Passing RMP From The First Time Daniel-Yeoman
Passing RMP From The First Time Daniel-Yeoman
www.dogearpublishing.net
ISBN: 978-145750-018-3
This book is printed on acid-free paper.
PMI did not participate in the development of this publication and has not
reviewed the content for accuracy. PMI does not endorse or otherwise sponsor this
publication and makes no warranty, guarantee, or representation, expressed or
implied, as to the accuracy or content. PMI does not have any financial interest in this
publication, and has not contributed any financial resources.
The author and publisher took care in the preparation of this book, but make no
expressed or implied warranty of any kind, and assume no responsibility for errors
or omissions. No liability is assumed for incidental or consequential damages in
conjunction with, or arising out of, the use of the information contained within.
Secondary Editors:
Robert B. Childress
Robert H. Winkler
Cynthia Holmberg
PREFACE
ACKNOWLEDGEMENTS
FORWARDS
INTRODUCTION
Objectives
Risk Definition
The PMI Risk Management Process: An Overview of PIER-C
Performing Risk Activities
Other Basic Concepts to Remember
Risk Management Process: Keys to Success
Project Manager’s Role in Risk Managemen
Activity 1: Risk Management Process Overview
APPENDIX C: ACRONYMS
APPENDIX E: INDEX
This book is designed for Project Managers and other professionals who want
to attain the PMI-RMP certification. It takes you through a journey of a proven Risk
Management Process, and includes activities and practice test questions that will
help achieve the goal of passing the certification examination the first time. In
addition, we are confident your individual abilities to plan and manage risk will be
enhanced through your studies.
I wish you the best of luck on the Risk Management Professional certification
exam. The desire to improve your project management skill set to a deeper level in
the area of risk management is admirable. Study hard, prepare, and pass the test the
first time!
From the first time I met Daniel Yeomans, in early 2008, I suspected there was
something special about him. As a Learning Manager at Microsoft, I was seeking a
consultant to provide Project Management knowledge and expertise to our
employees. Daniel came highly recommended by professionals in the project
management industry, so I expected him to be a very knowledgeable instructor. Not
only did he meet these expectations, but he far exceeded them. As I came to know
Daniel better and witnessed his unmatched enthusiasm, sense of humor, unmitigated
optimism, brilliance and sense of creativity, I saw all of the intangible traits that you
cannot get off of a resume, but are some of the most important qualities of a great
teacher.
Over time, I attended many of the courses that Daniel taught to our organization,
and I was able to see first-hand his knowledge of the subject matter and his ability to
help others “get it”. Daniel was able to present the material in a clear, organized and
engaging manner. He was able to take complicated material and break it down into
manageable pieces and help everyone learn the material, excel when taking their
exams, and apply this newfound knowledge at work in a very significant way. Daniel
has been able to raise the “project management bar” at Microsoft and his contribution
to our organization’s success has been invaluable.
Now that he has published Passing the Risk Management Professional (PMI-
RMP)® Certification Exam the First Time!, even more of what makes Daniel
Yeomans special as a teacher has become apparent. He has the ability to break
through aspects of project management that most find tedious and boring, to reveal
what is fascinating and interesting to students and what drives them in their pursuit of
project management knowledge. By taking a fresh approach, he is able to expose the
student to difficult principles through a process-oriented, proven method that is
motivating, intriguing, compelling, and well...that is just plain fun!
This is, in a nutshell, my opinion of what makes Daniel Yeomans’ book a “must-
read”. As you sift through the chapters, I have no doubt you will forget that you are
learning project management principles and will also have a little fun along the way.
Enjoy!
Dan Yeomans brings theory and practical application together in his work with
Project Management. Dan has several years’ experience helping individuals
understand the necessity and value of identifying and managing their project risks and
issues. His ability to clearly explain principles, and help individuals understand how
Dan is a member of the Project Management Institute (PMI), and the local PMI
Puget Sound Chapter. He also uses his skills to support a number of non-profit
organizations to include the Air Force Sergeants Association (AFSA).
Dan developed more than 50 specific training offerings at both university and
Thank you for purchasing Passing the Risk Management Professional (PMI-
RMP) ® Certification Exam the First Time! The goal of this book is to prepare you to
achieve the Project Management Institute’s Risk Management Professional
Certification (PMI-RMP) the first time. In addition, we are confident this book will
give you some greater insight into Risk Management best practices!
This book uses the following three key references as source documents:
This book is designed to help the reader recognize and accurately respond to
questions regarding specific concepts addressed in each of the four domains of the
RMP certification examination.
We provide a 125 question “final test” you can use to test your readiness to
challenge the PMI-RMP certification examination. This test covers key risk
management objectives stated in PMI literature. It also covers questions in other
areas of project management you may encounter on the test. For example,
Earned Value Technique is a certification objective covered in Chapter 7 of the
PMBOK® Guide.
There are a number of italicized entries in the book. These entries are important
concepts that will likely appear on the certification exam.
Key concepts are repeated more than once throughout this book. This is by
There are four key areas or domains in the PMI Risk Management Professional
Body of Knowledge. The PMI-RMP certification exam covers all four domains. An
in-depth understanding of risk management activities that support each area is critical
to pass the certification exam.
2. Risk Analysis: The Risk Analysis domain includes 30% of all certification
exam questions and concentrates on five (5) of the six (6) Project Risk
Management areas covered in the PMBOK® Guide. The exception, Plan Risk
Responses, is included in the Risk Response Planning domain. PMI
specifically defines four tasks that must be understood in the Risk Analysis
domain.
3. Risk Response Planning: The Risk Response Planning domain includes 26%
of all certification exam questions. This area covers the Plan Risk Response
activity of Risk Management. PMI specifically defines three tasks that must
be understood in the Risk Response Planning domain.
The test is computerized. All questions are multiple choices with four potential
answers. There is only one correct answer for each question. Most test
questions are short and very straight forward. Some include extraneous verbiage
designed to distract. Always try to understand what the question is asking before
responding.
You will have time to write down notes before you start the test. You will be
offered an opportunity to take a 15 minute tutorial on how to use the
computerized testing system. You will also be given pencils and note paper you
can use during the test. This tutorial should not take more than two to three
minutes to complete. It is my recommendation that you take advantage of time
remaining to write down key pieces of information before you begin the actual
test. You may want to consider the following tips at a minimum:
List the six steps of Project Risk Management in the order they occur.
List key inputs, tools and techniques, and outputs for all Project Risk
Management activities.
List key definitions you may wish to reference during the test.
The test consists of 170 questions. 150 are graded. 20 are “Pre-Release” and
not graded. You will not be able to identify the pre-release questions. Therefore,
answer all questions to the best of your ability.
You have 3.5 hours to complete the test. You will have the option to mark
questions you want to review before you finalize the test.
******ebook converter DEMO Watermarks*******
It is a best practice to go through the test one time and answer questions
you are sure of first. Then come back to answer the more difficult
questions. You can “mark” questions you wish to review later.
Testing is conducted at Prometric testing centers. You are able to schedule your
own testing time at the center of your choice once your application is approved.
A calculator is provided for math questions. You will be provided either a hand
held calculator or one will be included on the computer.
Ensure you have two picture IDs when you arrive at the testing center. A locker
will be provided for you to store any personal items.
PMI has not published a passing score for the PMI-RMP credential.
Recommend you strive for a 75% score on all practice tests provided in this
book.
You will be notified of your pass/fail status at the completion of the exam. You
will be given a scorecard that shows your proficiency levels in each of the four
domains of the PMI-RMP Body of Knowledge.
4 www.pmi.org
Recurrent projects generally have the best understood risks. Complex projects
with many unknowns are far more challenging from a risk standpoint.
1. Plan Risk Management: This initial step defines how risk management will be
accomplished (methodology). The ultimate goal is to develop a Risk
Management Plan which describes how the entire end-to-end Risk Management
Process will work.
2. Identify Risks: This step requires you to develop a list of risks by project,
activity, work package, etc. During this step you define the risk, assign initial
ownership, define risk causes, develop initial responses, and categorize each
risk. The key output of Identify Risks is a document referred to as the Risk
Register.
6. Monitor and Control Risks: This is the final step in the Risk Management
Process. During this step, monitor and reassess risks on the Risk Register.
Implement risk responses as necessary. Identify new or Emergent Risks that
were not identified during the Identify Risks activity. In addition, evaluate the
effectiveness of the risk program for the overall project. Look for triggers—an
early warning sign a risk has or will occur. The Risk Register is updated during
this step as well.
Inputs: Always begin each activity by gathering required inputs and providing
them to the Risk Team members performing the activity. Think of inputs as what
you would bring to a planning meeting.
Tools and Techniques: Ensure all Risk Team members are aware of the types of
tools and techniques that will be used. These tools and techniques are used to
transform inputs into outputs. Some tools and techniques work better than others
depending on the type of project and team. Some tools and techniques may
require specific training.
Outputs: Use the appropriate tools and techniques to generate required outputs.
This is the deliverable or product you want to leave the meeting with.
Project Risk Management is NOT an optional activity. PMI states that risk
management activities must be applied to every project!
The risk of not successfully completing a project peaks during the Project
Initiation Process Group. Risk Exposure is reduced through solid risk
management as the project progresses. The potential for project success
increases when risks are identified early in the project management
process.
The level of risk management depth and level of effort should be scaled
and tailored to the project. Extensive risk management activities may be
appropriate for some projects and not others.
