback, but they do not address the technical aspects of data security. References = CompTIA Project+ Study Guide: Exam PK0-005, Third Edition, Chapter 14: Closing the Project, page 3771; 9 Ways to Prevent Third-Party Data Breaches in 20232; 3 Ways to Prevent Data Theft by Contractors3
During the progress of a project, the stakeholders require the delivery of multiple milestones with proper presentation of functionalities. Which of the following is the best methodology to use?
A. Waterfall
B. SDLC
C. XP
D. Scrum
Explanation: Scrum is an agile methodology well-suited for projects that require frequent milestone deliveries and functionality demonstrations. It emphasizes iterative development, with regular presentations to stakeholders, which aligns with CompTIA Project+ principles for agile project management.
Which of the following statements best represents a network issue?
A. The development team on the fourth floor is unable to access servers and email services.
B. Cell phones served by a specific telecom company are getting a "no service" message.
C. A user cannot connect to Wi-Fi because of a wrong ID or password.
D. A user is receiving an automatic reply message saying that an email address does not exist.
A vendor manager communicates to the project manager that a shipment of new devices required for the completion of a project is delayed. The supplier is planning to deliver the devices two months after the agreed-upon date. Which of the following should the project manager do first?
A. Hold the project until the devices are delivered.
B. Evaluate the impact to baselines.
C. Request another supplier to ship devices.
D. Update the project timeline with a new project end date.
Explanation: Evaluating the impact to baselines (such as schedule and budget) helps determine the delay’s effect on the project. This aligns with CompTIA Project+ guidance on project control, which emphasizes analyzing impacts before taking corrective actions.
Which of the following activities should a project manager perform during the closing phase? (Select three).
A. Lessons learned
B. Risk analysis
C. Removing resources
D. Acquiring resources
E. Statement of work sign-off
F. Stakeholder analysis
G. Removing access
Explanation: During the closing phase, a project manager should conduct lessons learned sessions, release resources, and remove access. These actions align with CompTIA Project+ standards for project closure, focusing on finalizing project deliverables, releasing resources, and documenting insights.
An IT infrastructure change request needs to be implemented in the production environment. Which of the following elements are the most important prerequisites? (Select two).
A. Rollback plans
B. Project management plan
C. Deployment plan
D. Asset management plan
E. Communication plan
F. Resource management plan
Explanation: A rollback plan is a contingency plan that describes how to revert the system to its previous state in case the change fails or causes problems. A rollback plan is important to minimize the impact of a failed change and ensure the system’s availability and functionality12. A deployment plan is a document that outlines the steps and procedures for implementing the change in the production environment. A deployment plan is important to ensure the change is executed smoothly, efficiently, and securely, and that the system meets the expected performance and quality standards34.
A customer requests some changes to a product, and those changes are approved by the CCB. Which of the following should be changed first?
A. ROI
B. KPI
C. RACI
D. SOW
Explanation: The SOW (statement of work) is a document that defines the scope, deliverables, schedule, and resources of a project. It is a contractual agreement between the buyer and the seller that should be changed first when there are approved changes to the product. Changing the SOW will ensure that the project expectations and requirements are updated and aligned with the customer’s requests. The other options are not documents that need to be changed first, but rather metrics or tools that can be used to measure or manage the project.
A fix that was not submitted to the CCB for approval was applied to an application. Although the change did not have negative consequences, the sponsors expressed concern to the project manager. Which of the following should the project manager do first to prevent this situation from reoccurring?
A. Meet with the team and highlight the importance of change management.
B. Roll back the process and submit a change request.
C. Document the event as a lesson learned.
D. Remove the team member who bypassed the CCB process.
Explanation: Meeting with the team to emphasize the importance of following change management procedures is the best approach to prevent future unauthorized changes. CompTIA Project+ highlights the importance of adhering to formal change control processes to ensure project alignment and accountability.
Page 6 out of 25 Pages |
Previous |