ExamGecko
Home Home / CompTIA / PK0-005

CompTIA PK0-005 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Which of the following pieces of data are examples of Pll?

A.
Medical record and test result values
A.
Medical record and test result values
Answers
B.
IP address and email address
B.
IP address and email address
Answers
C.
Name and year of birth
C.
Name and year of birth
Answers
D.
X-ray and blood type
D.
X-ray and blood type
Answers
Suggested answer: B

Explanation:

Pll stands for personally identifiable information, which is any data that can be used to identify a specific individual. Examples of Pll include name, address, phone number, email address, social security number, passport number, driver's license number, etc. IP address and email address are both Pll because they can be used to trace the identity and location of a person. Medical record and test result values, name and year of birth, and x-ray and blood type are not Pll by themselves, but they can become Pll if they are combined with other data that can link them to a specific individual.Reference=CompTIA Project+ Study Guide: Exam PK0-005, 3rd Edition, Chapter 10: Project Security, page 331. CompTIA Project+ Certification Exam Objectives, Domain 4: Project Security, Objective 4.1: Given a scenario, apply security best practices to a project, Sub-objective: Identify and classify Pll.

A project manager receives an escalation from an external group reporting that an expected deliverable should have been available some time ago. After analysis, the project team realizes the deliverable was provided on time. Which of the following should the project manager do next?

A.
Request a change control ticket.
A.
Request a change control ticket.
Answers
B.
Review the schedule plan.
B.
Review the schedule plan.
Answers
C.
Refine the project documentation.
C.
Refine the project documentation.
Answers
D.
Revise the communication plan.
D.
Revise the communication plan.
Answers
Suggested answer: D

Explanation:

When a project manager receives an escalation about a deliverable that was actually provided on time, it indicates a communication issue. The next step should be to revise the communication plan to ensure that all stakeholders are properly informed about project progress and deliverables in the future. This helps to prevent misunderstandings and ensures that everyone has the correct information.

Reference= CompTIA Project+ Certification Study Guide (PK0-005)


A team is analyzing the backlog in order to decide what to include in the next sprint. Which of the following aspects is the most important for the team to take into consideration?

A.
Time to be fixed
A.
Time to be fixed
Answers
B.
Impact to project
B.
Impact to project
Answers
C.
Issue category
C.
Issue category
Answers
D.
Resource availability
D.
Resource availability
Answers
Suggested answer: B

Explanation:

When analyzing the backlog to decide what to include in the next sprint, the most important aspect to consider is the impact to the project. This involves assessing which items will provide the most value and contribute significantly towards achieving the project goals. It's crucial to prioritize work that has the highest impact on the project's success.

Reference= The answer is based on standard agile project management practices, particularly in the context of sprint planning where prioritization is key. For detailed information, please refer to the CompTIA Project+ Study Guide and other official CompTIA resources

Which of the following is the main reason for documenting artifacts?

A.
To provide a record of the project's progress and achievements for future reference
A.
To provide a record of the project's progress and achievements for future reference
Answers
B.
To show stakeholders that the project is on track and progressing as planned
B.
To show stakeholders that the project is on track and progressing as planned
Answers
C.
To help team members be aware of roles and responsibilities
C.
To help team members be aware of roles and responsibilities
Answers
D.
To ensure that the project team understands the importance of the project to the organization
D.
To ensure that the project team understands the importance of the project to the organization
Answers
Suggested answer: A

Explanation:

Documenting artifacts is the main reason for creating and maintaining project documents that relate to the management of the project, not the project deliverables. Artifacts are used to define, support, and align the project work to the project requirements and business goals.They also serve as a source of information and evidence for future projects, audits, reviews, and lessons learned1.Documenting artifacts helps to capture the project's history, performance, outcomes, and best practices, which can be useful for organizational learning and improvement2.Reference=CompTIA Project+ PK0-005 Certification Study Guide, Chapter 14: Closing the Project, page 403;Project Artifacts and How to Use Them - Rebel's Guide to Project Management, Introduction and What are project artifacts in project management? sections;Project Management Artifacts: Definition, Types, and Phases, Introduction and What are project artifacts in project management? sections.

A project manager has decided to wait until all requirements are developed to initiate testing. Which of the following relationship dependencies is the project manager using?