Insurable Risks: These are also called “Pure Risks”. Insurable risks are
always negative or threats. In addition, they are outside the Project
Manager’s control. Examples are natural disasters, fire, theft, etc.
Issues and Benefits: Risks are potential events that have not occurred. A
negative risk that occurs is called an issue or problem. A positive event that
occurs is called a benefit. All issues and benefits should be documented in a
formal issues log.
PMO Role: A PMO (Project Management Office) can play a role in risk
management. The PMO is an organization that could share policies, procedures,
templates, etc. A PMO traditionally supports project management in the
organization. This includes risk management. There may be a specific Risk
Management Department assigned to your organization to address risk
management specifically.
The “Seven Constraint Model”: According to PMI, there are seven (7)
constraints that drive risk tolerance levels. Revisiting this model will prove
beneficial. This model supplements traditional constraints of scope, time, and
cost with resources, risk, quality, and customer satisfaction. It is used to
describe stakeholder risk tolerance areas.
Manage risk on a daily basis from the Initiating Process Group through Closing
Process Group.
Ensure a Risk Management Plan is developed and approved. Promote the need
to have and follow a Risk Management Process.
Include risk as part of periodic project status meetings. Communicate risk status
to all key stakeholders.
True
Question or
False
Project risk is normally highest during the project Executing Process
1.
Group.
2. The first step in the Risk Management Process is Identify Risks.
The Plan Risk Responses activity occurs in the Project Planning
3.
Process Group.
Three of the most common constraints that determine stakeholder
4.
tolerance levels include scope, resources, and stakeholder expectations.
The Project Manager must attempt to attain an organizational
5.
commitment to the value of risk management.
Management Reserves are defined as reserves to address unknown
6.
risks.
A risk that is identified early in the Risk Management Process is called
7.
an Emergent Risk.
8. Pure Risks are always classified as negative.
Stakeholder risk attitudes and tolerances can impact overall risk
9.
prioritization and response efforts.
The Risk Register is initiated as part of the Plan Risk Management
10.
activity of the Risk Management Process.
A tailored Risk Management Process and strategy applicable to the project and
adapted to meet stakeholder requirements, expectations, and attitudes.
Rules that will govern and guide the execution of all Project Risk Management
Processes. Direction on how Project Risk Management will be integrated with
all other project management processes.
Input Applicability
Project Scope Defines range of possibilities for a project and deliverables.
Statement Lists project objectives and assumptions.
Cost Defines how risk budgets and contingency/Management Reserves
Management will be reported and assessed. Defines budget
Plan tolerance/thresholds.
Schedule
Defines how schedule contingencies will be reported and
Management
assessed. Defines schedule tolerance/thresholds.
Plan
Communications
Defines interactions among stakeholders. Outlines who is
Management
available to share risk information with.
Plan
Enterprise
Risk attitudes and tolerances. The degree of risk an organization
Environmental
is willing to tolerate.
Factors
Includes risk categories, definitions, templates, roles and
Organizational
responsibilities, information on organizational risk tolerances,
Process Assets
etc.
Tools: There are many tools that can be used to support the overall Project Risk
Management Process. This includes rules of use, definitions, terms, etc.
Matching the right tool and technique to the right process is also highly
recommended.
Project Related Criteria: What are the required results for cost, time, scope,
and quality? How can risk impact these results?
The Risk Management Plan becomes part of the Project Baseline and must be
approved by management. The table that follows provides a breakout of
recommended entries that should be considered.
Risk
Management
Comments
Plan
Consideration
What approach will be used to manage risk? What tools or data
Methodology sources might be leveraged? Consider a Risk Breakdown Structure
(RBS).
Roles and Define lead support, and team membership for risk planning.
Responsibilities Define the Risk Team.
How will the cost of risk be incorporated in the Cost Performance
Budgeting
Baseline? How will Contingency Planning occur?
How often will risk management be performed? Weekly is the
Timing
norm.
Risk Which risk categories impact the project? A common method is
Categories assigning risk by time, scope, quality, and/or cost.
Probability equals the chances a risk event will occur. Impact
Definitions of
equals the consequences of the risk event to the project. Be able to
Probability and
define both and determine how risks will be prioritized based on
Impact
these indicators.
What levels of risk are acceptable?
Financial
Factor Low Risk Medium Risk High Risk
Returns on this and Returns on this
Returns on this project
similar projects will project will be
will be subject to major
be calculated, and assessed to be within
assumptions and wide
exceed the financial normal business
Return variances in possible
criteria. Cash inflow practices. Cash flow
outcomes. Cash flow is
will be large and will be continuous
uncertain. Returns cannot
early in the project throughout the
be easily measured.
life. project life.
All costs are known. Cost estimates for
Cost analysis has not
Costs are set and not some components are
Costs been done. Estimates are
expected to exceed not known or not
difficult to attain.
budget. quantified.
Budget Sufficient budget is Questionable budget Doubtful budget is
Size allocated. allocated. sufficient.
Some questions Source of funds in doubt
Budget Funds allocated
about availability of or subject to change
Constraints without constraints.
funds. without notice.
Cost Well established and System in place, System lacking or
Controls in place. weak in some areas. nonexistent.
Risk Tolerance Areas: These are areas where key stakeholders are willing
to accept risk. These areas should be identified.
Define Project Objectives: Define objectives to include time, cost, scope, and
quality that may be impacted by risk as accurately and clearly as possible.
Avoid ambiguity.
Compliance: Ensure key organizational policies and procedures are adhered to.
Accommodate key governance criteria and methods.
2. Categorization
3. Risk Utility
4. Assumptions
8. Constraints
This activity will produce the first iteration of the Risk Register. The Risk
Register should include the risk, cause and triggers, Risk Owner, categories, and
initial risk response. The initial iteration of the Risk Register will NOT include risk
prioritization, analysis, Risk Scores, or detailed responses. Some key points to
remember:
Each risk should have a single Risk Owner. The Risk Owner will be validated
and possibly changed during the Plan Risk Responses activity. The Project
Manager acts as the default Risk Owner if another Risk Team member is not
identified.
There is no limit to the number of risks identified. The more risks identified, the
better!
The Identify Risks activity should include input from multiple stakeholders.
Team members need to be included in the Identify Risks activity as well.
Creating a sense of ownership with the stakeholders responsible for managing
risk is critical.
The Risk Register serves as a key input for all Risk Management Process
activities to follow. The Risk Register will be updated as the Risk Management
Process progresses through the PIER-C process. Risk Register creation is an
iterative process.
PMI defines risk meta-language as a method that enables the Project Manager
to effectively identify and describe risks. This three-step method to develop a
risk statement is illustrated:
Input Applicability
Risk Defines processes and strategy to accomplish end-to-end Project
Management Risk Management. Defines methodology, roles, and availability of
Plan Resource Breakdown Structures.
Activity Cost Where there are cost estimates, there is risk. Consider stakeholder
Estimates tolerances and thresholds when costs are estimated.
Activity
Where there are time duration estimates, there is risk. Consider
Duration
stakeholder tolerances and thresholds.
Estimates
Includes Scope Statement, WBS, and WBS Dictionary. Scope
Statement lists assumptions. WBS defines activities at the
Scope Baseline
summary, control account, or work package levels. WBS also
defines the nature of a project as a first of its kind or recurring.
Includes key information about stakeholders. Normally includes:
Identification Information
Stakeholder
Register Assessment Information: Requirements, expectations, interest
and influence factors
A key goal of Delphi Technique is to share the end results with all
who participated. Sharing information allows the experts who
participated to expand their knowledge base. In addition, feedback
will likely be generated that assists in identifying more risks than
initially identified.
Root Cause Identification: This is the same as Cause and Effect Analysis
(Synonymous with Ishikawa Diagramming and Fishbone Diagramming.)
Grouping risks by common causes can aid in developing more effective
risk responses.
Prompt List: This is a generic list of categories where risks may be found. This
list is used to “prompt” ideas and risk identification.
FMEA: Failure Modes and Effect Analysis (FMEA) is a tool that identifies
potential failure modes, determines effects of each failure, and seeks ways to
******ebook converter DEMO Watermarks*******
mitigate the probability and impact of each failure.
Tools and techniques applicable to the Identify Risks activity should be defined
in the Project Risk Management Plan. In addition, roles, responsibilities, and key
stakeholders who should participate in the Identify Risks activity should be defined
as well.
Remember this key point: The initial Risk Register will be updated during the
next steps in the Risk Management Process. The Risk Register acts as an input for all
Risk Management Process steps that follow.
The initial Risk Owner and Risk Response are defined during the Identify Risks
activity. This information will be revisited and validated during the Plan Risk
Responses activity.
Testing Note: Remember the entries recommended for inclusion in the initial Risk
Register. They include:
4. Risk Categorization
Sources: Use multiple sources to find and identify risks—the more sources the
better. In addition, solicit inputs from multiple stakeholders to obtain multiple
perspectives.
New Risk Validation: Always ask for as much information as needed to clearly
define any new risks reported. Always share new risks with as many
stakeholders as needed in an effort to learn as much as possible about the cause,
risk, and effects.
Risk Statements: Remember that the best risk definition uses the risk meta-
language methodology; cause-risk-effect. Goals are to achieve the proper level
of detail and reduce ambiguity.
Link Risks to Objectives: Remember that each risk should have the potential to
impact a key project objective. (Scope, Time, Cost, Quality). Do not list a risk
that does not impact a project objective.
Risk Types: Remember to identify both positive risks and negative risks. We
tend to key on the negatives and often forget to identify the positives. Avoid lost
opportunities!
