ExamGecko
Home Home / CompTIA / PK0-005

CompTIA PK0-005 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











A project manager has been assigned to a new project. During the planning phase, the project manager needs to get an understanding of the purpose of the project. Which of the following should the project manager do?

A.
Collate the lessons learned.
A.
Collate the lessons learned.
Answers
B.
Perform a gap analysis.
B.
Perform a gap analysis.
Answers
C.
Review existing artifacts.
C.
Review existing artifacts.
Answers
D.
Conduct a retrospective.
D.
Conduct a retrospective.
Answers
Suggested answer: C

Explanation:

The project manager should review existing artifacts to get an understanding of the purpose of the project. Existing artifacts are documents or records that provide information about the project background, context, scope, objectives, requirements, stakeholders, and deliverables. They may include documents such as project proposal, project charter, business case, feasibility study, statement of work (SOW), or contract. Reviewing existing artifacts can help to clarify the project vision and expectations and provide a basis for planning and executing the project.

Someone claiming to be from a tax agency sent an email to a team member asking for access to the project repository. Which of the following BEST describes this scenario?

A.
Social engineering
A.
Social engineering
Answers
B.
Phishing
B.
Phishing
Answers
C.
Spoofing
C.
Spoofing
Answers
D.
Hacking
D.
Hacking
Answers
Suggested answer: B

Explanation:

Phishing is a scenario where someone claiming to be from a legitimate organization sends an email or other message to a target person asking for sensitive information or access to a system or account. Phishing is a type of cyberattack that aims to trick the target into revealing personal or financial data or installing malware on their device. Phishing can compromise the security and privacy of the target and expose them to identity theft, fraud, or other malicious activities.

A stakeholder works in a remote location and has not been replying to emails. The Internet service in that location is intermittent, and the stakeholder prefers to be contacted by telephone. Which of the following artifacts should the project manager have prepared to avoid this situation?

A.
Responsibility assignment matrix
A.
Responsibility assignment matrix
Answers
B.
Acceptable communication channels
B.
Acceptable communication channels
Answers
C.
Risk registry
C.
Risk registry
Answers
D.
Staff directory
D.
Staff directory
Answers
Suggested answer: B

Explanation:

The project manager should have prepared acceptable communication channels to avoid the situation of a stakeholder not replying to emails due to intermittent Internet service. Acceptable communication channels are methods or modes of communication that are agreed upon by all parties involved in a project. They may include aspects such as email, phone call, text message, video conference, instant message, or face-to-face meeting. Acceptable communication channels can help to ensure that messages are delivered and received effectively and efficiently and that communication preferences and limitations are respected.

A project team evaluated the performance of a new reporting system and the quantity of queries to be processed during predetermined time stamps.

Which of the following is the current status of the process?

A.
Based on the rule of seven, the process is under control
A.
Based on the rule of seven, the process is under control
Answers
B.
The amount of data is insufficient to determine if quality is low.
B.
The amount of data is insufficient to determine if quality is low.
Answers
C.
The process is out of control and should be revised.
C.
The process is out of control and should be revised.
Answers
D.
The goal should be adjusted since most of the data points are close to the lower limit.
D.
The goal should be adjusted since most of the data points are close to the lower limit.
Answers
Suggested answer: C

Explanation:

The process is out of control and should be revised. The project manager can use the rule of seven to determine the status of the process based on the control chart. The rule of seven states that if seven or more consecutive measurements fall on one side of the mean that there's an assignable cause that needs investigation. In this case, the last seven data points are all below the mean, which indicates that the process is out of control and in need of adjustment12

After a release, the project sponsor received an escalation from an executive about the extension of the downtime after the scheduled window. Which of the following should be added to the issue log?

A.
Continuous integration
A.
Continuous integration
Answers
B.
Rollback plan
B.
Rollback plan
Answers
C.
Customer notification
C.
Customer notification
Answers
D.
Automated testing
D.
Automated testing
Answers
Suggested answer: C

Explanation:

Customer notification should be added to the issue log after receiving an escalation from an executive about the extension of the downtime after the scheduled window. Customer notification is a communication activity that informs the customers about any issues or changes that may affect their satisfaction or expectations. Customer notification can help to maintain trust, transparency, and goodwill with the customers and prevent any negative impacts on their business operations or experience.