A.
Start-to-finish
A.
Start-to-finish
Answers
B.
Finish-to-finish
B.
Finish-to-finish
Answers
C.
Finish-to-start
C.
Finish-to-start
Answers
D.
Start-to-start
D.
Start-to-start
Answers
Suggested answer: C

Explanation:

A finish-to-start dependency is a type of relationship dependency in project management, where the start of one task depends on the finish of another task12. In this case, the project manager is using a finish-to-start dependency, because testing cannot start until requirements development is finished. This implies that testing is a successor task, and requirements development is a predecessor task.A finish-to-start dependency is the most common type of dependency in project management, and it ensures that tasks are performed in a logical sequence34.Reference= CompTIA Project+ Certification Study Guide5, CompTIA Project+ Certification Exam Objectives6, Understanding Dependencies in Project Management [2023] * Asana1, Dependencies in Project Management | Smartsheet2, Understanding Task Dependencies in Project Management3, What are Dependencies in Project Management?- KnowledgeHut4

As a part of a project, structured cabling activities have been outsourced to another company. The agreement is that work will take six weeks to complete and will be performed at different locations. Which of the following should the project manager do? (Select two).

A.
Purchase the materials.
A.
Purchase the materials.
Answers
B.
Assign the resources.
B.
Assign the resources.
Answers
C.
Accept delays in the work.
C.
Accept delays in the work.
Answers
D.
Approve the deliverables.
D.
Approve the deliverables.
Answers
E.
Monitor the performance.
E.
Monitor the performance.
Answers
F.
Negotiate with the vendors.
F.
Negotiate with the vendors.
Answers
Suggested answer: D, E

Explanation:

The project manager should approve the deliverables and monitor the performance of the outsourced structured cabling activities. These are the responsibilities of the project manager when dealing with external vendors or contractors, as they ensure that the quality standards, scope, schedule, and budget are met according to the contract terms and the project plan. The project manager should also communicate regularly with the vendor and provide feedback and guidance as needed. The other options are not correct because:

Purchasing the materials is not the responsibility of the project manager, but the vendor who is performing the structured cabling activities. The project manager should only verify that the materials are suitable and available for the project.

Assigning the resources is not the responsibility of the project manager, but the vendor who is performing the structured cabling activities. The project manager should only ensure that the vendor has the adequate and qualified resources to complete the work.

Accepting delays in the work is not a good practice for the project manager, as it can negatively affect the project schedule, scope, and quality. The project manager should proactively identify and manage the risks and issues that may cause delays, and implement contingency plans or corrective actions if necessary.

Negotiating with the vendors is not a task that the project manager should do during the execution of the structured cabling activities, as it should have been done during the planning and procurement phases of the project. The project manager should only adhere to the contract terms and conditions that have been agreed upon with the vendor, and only renegotiate if there are significant changes or disputes that require it.Reference=CompTIA Project+ Study Guide: Exam PK0-005, 3rd Edition, Chapter 8: Planning Projects, Part 4 (Procurement and Communication), pages 243-260;CompTIA Project+ Certification Exam Objectives, Domain 2: Project Planning, Objective 2.5: Given a scenario, plan procurement for a project; Domain 3: Project Execution, Objective 3.2: Given a scenario, execute and monitor project tasks using traditional methodologies.

Which of the following activities would be performed during the project closure phase when the waterfall methodology is being used? (Select two).

A.
Creating a backlog
A.
Creating a backlog
Answers
B.
Managing the quality of deliverables
B.
Managing the quality of deliverables
Answers
C.
Updating the issue log
C.
Updating the issue log
Answers
D.
Performing a risk assessment
D.
Performing a risk assessment
Answers
E.
Validating the deliverables
E.
Validating the deliverables
Answers
F.
Reconciling the project budget
F.
Reconciling the project budget
Answers
Suggested answer: E, F

Explanation:

During the project closure phase in the waterfall methodology, it is crucial to validate the deliverables to ensure that all project requirements have been met and the project outputs are complete and satisfactory. Additionally, reconciling the project budget is performed to ensure all financial records are accurate and reflect the actual project costs, which is essential for the formal closing of the project.

Reference= CompTIA Project+ Certification Study Guide (PK0-005)

A stakeholder raises a concern with a project manager because of the number of emails that have been received before a coding release. Which of the following actions should the project manager take next?