Ownership: Initial Risk Owners are assigned during the Identify Risks activity.
Remember that each risk should have a specific owner. There should only be
one Risk Owner for each risk. Every agreed to, and funded risk response, must
have a Risk Owner.
******ebook converter DEMO Watermarks*******
Visibility: The Risk Register needs to be made available to all project
stakeholders for review. In addition, the Risk Register should be used as a
primary tool to review risks at periodic project status meetings.
True
Question or
False
The Identify Risks activity produces the final iteration of the Risk
1.
Register.
Checklist Analysis is a fast and efficient means of identifying new risks
2.
missed during the initial review.
Another term for Delphi Analysis is group intelligence. It allows
3.
experts to review the final results and provide additional feedback.
SWOT analysis is a practical means to gather information from a group
4.
of selected stakeholders and rank order the inputs.
The Stakeholder Register provides a strategy for managing stakeholder
5.
expectations.
The worst thing to do during a brainstorming session is to evaluate
6.
participant responses.
The Risk Register should have restricted access and not be made
7.
available to all project stakeholders.
The Risk Register is an essential input that will allow for development
8.
of a comprehensive Risk Management Plan.
Roles and responsibilities supporting the Identify Risks activity are
9.
defined during the Plan Risk Management activity.
10. Emergent Risks should be added to the Risk Register.
The ultimate goal of Perform Qualitative Risk Analysis is to update the initial
Risk Register.
The Project Network Diagram shows dependencies for all activities and
identifies where paths converge. In the figure below, multiple activities
flow from Activity A. Greater levels of path convergence increase risk
probability and impact.
Input Applicability
Risk Defines roles, responsibilities and methodologies to evaluate risks.
Management Also provides definitions for probability and impact that are the
Plan core of this activity.
Provides the initial list of risks to be evaluated. The Risk Register
Risk Register
will be updated during this activity.
Scope Defines project objectives and assumptions. Provides a detailed
Statement definition of project scope. Lists constraints.
Includes risk databases, historical information, studies of previous
Organizational
projects, templates, Lessons Learned, etc. May include Risk Rating
Process Assets
rules.
Risk Probability and Impact Assessment: All risks should be evaluated and
scored for probability (also called likelihood) and impact (also called
consequence or effect). A consistent scoring system for all risks should be used.
Remember that the values for probability and risk should already be defined in
the Risk Management Plan.
Impact: Impact is defined as the consequences the risk event will have on
the project. Impact should be linked to project objectives. Remember that
primary project objectives are scope, time, cost, and quality. Scoring can
be based on many factors specific to the project. It is not uncommon to use
weighted impact ratings that may assign higher values to higher impact
risks. For example, if schedule is the number one project priority, rate risks
impacting schedule higher than others. The numeric score used for impact
is also called a Risk Rating.
Focusing on high priority risks is the best means to improve overall project
performance.
Remember this key concept: Describing your Risk Rating criteria and
developing a Probability and Impact Matrix reduces potential for bias and
improves overall analysis.
Bias may be desired. It may be desirable to create bias toward high priority
risks. For example, if schedule is the number one priority, rules that rate
schedule risks higher than other types or categories should be established and
implemented.
The best way to reduce bias during Qualitative Risk Analysis is to define levels
for probability and impact, and provide a Probability and Impact Matrix to
reduce subjectivity of results.
Ranking or prioritizing risks: Risk Ratings for all risks should be added to the
Risk Register. Each risk probability and impact is assigned a Risk Rating.
Multiply the probability and impact Risk Ratings to calculate a Risk Score.
Project Risk Score: Add all individual Risk Scores to calculate the Project Risk
Score. Risk Exposure is a term that defines the level of risk on a project. The
Project Risk Score determines Risk Exposure. Acceptable levels of Risk
Exposure are based on stakeholder attitudes, tolerances, and thresholds.
Risks requiring near-term responses: These are risks on the “Urgent List”. The
higher the Risk Score, the more urgent the risk.
“Watch Lists” of low priority risks: The Project Manager is the primary owner
of risks on the Watch List.
This table shows how the Risk Register evolves at the completion of Perform
Qualitative Risk Analysis. Note that key terms and concepts are underlined and in
italics on this example. A number of updates are applied to the Risk Register at the
end of this step.
Probability Impact
Risk Risk
Risk Cause Category Risk Risk Risk Score
Owner Response
Rating Rating
Add in Add in
Initial Initial Add in Step 3
Step 3 Step 3
This is the “Urgent List” for high priority risks.
Risk Rating within
project: Where the
risk is prioritized
based on Risk
Score.
Draw the line on the Risk Register at the conclusion of Perform Qualitative Risk
Analysis. Risks that are high priority fall on the “Urgent List”. Responses are
developed. Low priority risks are placed on the “Watch List”. Responses are
developed if Risk Score increases.
This is the “Watch List” for low priority risks.
Project Risk Score =
Total of all Risk
Scores
Note 2: The entries in this example are the basic Risk Register entries recommended
by PMI. An actual Risk Register is not restricted to these entries. Remember that the
Project Manager determines what needs to be represented on the Risk Register. Do,
however, remember these entries and this format for test taking purposes.
Note 3: Interviews and meetings are the two most effective means to Perform
Qualitative Risk Analysis.
Define probability and impact criteria in the Risk Management Plan. For
example, if scoring probability on a 1 to 5 scale, what factors would
constitute a score of four? This practice eliminates bias and improves the
quality of your analysis.
Urgency: Urgency levels should be documented and agreed upon. Create some
type of Probability and Impact Matrix that allows prioritization based on score.
Some organizations have a standard Probability and Impact Matrix available as
part of Organizational Process Assets. The matrix does not need to be elaborate.
Here is a second example of a Probability and Impact Matrix in simpler form.
3. Watch List
4. Urgent List
5. Risk Exposure
6. Risk Rating
8. Risk Score
13. Probability
14. Impact
Identify realistic and achievable cost, schedule, scope, and quality targets in
light of risk. Determine Contingency Reserves required for responses to risks.
Input Applicability
Risk
Defines roles and responsibilities and methodologies to evaluate
Management
risks.
Plan
Provides the initial list of risks to be evaluated. The Risk Register
Risk Register
will be updated during this activity.
Cost Sets format and criteria for planning, structuring, estimating,
Management budgeting, and controlling project costs. Controls help establish
Plan approach to Quantitative Risk Analysis of the budget or cost plan.
Sets format and criteria for developing and controlling the project
Schedule
schedule. Controls and nature of the schedule itself will help
Management
structure an approach to Quantitative Risk Analysis of the
Plan
schedule.
Includes risk databases, historical information, studies of previous
Organizational
projects, templates, Lessons Learned, etc. May include Risk Rating
Process Assets
rules.
Remember interviewing takes more time than other tools and techniques. It
takes time to conduct interviews with each individual stakeholder.
The higher the Standard Deviation, the greater the risk. Standard Deviation
is a numeric indicator that helps calculate the range of potential results. It
represents the distance we travel from the mean as we extend across a
normal distribution. The greater the range, the greater the risk. For
example, let’s assume a mean of 20. See how the range changes in the table
below when we compare a Standard Deviation of 2 to a Standard
Deviation of 3.
The following represents the percentage of returns that fall within each Sigma
range assuming a normal distribution or bell curve.
2 Sigma: Results occur within 2 Sigma 95.46% of the time. In the example
above, results using a Standard Deviation of 2 are 16 to 24 at 2 Sigma. The
range in 2 Sigma increases from 14 to 26 when Standard Deviation is
increased to 3. Risk increases as the Standard Deviation increases.
Three Point Estimating and PERT: Three Point Estimating uses the optimistic,
most likely, and pessimistic vales provided by experts to determine the best
estimate. The following example illustrates this concept.
Three Point Averaging takes the three estimates and averages them to
determine the best estimate. Using the example above, add 5 + 10 + 21 = 36.
Divide by 3 to determine the average (36/3 = 12). The best estimate equals 12
days. This is the default method on the PMI-RMP certification test.
Monte Carlo: The results of data gathering and representation techniques are
often recorded using a variety of modeling techniques An example of a typical
Risk A has a 30% chance of occurring and will cost the project
$40,000. This is a negative risk. Using EMV, calculate the required
Contingency Reserves for risk A as (.3 x $40,000 = $12,000). Add
this amount to the project budget.
Risk C has 75% chance of occurring and will cost the project
$60,000. This is a negative risk. Calculate (.75 x $60,000 = $45,000).
Add this amount.
Risk D has a 50% chance of occurring and will cost the project
$30,000. Calculate (.5 x $30,000 = $15,000). Add this amount.
How much in Contingency Reserves is needed for this project? Add up all
negative and positive risk EMV totals. Total Contingency Reserve requirements
equal $68,000.
Contingency $
Risk Probability Maximum Dollar Impact of Risk
Required
A 30% $40,000 $12,000
B 40% ($10,000) ($4,000)
C 75% $60,000 $45,000
D 50% $30,000 $15,000
We add $68,000 to our project budget for Contingency
Total $68,000
Reserve needs.
Here is a variation to the previous scenario. If Risk D occurs, how much is left
in Contingency Reserves? The project started with $68,000 in Contingency
Reserves. A total of $30,000 was required to pay for negative Risk D. There is
now $38,000 remaining in Contingency Reserves.