Due to multiple changes, the sign-off for the project scope baseline is delayed. The project sponsor has restricted the budget for this project. Which of the following should the project manager MOST likely do to move forward?

A.
Communicate with the affected stakeholders.
A.
Communicate with the affected stakeholders.
Answers
B.
Initiate a formal change request to modify the cost
B.
Initiate a formal change request to modify the cost
Answers
C.
Adjust the scope to stay within the cost.
C.
Adjust the scope to stay within the cost.
Answers
D.
Set a new cost using a lightweight estimation method.
D.
Set a new cost using a lightweight estimation method.
Answers
Suggested answer: A

Explanation:

The project manager should communicate with the affected stakeholders first after realizing that the sign-off for the project scope baseline is delayed due to multiple changes and that the budget for this project is restricted by the project sponsor. The affected stakeholders are those who have an interest or influence on the project and may be impacted by any changes or delays. Communicating with them can help to explain the situation, assess the impact, seek feedback, and manage expectations.

As a result of an approved change, the project manager updates the project plan with the newest project end date. Which of the following change control processes should the project manager complete NEXT?

A.
Document the request in the change control log.
A.
Document the request in the change control log.
Answers
B.
Communicate the change deployment.
B.
Communicate the change deployment.
Answers
C.
Conduct an impact assessment.
C.
Conduct an impact assessment.
Answers
D.
Implement the change.
D.
Implement the change.
Answers
Suggested answer: B

Explanation:

The project manager should communicate the change deployment next after updating the project plan with the newest project end date as a result of an approved change. Communicating the change deployment involves informing all relevant parties about when and how the change will be implemented and what are the expected outcomes and benefits. Communicating the change deployment can help to ensure alignment, readiness, and support for the change and avoid any confusion or resistance.

An IT intern was assigned to set up workstations as part of a project. The IT intern was very careful to do the task well and initially referred to notes while performing the task. By the end of the two-week rotation, the IT intern no longer needed the notes and completed more set-ups in less time. Which of the following MOST likely represents the observed relationship in this scenario?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: C

Explanation:

Option C shows a graph that most likely represents the observed relationship in this scenario. The graph shows a learning curve, which is a graphical representation of the relationship between a learner's performance on a task and the number of attempts or time required to complete the task.

The learning curve theory proposes that a learner's efficiency in a task improves over time the more the learner performs the task. In this case, the IT intern was able to complete more set-ups in less time as they gained more experience and proficiency over the two-week rotation12

An opportunity emerged in the middle of a project life cycle. Which of the following is the BEST action for the project manager to take?

A.
Exploit the risk.
A.
Exploit the risk.
Answers
B.
Accept the risk.
B.
Accept the risk.
Answers
C.
Avoid the risk.
C.
Avoid the risk.
Answers
D.
Transfer the risk.
D.
Transfer the risk.
Answers
Suggested answer: A

Explanation:

The project manager should exploit the risk after an opportunity emerged in the middle of a project life cycle. Exploit is a risk response strategy that aims to increase the probability and/or impact of a positive risk or opportunity. Exploit can involve actions such as allocating more resources, changing the scope or schedule, or adding more features or benefits to the project deliverables. Exploit can help to ensure that the opportunity is realized and that the project gains more value or advantage from it3

The high-level technical requirements for a new application state that the application should be suitable to support enterprise-level client-server solutions. Which of the following meets these requirements?

A.
Data warehouse
A.
Data warehouse
Answers
B.
SQL database
B.
SQL database
Answers
C.
Multitier architecture
C.
Multitier architecture
Answers
D.
Content management system
D.
Content management system
Answers
Suggested answer: C

Explanation:

Multitier architecture is a type of software architecture that is suitable to support enterprise-level client-server solutions. Multitier architecture divides an application into logical layers or tiers that are distributed among different servers or machines. Each tier performs a specific function or role and communicates with other tiers through well-defined interfaces. Multitier architecture can provide benefits such as scalability, performance, security, maintainability, and reusability for complex and large-scale applications.

Total 291 questions
Go to page: of 30