A.
Inform the CCB to stop communication.
A.
Inform the CCB to stop communication.
Answers
B.
Establish a RACI matrix.
B.
Establish a RACI matrix.
Answers
C.
Escalate the communication issues.
C.
Escalate the communication issues.
Answers
D.
Revise the communication plan.
D.
Revise the communication plan.
Answers
Suggested answer: D

Explanation:

When stakeholders express concerns about the volume of communication, it's important to review and adjust the communication plan to ensure it meets the project's needs and stakeholders' preferences. A RACI matrix is useful for defining roles and responsibilities but does not address communication frequency or methods directly. Escalating the issue may not be necessary if it can be resolved by revising the plan. Informing the CCB (Change Control Board) to stop communication is not advisable as the CCB's role is to oversee changes, not to manage day-to-day communications. Reference = The CompTIA Project+ Certification Study Guide provides detailed information on managing the project life cycle, establishing communication plans, and handling stakeholder concerns1.

A project is executed to migrate all data to a single system following the merger of two companies. The team validates that system performance will not be impacted. Which of the following did the team perform?

A.
Regression testing
A.
Regression testing
Answers
B.
Smoke testing
B.
Smoke testing
Answers
C.
Stress testing
C.
Stress testing
Answers
D.
Automation testing
D.
Automation testing
Answers
Suggested answer: C

Explanation:

Stress testing is a type of performance testing that evaluates how a system behaves under extreme load conditions, such as high volume of data, concurrent users, or transactions12.Stress testing can help to identify the system's breaking point, bottlenecks, and resource limitations, and to ensure that the system can recover from failures and maintain its functionality34. In this case, the team performed stress testing to validate that system performance will not be impacted by migrating all data to a single system following the merger of two companies. This implies that the team simulated a high amount of data transfer and processing, and measured the system's response time, throughput, availability, and reliability under such load. Stress testing is better than the other options because:

Regression testing is a type of functional testing that verifies that a system's existing features and functionality are not affected by a change or an update56. Regression testing does not focus on system performance or load conditions, but rather on system correctness and quality.

Smoke testing is a type of functional testing that checks the basic functionality and stability of a system before performing more detailed and comprehensive testing78. Smoke testing does not measure system performance or load conditions, but rather ensures that the system is ready for further testing.

Automation testing is a technique of using software tools or scripts to execute test cases and compare the actual results with the expected results910. Automation testing is not a specific type of testing, but rather a way of performing testing. Automation testing can be applied to various types of testing, including stress testing, regression testing, and smoke testing.

Reference= CompTIA Project+ Certification Study Guide, CompTIA Project+ Certification Exam Objectives, What is Stress Testing?1, Stress Testing: A Complete Guide2, What is Regression Testing?3, Regression Testing: A Complete Guide4, What is Smoke Testing?5, Smoke Testing: A Complete Guide6, What is Automation Testing?7, Automation Testing: A Complete Guide8

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?

A.
Residual risk
A.
Residual risk
Answers
B.
Regulatory requirements
B.
Regulatory requirements
Answers
C.
Risk tolerance
C.
Risk tolerance
Answers
D.
Control objectives
D.
Control objectives
Answers
Suggested answer: D

Explanation:

Control objectives are the desired outcomes or goals of implementing security controls to mitigate risks and protect information assets. Control objectives should be the primary basis for establishing metrics that measure the effectiveness of an information security program, as they align with the business objectives, requirements, and expectations of the organization and its stakeholders. Metrics based on control objectives can help to evaluate the performance, efficiency, and maturity of the security program, and to identify gaps, issues, and areas for improvement. The other options are not correct because:

Residual risk is the remaining risk after applying security controls. Residual risk is not a basis for establishing metrics, but rather a result of measuring the effectiveness of security controls. Residual risk should be monitored and reported, but it does not define the desired outcomes or goals of the security program.

Regulatory requirements are the external standards, laws, and regulations that the organization must comply with to avoid legal or financial penalties. Regulatory requirements are not a basis for establishing metrics, but rather a constraint or a driver for the security program. Metrics based on regulatory requirements can help to demonstrate compliance, but they may not reflect the actual effectiveness or efficiency of the security program.

Risk tolerance is the level of risk that the organization is willing to accept or bear. Risk tolerance is not a basis for establishing metrics, but rather a factor or an input for the security program. Metrics based on risk tolerance can help to prioritize and allocate resources, but they may not measure the actual outcomes or goals of the security program.Reference=Key Performance Indicators for Security Governance, Part 1;14 Cybersecurity Metrics + KPIs You Must Track in 2023;KPIs in Information Security: The 10 Most Important Security Metrics;Why metrics are crucial to proving cybersecurity programs' value;Implementing and Maintaining Security Program Metrics

Total 291 questions
Go to page: of 30