Here is a second variation. If Risk B occurs, how much is left in the contingency
fund? The project started with $68,000 in Contingency Reserves. The project
gained $10,000 from positive Risk B. There is now $78,000 remaining in
******ebook converter DEMO Watermarks*******
Contingency Reserves after this credit is added.
Cost + Cost: A project has a set cost of $60,000. There is a 60% chance of
incurring additional costs of $40,000 due to shipping delays. What is the total
cost estimate?
Comparisons: Two scenarios may be presented on the exam. Always choose the
option with the lowest costs or highest returns.
Potential Risk Register updates may include, but are not limited to:
Probabilistic analysis of a project: What are potential time and cost outcomes
based on mathematical criteria and analysis?
Prioritized list of quantified risks: What risks are most likely to occur based on
new numeric analysis results?
The Risk Register is updated based on the results of Perform Quantitative Risk
Analysis as shown in the figure below. Note that Perform Quantitative Risk
Analysis is Step 4 in the Risk Management Process.
Modeling: Quantitative Risk Analysis uses models. Select the right model that
supports project analysis needs such as project schedules, individual cost
estimates, decision trees, etc.
Quality Data: Quantitative Risk Analysis is objective. Ensure data sources are
accurate and unbiased. Use tools and techniques such as interviews that help
attain expert input.
Relationships: Look for relationships between multiple risks. Know how one
risk may impact or lead to others.
Seven distinct responses can be taken to address risk. Three responses are
reserved for negative risks. Three responses are reserved for positive risks. One
response is used for both negative and positive risks. An in-depth review of each
response will be discussed in the tools and techniques section.
Risk Owners are confirmed or assigned during Plan Risk Responses. Risk
Owners develop responses, monitor risk status, and implement Contingency
Plans and Fallback Plans if required. Risk Owners can be any stakeholder in the
project. They are BEST used during Plan Risk Responses and Monitor and
Control Risks.
Residual Risks must be accounted for as well. A Residual Risk is one that
remains after a Risk Response Plan or Contingency Plan is implemented. For
The level of detail defined in a risk response should be based on the priority
of the risk. A high priority risk would warrant greater levels of detail than a
lower priority risk.
Risk responses may lead to additional work that could cause the Schedule
Baseline and/or Cost Performance Baseline to change. Solicit approval for this
type of risk response from the Project Sponsor.
1. All risks should be identified in the Risk Register. Generally, responses are
2. Risk Owners are identified initially during the Identify Risks activity. They are
confirmed during the Plan Risk Responses activity.
3. Risk Owners develop Contingency Plans or Risk Response Plans. They also
identify potential triggers. Triggers are any event that provide an early warning
that a risk is about to occur. The response plan is implemented when a trigger
occurs.
4. Fallback Plans are also developed by the Risk Owner. These plans are
implemented if the Contingency Plan does not provide the desired response.
5. Risk Owners monitor all risks they are assigned as owners for. They provide
periodic status updates as required. They respond to risks when required. They
team with Risk Action Owners when responding.
Input Applicability
Risk
Defines roles and responsibilities and methodologies to evaluate
Management
risks.
Plan
Provides the initial list of risks to be evaluated. The Risk Register
Risk Register
will be updated during this activity.
Contingent Response Strategies: There are times when events happen that
indicate a risk will soon occur. These events are called predefined conditions
or triggers. When triggers occur, initiate your Risk Response Plan. For
example, the project defines a contingency response strategy to order 10,000
spare parts from vendor B if vendor A misses planned shipments of spare parts
by more than two days. The trigger occurs when vendor A misses the shipment
by more than two days.
Strategies for Negative Risks and Threats: There are four strategies for
dealing with negative risks. They include:
Acceptance is often the only choice when risks are generated from
external sources, or when risk responses are beyond the control of the
Project Manager.
Strategies for Positive Risks or Opportunities: There are four strategies for
dealing with positive risks. They include:
Share (Sharing): This response enlists the support of a third party to take
advantage of the opportunities presented by a positive risk event.
Partnering with a third party allows both parties to share in the benefits.
This is the opposite of the transfer response.
Here is a visual to aid in understanding specific risk response types and when
they are potentially applied. Plan Risk Responses is Step 5 in the Risk Management
Process as defined in the PMBOK® Guide Chapter 11.
Risk Register Updates: We update the “Risk Owner” and “Risk Response”
sections of the Risk Register at the completion of this step. Residual Risks and
Secondary Risks are also documented.
Risk Related Contractual Decisions: Some responses may result in the need
for third party support. Contractual decisions outline the need for a third party to
support a Risk Response Plan.
Project Management Plan Updates: Update the Risk Register and/or the Risk
Management Plan as required at the conclusion of Plan Risk Responses. A
number of other key project management planning documents are also updated
as a result of Risk Management Process activities.
Project Document Updates: Risk integrates with many other areas. Updating
project documents is a potential result of Plan Risk Responses.
The figure below shows specific areas in the Risk Register updated after step 5
of the Risk Management Process.
Planning: Base the detail of risk responses on the priority of the risk. Ensure
key criteria as timing, resource needs, budget impacts, and schedule
implications are addressed. Remember that the Risk Owner should develop,
manage, and implement risk responses. Risk Action Owners assist Risk Owners
during responses.
Analysis: Ensure the link between the risk and the risk response is clear. Solicit
agreement and buy-in for all responses from applicable stakeholders.
Documentation Updates: Ensure that agreed upon responses are integrated into
the Project Management Plan. Ensure technical documentation is updated as new
information becomes available through risk responses.
Response
Scenario Being
Used
You determine a planned feature is not technically feasible. You
A.
eliminate the feature from the project scope.
You can get a 10% discount from a key supplier if you order 100,000
units. Your project requires 80,000 units. You contact other Project
B.
Managers to determine if there are needs for the additional units to
gain the discount.
There is an opportunity to save over $10,000 if you accept a seller’s
C. offer. Your team agrees the offer is good, but determines not to pursue
it at this time.
You learn of an opportunity to cut three weeks off your project
D. schedule. Resources are available that allow you to crash key critical
activities to increase the probability of achieving the time savings.
You learn that a competitor is attempting to replicate one of your key
products. You add additional technical features that cannot be
E.
duplicated which will prevent the competitor from building a like
product.
You add incentives to increase the probability of early completion of
F.
a key work package by a critical vendor.
Your team does not have the expertise to eliminate a key safety risk.
G. You spend $10,000 to enlist the support of a third party vendor who
will respond to the risk.
You learn that a new external regulation was discovered that adds
H. risk to completing your project within budget. You determine that you
will deal with any risks that materialize when they occur.
A new Project Manager heard there is a risk response that can be
I.
used to address both positive and negative risks.
There are two key risks to your project schedule. You develop a
J. training program to respond to the first. For the second risk, you
develop a prototype which will enhance testing.
Risk is an iterative process. Risk factors come and go and conditions continually
change. Note that risk is not a one-time activity! The ultimate goal of Monitor and
Control Risks is to stay current on project risk. Risk Monitoring and Control is the
process of:
It should be noted that this is the only activity in Project Risk Management that is not
part of the Planning Process Group. Monitor and Control Risks falls under the
Monitoring and Controlling Process Group.
Input Applicability
Risk Provides the initial list of risks to be evaluated. The Risk Register
Register will be added to during this activity.
Project
This is the approved plan that contains the Risk Management Plan
Management
which describes methodology, roles, reserve considerations, etc.
Plan
Work This is an activity or work package based status that describes
Performance deliverable status, schedule progress, and costs incurred. You can
Information determine if risk is a factor.
These reports include Earned Value Technique data such as schedule
Performance
and cost status. They also include forecasting data which is critical to
Reports
recognition and control of risks.
Risk Reassessment: Risk Monitoring and Control often identifies new risks
and requires reassessment of existing risks. In addition, risks that are outdated
should be closed. Risk Reassessment also ensures new risks are identified when
changes to the project are made.
A Risk Review is used to analyze potential risk responses to see if they are
still appropriate. This is a part of Risk Reassessment. A Risk Review may
include changing the order or priority of risks, adjusting the severity of
existing risks, or monitoring Residual Risks.
Many events can drive the need for Risk Reassessment. These events
include occurrences of unknown risks, evaluation of change requests,
project replanning, or conducting a phase end review. Requirements for
Risk Reassessment should be included in the Risk Management Plan.
Risk Audits: Risk Audits examine responses to risk and answer the question,
“How did we do?” Risk Audits also measure the overall effectiveness of the
Risk Management Process. Periodic Risk Audits should be performed to
evaluate the strengths and weaknesses of the overall Risk Management Process.
Risk Audit requirements are also identified in the Risk Management Plan.
Risk Register Updates: The outcomes of Risk Reassessment and Risk Audits
may lead to updates. Actual outcomes from responses may require changes to
the Risk Register.
Watch for triggers that signal the onset of risks. Add new triggers for risks
as they are identified. Develop Contingent Response Strategies.
Updates: Ensure all changes are reflected in the Risk Register. Add new risks,
reprioritize existing risks, and eliminate risks no longer applicable.
Lessons Learned: Take the time to record what is learned for the use of future
Project Managers. Record both positive and negative risk related lessons. PMI
recommends that Lessons Learned sessions be conducted when completing key
project phases or meeting essential project milestones. History does repeat
itself! Lessons Learned help ensure positive history is repeated and negative
history is prevented.
******ebook converter DEMO Watermarks*******
history is prevented.
1. Risk Review
2. Risk Audit
3. Risk Reassessment
4. Residual Risks
******ebook converter DEMO Watermarks*******
5. Secondary Risks
6. Change Requests
7. Management Reserves
8. Contingency Reserves
Risk Governance includes any tools, techniques and outputs from the Monitor
and Control Risks activity.
Risk Governance looks at the complex web of actors, rules, policy, procedures,
and methods regarding risk information collection, communication, analysis, and
how decisions are made.
Risk Governance keys on consistent risk assessment, risk management, and risk
communication.
Risk Governance ensures the goals and objectives of the Board of Directors and
company stockholders are met.
There are two organizations that impact Risk Governance to be aware of:
There are a few key terms that must be understood to calculate Earned Value
Technique.
Earned Value (EV) is the value of work performed. A typical calculation may
look like this: 65% of a $100,000 project is complete. Multiply .65 x $100,000
to determine the EV. EV = $65,000.
Planned Value (PV) is the amount of budget planned to be used at a given point
in the project. It is determined that the project should be 70% complete to this
point. Multiply .7 x $100,000 to determine the PV. PV = $70,000.
Actual Costs (AC) are the actual cost of the project to date. For example, actual
costs for the sample project referenced above are $75,000.
Budget at Completion (BAC) is an expression of the total budget for the project.
Assume BAC is $100,000 for this project scenario.
The Earned Value Technique values described above are used to perform
Earned Value Technique calculations. A review of our values follows:
1. EV = $65,000
2. PV = $70,000
3. AC = $75,000
The illustration that follows uses these values to perform Earned Value
Technique calculations:
A Fixed Price Contract is used when the project service or product is well
defined. A seller provides a price proposal to perform the work exactly as
described by a potential buyer. A Fixed Price Contract may be adjusted.
Time and Material Contracts are quick, short in duration, and are generally
used for services.
True
Statement or
False
Risk Governance is accomplished primarily during the Plan Risk
1.
Management activity of the Risk Management Process.
ISO is an organization developed to inspect final project deliverables
2.
for technical compliance.
A $50,000 project is 50% complete. Actual Costs are $30,000. CPI is
3.
.83.
The buyer accepts the Cost Risk for a Cost Reimbursement type of
4.
contract.
A Cost Plus Percentage of Cost contract poses the lowest level of risk to
5.
a buyer.
Identify Risks is the process of ensuring risk policies and procedures are
6.
understood, followed, consistently applied, and effective.
A key Risk Governance activity is the development of metrics to guide
7.
organizational risk management activities.
Risk Governance is concerned with how policies and procedures are
8.
implemented rather than the creation of policies and procedures.
The primary goal of the IRGC is to facilitate understanding and manage
9. risks that impact society, human health, safety, and the environment as a
whole.
Lessons Learned meetings should be limited to discuss solely what went
10.
well and what could go better.
A quick review of your project reveals a CPI of 1.2. You should
11.
conclude your project is behind on budget.
Types of Organizations
PMI Framework: Know the five Process Groups in the order they occur beginning
with the Initiating Process Group through the Closing Process Group.
A Change Control Log should be created as well. The Change Control Log lists
******ebook converter DEMO Watermarks*******
all change requests processed in support of the project. It also provides status of
changes to include those approved and declined. The project Change Control
Log should be reviewed as a potential source of risks.
1. Cultural and Social Environment: Recognize how the project affects people
and how people affect the project. Risk that stakeholders will not buy-in to
overall project goals increases if this environment is not addressed.
True
Question or
False
All change requests should be listed on a master Issues Log that supports
1.
the project.
The Monitoring and Controlling Process Group follows the Planning
2.
Process Group.
Configuration Management focuses on controlling changes to the project’s
3.
product or service’s functional and physical characteristics.
Team members may be obligated to report to two managers in a Matrix
4.
organizational model.
5. The focus of the Functional organizational model is on projects.
6. “Silo” is a term often associated with the Matrix organizational model.
Stakeholders are refusing to buy-in to overall project goals. In all
7. likelihood, more time should have been spent on the Cultural and Social
Environment.
The PMI Framework consists of six interrelated Process Groups
8.
beginning with Initiating and ending with Closing.
Scope Baseline: The Scope Baseline is a key input that supports many risk
management activities. Remember the three components:
Scope Statement: This is the most defined version of the project’s deliverables.
The Scope Statement defines the type of project as well. The project may be
recurring which makes risk management easier. The project may also introduce
many new variables which increase the level of risk management difficulty.
Work Breakdown Structure (WBS): The WBS lists project activities and work
packages that must be accomplished to complete the project. The WBS may
require updating to reflect additional work required for risk responses. Using
the WBS as a tool in risk management allows identification and tracking of risks
at the summary, control account, and work package levels.
Scope Creep: Scope Creep refers to changes to the project’s scope that is not
processed through the formal change control process. Individuals who implement
Scope Creep are referred to as “Gold Platers”.
Estimating Methods
Buffer Analysis
Sources of Conflict
The Schedule Baseline is the primary output of project time management and
represents the approved and accepted project schedule. The Schedule Baseline
may be adjusted through the project’s formal Integrated Change Control process
to account for risk.
Estimating Methods: There are three basic types of estimating methods used. The
table below provides a brief review of these methods.
Sources of Conflict: Remember that the number one source of conflict encountered
is due to scheduling issues.
Quality
Quality Management Plan Entries
Consideration
What quality standards are pertinent to this project? How will the
team ensure they are met? Examples:
OSHA: Safety
Sarbanes-Oxley
1. Scope Baseline
2. Scope Statement
3. WBS
4. WBS Dictionary
5. Scope Creep
6. Gold Platers
9. Schedule Baseline
13. Buffers
******ebook converter DEMO Watermarks*******
13. Buffers
18. Schedules
Motivational Theories
Leadership Styles
Negotiation Methods
Motivational
Key Points
Theory
Employees believe effort leads to performance. Performance should
Expectancy
be rewarded based on individual expectations. Rewards promote
Theory
further productivity.
All workers fit into 1 of 2 groups. Theory X managers believe
McGregor’s
people are not to be trusted and must be watched. Theory Y
Theory X and
managers believe people should be trusted, want to achieve success,
Y
and are self-directed.
Maslow’s
Maslow stated that motivation occurs in a hierarchal manner. Each
Hierarchy of
level must be attained before moving to the next. (Physiological -
Needs
Safety - Social - Esteem - Self Actualization)
Theory
Achievement
Motivation David McClelland states that there are three needs that must be met
Theory for people to be satisfied. They include achievement, affiliation, and
Leadership Styles: Leadership styles also impact stakeholder support of the Risk
Management Process. Each style must be used on a situational basis.
Leadership
Definition
Style
Directive Tell people what to do.
Coordinate and solicit the input of others. A good Project Manager
Facilitative
is facilitative.
Coaching Train and instruct others on how to perform the work.
Supporting Provide assistance and support as needed to achieve project goals.
Consensus Solve problems based on group input. Strive for decision buy in
Building and agreement.
Consultative Invite others to provide input and ideas.
Autocratic Make decisions without input from others.
Stage Characteristics
Team meets and learns about the project. Roles are discussed. Expect
Forming hesitancy, confusion, anxiety, lack of purpose, and lack of identity.
Productivity is low.
Team begins to address work, technical decisions, and project
management approaches. Conflict can occur which may disrupt the
Storming
team. Leadership is challenged, cliques form, etc. Productivity
decreases.
Team members begin to work together. They adjust individual habits to
Norming accommodate the team. There is open communication, purpose,
confidence, motivation, etc. Productivity improves.
Performing Teams are independent, self-directed, and work through issues quickly
******ebook converter DEMO Watermarks*******
Performing and smoothly. There is pride and trust. Productivity peaks.
Negotiation: This is one of the Project Manager’s key interpersonal skills. Use this
in conjunction with influencing. Here are some important points:
Functional Manager is the term associated with managers who own the project
human resources needed. The Project Manager must negotiate with the
Functional Manager to attain resources and support. Functional Managers may
not always be “willing” providers. There are normally competing projects in an
organization.
The ability to influence multiple stakeholders to attain support for the Project
Risk Management Plan is important. Note these tips for effective negotiating.
Identifying Stakeholders
Lessons Learned
2. Who: Who must we communicate with? Who owns the communications item?
Who authorizes communications? Address stakeholder communications
requirements, including who will receive information, and who is responsible
to ensure information is communicated.
3. Why: Why is the communication important? Why should the receiver care about
the communication? What is the value proposition?
5. When and Where: When should communication occur? What is the optimal
frequency for communications? Where will the communications occur?
The sender is responsible to encode the message and selects the proper medium
to get it to the receiver. Examples include e-mail, fax, face-to-face, etc. The
sender may use a number of communications methods or technology to encode.
The receiver is responsible to decode the message and selects the proper
medium to provide feedback. The receiver may use a number of
communications methods or technology to decode.
Lessons Learned: The primary purpose of Lessons Learned is to help future Project
Managers improve performance. Lessons Learned should be accomplished at the end
of each project phase. Lessons Learned are sometimes referred to as the “Post
******ebook converter DEMO Watermarks*******
Mortem”. Lessons Learned support the Risk Management Process as follows:
Provide past risk communication Lessons Learned and provide ideas to improve
risk communications on future projects.
You will save future Project Teams countless hours of research and reduce
assumptions.
Review past risk responses and Contingency Plans. Evaluate what went well,
what can be done better, and implement improvement ideas.
True or
Question
False
A Theory X manager is one who believes people should be trusted and
1.
are self-directed.
David McClelland is responsible for developing the Achievement
2.
Motivation Theory.
According to Hertzberg’s Theory, salary is a hygiene factor and
3.
responsibility is a motivating agent.
Maslow created the Hierarchy of Needs Theory which places Esteem
4.
on the top rung.
Training and instructing others is an attribute of the Consensus
5.
Building leadership style.
Autocratic leaders generally make decisions with little or no input
6.
from others.
A team entered the Storming phase. Facilitative and Consensus
7.
Building leadership styles are optimal in this phase.
8. Performing is normally a step that a team achieves prior to Norming.
A Functional Manager is a stakeholder who authorizes the Project
9.
Manager.
A Project Manager should spend up to 90% of his or her time
10.
communicating.
A Communications Management Plan should list key stakeholders who
11.
should receive risk related information.
The Stakeholder Register is an output of the Identify Stakeholders
12.
activity and occurs in Initiating.
Risk
Management Acts as Input To Significance
Output
Estimate Costs
Considers impact of risk on project cost
Risk Register PMBOK® Guide
estimating.
Chapter 7
Plan Quality Considers impact of risks on performance
Risk Register PMBOK® Guide metrics, targets, Quality Assurance, and
Chapter 8 Quality Control.
Plan Procurements
Considers impact of risk on end-to-end
Risk Register PMBOK® Guide
procurement process.
Chapter 12
Risk Related Plan Procurements May drive additional procurements to
Contractual PMBOK® Guide provide for third party responses to risk
Decisions Chapter 12 events.
2. Categorization
3. Risk Utility
4. Assumptions
8. Constraints
3. Watch List
4. Urgent List
5. Risk Exposure
6. Risk Rating
8. Risk Score
13. Probability
14. Impact
40%
$80M
Response
Scenario Being
Used
You determine a planned feature is not technically feasible. You
A. Avoid
eliminate the feature from the project scope.
You can get a 10% discount from a key supplier if you order 100,000
units. Your project requires 80,000 units. You contact other Project
B. Share
Managers to determine if there are needs for the additional units to
gain the discount.
There is an opportunity to save over $10,000 if you accept a seller’s
C. offer. Your team agrees the offer is good, but determines not to pursue Accept
it at this time.
You learn of an opportunity to cut three weeks off your project
D. schedule. Resources are available that allow you to crash key critical Enhance
activities to increase the probability of achieving the time savings.
You learn that a competitor is attempting to replicate one of your key
products. You add additional technical features that cannot be
E. Avoid
duplicated which will prevent the competitor from building a like
product.
You add incentives to increase the probability of early completion of
F. Enhance
a key work package by a critical vendor.
Your team does not have the expertise to eliminate a key safety risk.
G. You spend $10,000 to enlist the support of a third party vendor who Transfer
will respond to the risk.
You learn that a new external regulation was discovered that adds
H. risk to completing your project within budget. You determine that you Accept
will deal with any risks that materialize when they occur.
A new Project Manager heard there is a risk response that can be
I. Accept
used to address both positive and negative risks.
There are two key risks to your project schedule. You develop a
J. training program to respond to the first. For the second you develop a Mitigate
prototype which will enhance testing.
You develop some Teaming Agreements with a key supplier to
K. Share
improve levels of cooperation and improve Return on Investment.
1. Risk Review
2. Risk Audit
3. Risk Reassessment
4. Residual Risks
6. Change Requests
7. Management Reserves
8. Contingency Reserves
1. Scope Baseline
2. Scope Statement
3. WBS
4. WBS Dictionary
5. Scope Creep
6. Gold Platers
9. Schedule Baseline
13. Buffers
18. Schedules
Read each question and answer carefully. Answers with explanations are provided at
the end of the test. Try to achieve 75% or approximately 94 questions correct. Take
the test again and again until you can reach and achieve this goal or higher. Can you
achieve 90% (Approximately 113 questions correct)? Go for it!
Question
Question Responses Response
#
1. An objective
process that
assesses the
probabilities and
impacts of risks.
2. A subjective
process that
assesses the
probability of
achieving
specific project
Which of the following statements objectives.
1. regarding Perform Qualitative Risk
Analysis is correct?
3. An objective
process that
analyzes
possible
outcomes and
probabilities.
1. Contingency
Reserves
4. Discretionary
Reserves
1. Define
Probability and
Impact Rating
Systems
2. List categories
You are beginning the Plan Risk of risks
3. Management activity. What is the first
thing you should do? 3. Set up a planning
meeting
4. Determine
available
organizational
process assets
2. Detailed risk
Which of the following areas should be responses
4.
documented in an initial Risk Register?
3. Risk Ratings for
all risks
4. Risk description
and causes
1. Risk A
4. Risk D
1. It addresses
individual risks
2. It provides an
objective
analysis
4. It provides a
numerical
analysis of cost
and schedule
probabilities
1. 75%
4. 95%
1. Risk Related
Contract
Decisions and
the Risk
Management
Plan
2. Risk Register
and Risk
Key inputs from Project Risk Management
8. Management to the Plan Procurements Plan
activity include:
3. Risk
Management
1. $2,000
4. $7,000
1. Coaching
1. Include all
stakeholders in
risk management
and solicit input
from multiple
sources.
2. Support of risk
management
functions can be
expected from
all stakeholders
based on the
Which of the following statements priority of risk
12. management.
regarding risk management is true?
3. Manage each
risk. It only takes
one risk to
destroy a
project.
4. Anticipate
stakeholder’s
risk tolerance
and plan
responses
accordingly.
1. Time, Cost,
Scope, Quality
******ebook converter DEMO Watermarks*******
2. Time, Cost,
Scope,
Communications
You want to ensure all risks are linked
13. to project objectives. Which objectives
3. Scope,
should be considered?
Communications,
Quality,
Resources
4. Communications,
Quality,
Resources,
Schedules
1. An uncertain
event that can
impact the
project
negatively
2. An uncertain
event that can
impact at least
one project
objective
14. Risk is best defined as:
3. An unknown
event that can
impact project
objectives
4. An uncertain
event that occurs
during Project
Executing
1. 100%
4. 70%
1. Part of
Enterprise
Environmental
Factors and
documented in
the Risk Register
2. Part of
Organizational
Process Assets
and documented
in the Risk
Register
1. Risk Register
2. Risk Breakdown
Structure
You want to determine the process and
strategy for accomplishing the overall
17. 3. Risk
Risk Management Process. Where can
this information be found? Management
Plan
4. Stakeholder
Register
1. Perform
Qualitative Risk
Analysis
2. Earned Value
Analysis
A number of Emergent Risks were
18. identified. You listed them in the Risk
Register. What is the next logical step? 3. Perform
Quantitative
Risk Analysis
4. Expected
Monetary Value
2. Allows for
development of
better responses
What is the BEST reason to categorize
19.
risks? 3. Removes
ambiguity and
improves clarity
4. Satisfies risk
meta-language
requirements
2. Evaluate and
qualify the risk
immediately to
determine follow
up actions.
A number of new risks were
discovered during execution of a major
20. 3. Develop a
project deliverable. What should you
response plan
do first to address these new risks?
and brief all key
stakeholders as
soon as possible.
4. Perform a Risk
******ebook converter DEMO Watermarks*******
determine the
potential impact
of each risk.
1. Functional
A Project Manager works in an
organization where many resources 2. Projectized
must come from external groups. At
21.
times, he feels he works for two
bosses. What organizational model is 3. Matrix
being described?
4. Silo
1. 30%
You determined that there is a 60%
chance a risk may occur during month
two of the project. The project is now 2. 24%
22. in its fifth month and a team member
asks what the current probability of the 3. Unknown
risk occurring is now. You should
respond as:
4. 60%
1. 8
2. 28
There are a total of eight stakeholders a
23. project. How many total
communications channels exist? 3. 36
4. 56
1. Integrated
Change Control
2. Configuration
You want to ensure that risks are Management
analyzed for all new proposed change
25.
requests. What component ensures this 3. Risk
will occur? Management
Process
4. Project Scope
Management
1. Stakeholder
Register
2. Stakeholder
Management
You want to ensure you provide project Strategy
risk status to the right stakeholder
26.
******ebook converter DEMO Watermarks*******
Management
Plan
4. Risk Breakdown
Structure
1. Beta Distribution
1. Team
2. Past Project
You completed your Risk Register and Managers
are assigning initial Risk Owners. What
28.
is the BEST source from which to find
appropriate Risk Owners? 3. Sponsors
4. Project
Stakeholders
1. Track as a
Residual Risk.
4. Quantify using
Probability x
Impact.
1. Budgeting,
timing, tracking,
change
management
2. Budgeting,
timing, risk
categories,
change
Which of the following areas should be management
30.
addressed in a Risk Management Plan?
3. Budgeting,
timing, tracking,
risk categories
4. Change
management,
timing, tracking,
risk categories
4. Stakeholder
Register
1. Root Cause
Analysis
4. Nominal Group
Technique
1. Probability and
Impact Matrix
4. Risk Breakdown
Structure
1. Risk Averse
4. Risk Bias
1. Cause, Effect,
Cost
2. Risk, Effect,
Risk Meta-Language uses a three step Cost
35. approach to identify and define risks.
This approach includes: 3. Cause, Risk,
Effect
4. Cause, Risk,
Cost
1. Interviews
2. Affinity Charting
You are reviewing Identify Risk tools
******ebook converter DEMO Watermarks*******
Technique
4. SWOT
1. WBS
2. WBS Dictionary
4. Project Network
Diagram
1. Pre-Mortem
2. Prompt List
Which tool and technique provides a
38. high-level list of generic categories to
be considered for risk identification? 3. FMEA
4. Root Cause
Identification
1. Risk increases
as Standard
Deviation and
Variance
increase
2. Risk decreases
as Standard
Deviation and
Variance
increase
Which of the following statements is
39. true regarding Risk, Variance and 3. Risk decreases
Standard Deviation? as Standard
Deviation
decreases and
Variance
increases
4. Risk increases
as Standard
Deviation
decreases and
Variance
increases
1. Develop a Risk
Response and
assign a Risk
Owner
1. Analogous
You are managing a complex project
that introduces deliverables and
processes new to the organization. 2. Bottom Up
41. There are a number of ambiguities that
need to be addressed as potential risks. 3. Parametric
Which estimating method will serve
this project best?
4. Expert
1. Identifies risks
with the greatest
impact on
project
objectives and
takes time.
2. It is a fast and
objective
analysis
methodology.
Which of the following statements is
42. true regarding Perform Qualitative Risk
Analysis? 3. It is only
accomplished
only as required
and provides a
prioritized list of
risks.
4. Uses numerical
analysis and
scores risks by
probability and
******ebook converter DEMO Watermarks*******
analysis and
scores risks by
probability and
impact.
1. Delphi
Technique
4. Root Cause
Analysis
1. Planning
Meetings
4. Project Scope
Statement
1. Project Manager
1. The probability
that a risk will
occur
1. Monitor and
Control Risks
2. Identify Risks
Risk Governance policy and procedure
47. is applied during which Risk 3. Plan Risk
Management Process activity? Responses
4. Plan Risk
1. Qualitative Risk
Analysis
2. Subjective Risk
What type of analysis will allow you to Analysis
predict the potential impact of multiple
48.
risks on key project schedule and cost 3. Risk Breakdown
objectives? Structure
Analysis
4. Quantitative
Risk Analysis
1. 24 Days
You are asked to use a weighted
estimation method given a pessimistic 2. 23 Days
estimate of 33 days, most likely
49.
estimate of 25 days, and optimistic
estimate of 11 days. What should you 3. 25 Days
estimate for the duration?
4. 33 Days
2. They aid in
refining risk
policies.
4. They address
past and future
situations that
will likely
impact future
projects .
1. Residual Risk
4. Risk Trigger
2. Time and
Your Risk Governance rules require Material
you to strive for contracts that reduce
53. cost and schedule risk to the buyer.
Which contract type should you try to 3. Cost Plus
avoid? Percentage of
Costs
1. Mitigation
4. Acceptance
1. Triangular
******ebook converter DEMO Watermarks*******
2. Tornado
A tool that shows the impact of multiple Diagram
55.
factors on a single variable is called:
3. Uniform
Distribution
4. PERT
1. It must be
performed to
analyze all risks.
2. It always occurs
prior to the
Perform
Qualitative
Analysis
Which statement is true regarding the Activity.
56.
Perform Quantitative Analysis activity?
3. Requires the
Stakeholder
Register as a key
input.
4. May not be
performed on
every project.
1. 15 Days
You are given three estimates to
complete a key project activity. The 2. 16 Days
******ebook converter DEMO Watermarks*******
complete a key project activity. The 2. 16 Days
57. pessimistic estimate is 25 days. Most
likely is 16 days and the optimistic
estimate is 10 days. How much time 3. 17 Days
should you plan for the activity?
4. 19 Days
1. Provides
standard Risk
Breakdown
Structures for
use in all project
types.
2. Provides best
practices and
standards to
improve risk.
management
The primary benefit to consider ISO as performance
58. part of your Risk Governance policy
is?
3. Provides
inspections of
projects to score
risk management
effectiveness.
4. Describes
standard risk
tolerance ratings
for various
project
priorities.
1. Plan Risk
******ebook converter DEMO Watermarks*******
You found some key deficiencies in the
Project Management Plan as a result of 2. Identify Risks
a Risk Review. You need to generate
59. formal change requests for additional
Contingency Reserves. Which Risk 3. Plan Risk
Management Process activity did you Responses
perform?
4. Monitor and
Control Risks
1. Mitigation
You reviewed the WBS and an activity
must be completed that your team may 2. Transference
not have the expertise to accomplish.
60.
You find another team who is willing to
take on the work and do the job. What 3. Avoidance
risk response did you use?
4. Acceptance
1. Risk
2. Communications
Project Managers must understand and
61. balance all of the following constraints
except: 3. Customer
Satisfaction
4. Quality
1. Perform
Qualitative Risk
******ebook converter DEMO Watermarks*******
Qualitative Risk
Analysis
2. Perform
You are in the process of reviewing Quantitative
performance reports to determine Risk Analysis
62.
overall risk management effectiveness.
Which activity are you performing?
3. Monitor and
Control Risks
4. Plan Risk
Responses
1. Risk
Reassessment
2. Risk Audit
You identified new risks and updated
the probability on two risks on the
63. 3. Variance
Watch List. What action did you
complete? Analysis
4. Technical
performance
Measurement
1. Enhance
There is an opportunity to improve
return on investment from your project
by 20% from potential supplier 2. Share
discounts. You will need to order more
64.
supplies to achieve the discount. You
found another Project Manager who 3. Exploit
needs the same supplies. Which risk
******ebook converter DEMO Watermarks*******
1. Plan Risk
Management
2. Monitor and
Which of the following Risk Control Risks
Management Process activities does
65.
not occur in the project planning
Process Group? 3. Perform
Qualitative Risk
Analysis
4. Identify Risks
1. Mitigate,
Enhance, Accept
2. Avoid, Exploit,
Your team is debating which risk Share
responses are most appropriate for
66.
opportunities. Which responses fit this
categorization? 3. Accept, Transfer,
Exploit
4. Exploit,
Enhance, Accept
1. Initiating
1. Root Cause
Analysis
2. Sensitivity
You want to use a group creativity Analysis
technique that enhances brainstorming
68.
and uses a voting process to rank order
ideas. Which technique will work best? 3. Delphi
Technique
4. Nominal Group
Technique
1. Risk
Management
Plan
4. Scope Statement
4. FMEA
1. $50,000
Molly is reviewing the return potential
for proposed projects. She knows that
there is a guarantee of a $50,000 return 2. $80,000
if she selects Project A. Based on risk,
71.
there is a 20% possibility of an
additional 3. $20,000
$30,000 return as well. Molly
should list total returns potential as:
4. $56,000
1. Assumptions
Analysis during
Identify Risks
2. Assumptions
Analysis during
Qualitative Risk
A Project Manager identified a number Analysis
of new risks that developed due to
misconceptions and erroneous 3. Risk Data
72. information received during the project Quality
planning stage. What was probably not Assessment
accomplished at the appropriate level? during Identify
Risks
******ebook converter DEMO Watermarks*******
accomplished at the appropriate level? during Identify
Risks
4. Risk Data
Quality
Assessment
during
Qualitative Risk
Analysis
1. Risk
Management
2. Risk Governance
Which process ensures risk policies
73. and procedures are understood,
followed, applied, and effective? 3. Configuration
Management
4. Organizational
Process Assets
1. Contingent
Response
Strategy
4. Emergency Task
Plan
4. Exploit
1. Strategies for
Positive Risks or
Opportunities
4. Contingent
Response
Strategy
1. Exploit
4. Enhance
4. Risk Owner
1. Residual Risk
4. Risk Trigger
1. Perform
Qualitative Risk
Analysis
2. Monitor and
A Project Manager is sharing a copy of Control Risks
the Cost Management Plan with her
80. team. Which Project Risk Management
activity is the Project Manager 3. Plan Risk
preparing to perform? Responses
1. Sensitivity
Analysis, Delphi
Method, and
Brainstorming
2. Delphi Method,
Brainstorming,
Sarah is seeking input to help perform a and Interviewing
risk identification activity for a critical
81.
IT project. Which information gathering 3. Sensitivity
techniques should she consider? Analysis, Delphi
Method, and
Interviewing
4. Sensitivity
Analysis,
Brainstorming,
and Interviewing
1. Identify Risks,
Perform
Qualitative Risk
Analysis, Plan
Risk Responses
2. Perform
Quantitative
Risk Analysis,
Plan Risk
Responses,
Monitor and
4. Perform
Qualitative Risk
Analysis,
Identify Risks,
Perform
Quantitative
Risk Analysis
1. $14,000
4. $28,000
1. Budget
2. Personalities
Which is the greatest source for
84. potential conflict you may encounter in
a project? 3. Leadership
Styles
******ebook converter DEMO Watermarks*******
4. Schedules
1. Risk probability
has a tendency to
increase as the
project
progresses.
4. Quantitative
Risk Analysis is
mandatory for all
projects.
4. Create a bias to
reflect the initial
results by
weighting higher
priority risks.
1. All responses
should provide a
high-level
overview of the
required
response.
2. Responses
should provide
an appropriate
level of detail to
implement
Contingency
You are asked to provide input on the
Plans.
level of detail specific risk responses
87.
should contain. What is the best advice
******ebook converter DEMO Watermarks*******
must be
validated by the
Project Manager
and sponsorship
team.
4. Risk response
details should
vary based on
the overall
priority of the
risk itself.
1. Risk Audit
4. Risk Review
1. Risk
Management
Plan
1. Communications
4. Adoption
1. Parametric
4. Bottom Up
1. PMO
2. Project Manager
Consistent risk assessment, risk
92. management, and risk communication
are primary goals of the: 3. Sponsor
4. Risk Governance
******ebook converter DEMO Watermarks*******
1. Enterprise
Environmental
Factors
4. Quality
Management
Plan
1. $170,000
The cost of a potential option to
complete a key activity is $90,000. If
this option is adopted, there is a 70% 2. $50,000
chance of returns of $120,000. There is
94.
a 30% chance of returns of
$140,000. What is the 3. $36,000
Expected Monetary Value of this
option?
4. $40,000
1. Risk Breakdown
Structure
2. Communications
Project assumptions are a major source Management
of potential risks. Which document Plan
95.
defines key assumptions impacting a
project?
******ebook converter DEMO Watermarks*******
95. of potential risks. Which document Plan
defines key assumptions impacting a
project?
3. Scope Statement
4. Stakeholder
Register
1. Stakeholder
Register
2. Stakeholder
You want to identify key customers to Management
ensure they are interviewed and Strategy
96. participate in the Risk Management
Process. Which input will provide you
with this information? 3. Communications
Management
Plan
4. Lessons Learned
1. Plan Risk
Management
2. Perform
A number of Risk Related Contractual Quantitative
Decisions were identified as pertinent Risk Analysis
97.
to a project. These decisions were
developed as a result of: 3. Plan Risk
Responses
4. Monitor and
******ebook converter DEMO Watermarks*******
1. Perform
Sensitivity
Analysis
activities
2. Implement Risk
Responses as
Which goal is not associated with the needed
98.
Monitor and Control Risks process?
3. Monitor
Residual and
Secondary Risks
4. Monitor risk
trigger
conditions
1. Provides an in-
depth analysis of
project risks
2. Analysis is time
consuming but
well worth the
time investment
You are performing a Checklist
Analysis to identify potential risks.
99. 3. Technique is not
Which fact is true regarding Checklist
Analysis? used to provide
an initial high
level analysis
4. Checklists are
generally
******ebook converter DEMO Watermarks*******
4. Checklists are
generally
developed based
on Lessons
Learned
1. Qualitative Risk
Analysis
2. Expected
Monetary Value
You are not confident that you have Analysis
solid probability and cost impact data
100.
for each risk. Based on this assessment,
which technique should not be used? 3. Risk
Categorization
4. Risk Data
Quality
Assessment
1. Lag
4. Break
1. 18 to 22
4. 8 to 32
1. Plan Risk
Responses and
Plan Risk
Management
2. Plan Risk
Responses and
Monitor and
Control Risks
4. Plan Risk
Management and
Perform
Qualitative Risk
Analysis
1. Plan Risk
Management
2. Perform
Qualitative Risk
Analysis
******ebook converter DEMO Watermarks*******
2. Perform
A Risk Data Quality Assessment is a Qualitative Risk
tool and technique used in which risk Analysis
104.
management activity?
3. Perform
Quantitative
Risk Analysis
4. Monitor and
Control Risks
2. Time and
Material
A Project Manager wants to develop a
contract that poses the least amount of
105. 3. Cost Plus
Cost Risk to the buyer. Which contract
best suits this purpose? Percentage of
Cost
4. Request for
Quote
1. Project is behind
schedule
1. .96
2. 1.33
Using the information in question 106,
107.
what is the project’s current SPI?
3. -$1,000
4. $6,000
1. Risk Utility
4. Cognitive Bias
1. Risk Rating
4. Risk Impact
2. Plan Risk
Management
The Risk Management Plan is a key
110. input for all of the following activities 3. Perform
except: Quantitative
Risk Analysis
4. Plan Risk
Responses
1. Develop a
workaround to
deal with this
occurrence.
2. Perform
variance and
trend analysis to
ensure the risk
An unexpected risk occurred that will does not occur
impact the project’s Schedule and Cost again.
111.
Performance Baselines. What is your
best response to this circumstance?
3. Initiate an
immediate Risk
Audit to
respond.
4. Determine levels
of reserve
analysis to
******ebook converter DEMO Watermarks*******
1. Risk Response
Planning
2. Risk
Management
Gilmere is developing strategies to Planning
112. deal with threats to her project. What
activity is Gilmere performing?
3. Risk Monitoring
and Control
4. Quality
Assurance
1. Management
Reserve
4. Heuristic
1. Acceptance or
Mitigation
4. Enhancement or
Acceptance
1. Schedule delays
2. Conflict
What is the most likely result of
115.
communications blockers? 3. Cost overruns
4. Information
delays
1. Risk
Communication
4. Risk Governance
1. Perform
Qualitative Risk
Analysis
4. Plan Risk
Reponses
1. Issue
You developed an enhance response to
a risk on the Risk Register. The risk 2. Problem
occurred and you are now
119.
implementing the Contingency Plan.
What is the term used to define this 3. Benefit
event?
4. Residual Risk
4. Laissez-Faire
1. Planning
4. Closing
1. Evaluated all
ideas
2. Norming and
You are using a Supporting Leadership Performing
Style to manage your team. Which
123.
stages of team development is best
suited to this leadership style? 3. Forming and
Norming
4. Performing and
Storming
1. Plan Risk
Management and
Identify Risks
2. Identify Risks
and Perform
Qualitative Risk
You have new information that needs to Analysis
be documented on the project Risk
124. Register. Which Risk Management 3. Perform
Process activities require Risk Register Qualitative Risk
updates? Analysis and
Plan Risk
Management
4. Plan Risk
Responses and
Monitor and
Control Risks
Question
Response Rationale
#
Qualitative risk analysis is subjective. This eliminates options
A and C. Option B is incorrect. Assessing the probability of
1. D
achieving specific project objectives is quantitative. Option D
using a Probability and Impact Matrix is qualitative.
Management Reserves are reserves for unknown unknowns or
2. C unknown risks. Contingency Reserves are for known risks.
Options B and D are not types of reserves.
Remember to follow the input-tool and technique-output method
of performing activities. Options A and B are outputs in the
3. D
Risk Management Plan. Option C is the tool and technique after
you have the inputs. Option A is a key input. Gather inputs first.
The initial Risk Register lists risk, cause, initial Risk Owners,
categories, and responses. Option D satisfies these criteria. All
4. D
other activities occur in later steps of the Risk Management
Process.
Risk C has the highest priority based on its overall Risk Score
5. C of 16. Risk A scores 10, Risk B scores 12, and Risk D scores
10.
Option A is true regarding the Perform Qualitative Risk
Analysis activity. Qualitative Risk Analysis addresses
6. A
individual risks. All other options are true for the Perform
Quantitative Risk Analysis activity.
A Project Manager spends approximately 90% of his or her
7. C
time communicating.
Risk Related Contract Decisions and the Risk Register are key
8. D
inputs which drive the Plan Procurements activity.
Expect some Expected Monetary Value (EMV) questions on the
certification exam. To calculate Contingency Reserve
requirements, multiply the probability times the impact for each
risk and sum the total. Keep in mind that there are positive and
negative risks. In this scenario, total Contingency Reserve
******ebook converter DEMO Watermarks*******
requirement is:
BAC is $60,000.
AC Actual Costs
BAC Budget at Completion
CP Critical Path
CPI Cost Performance Index
CV Cost Variance
EAC Estimate at Completion
EMV Expected Monetary Value
ETC Estimate to Complete
EV Earned Value
FMEA Failure Mode and Effect Analysis
IRGC International Risk Governance Council
ISO International Organization for Standardization
NPV Net Present Value
PDCA Plan, Do, Check, Act
PIER-C Plan, Identify, Evaluate, Respond, Control
PERT Program Evaluation and Review Technique
PMBOK® Guide Project Management Body of Knowledge
PMI Project Management Institute
PMO Project Management Office
PMP Project Management Professional
PV Planned Value
RBS Risk Breakdown Structure
RMP Risk Management Professional
SD Standard Deviation
SME Subject Matter Expert
SPI Schedule Performance Index
SWOT Strengths, Weaknesses, Opportunities, and Threats
SV Schedule Variance
******ebook converter DEMO Watermarks*******
WBS Work Breakdown Structure
Term Definition
This response entails taking no immediate action until the risk
Acceptance
occurs. There are two types of acceptance strategies. One is
(Accept)
passive and the other is active.
Achievement David McClelland’s theory states that there are three (3) needs
Motivation that must be satisfied for people to be satisfied. They include
Theory achievement, affiliation, and power.
Contingency Plans are developed to address risks when they
Active
occur. This step may be necessary to increase stakeholder
Acceptance
confidence that you have an approach for risks you accepted.
Activity Cost
Output of Estimate Costs. Provides Cost Estimates for the project.
Estimates
Activity
Output of Estimate Activity Durations. Provides time durations
Duration
for a project.
Estimates
Method uses the intellectual power of a group to place risks into
Affinity
categories. This is the best method to use if all possible risks
Diagramming
have not been identified.
An estimating method where time and cost estimates are provided
Analogous
by an expert source. Also referred to as Top-Down or Expert
Estimating
estimating.
Information believed to be true but not yet validated. Assumptions
Assumption
are always risks until validated.
Assumptions Action of validating or dismissing an assumption through analysis
Analysis and research.
Leadership style where you make decisions without input from
Autocratic
others.
The focus of this risk response strategy is to eliminate the cause
Avoidance
of the risk. Take actions to ensure the risk does not occur. This is
(Avoid)
often accomplished by removing people and/or activities.
Benefit Term that depicts a positive risk or opportunity that occurred.
Beta
Probability peaks on either side of the mean.
Distribution