Deck 8: Managing Project Risk

Full screen (f)
exit full mode
Question
It never pays to ignore an element of project risk.
Use Space or
up arrow
down arrow
to flip the card.
Question
Qualitative risk analysis has as one of its strengths the ability to include subjective analysis based on experience and judgment.
Question
Nominal Group Technique is a free form,unstructured process similar to Brainstorming.
Question
The PMBOK definition of project risk suggests that a systematic process is needed to effectively manage the risk of a project.
Question
Triggers or flags in the form of metrics should be identified to draw attention to a particular risk when it occurs.
Question
In general,because of the similarities in IT projects,one can manage all projects and risks in the same manner.
Question
The fishbone or Ishikawa diagram is a form of cause and effect analysis diagramming.
Question
The area under the normal distribution curve that lies within 2 standard deviations of the mean plus or minus)includes about 68% of all the values.
Question
The concept of expected value rests on the notion of a probability-weighted summation of component parts.
Question
Since risk arises from uncertainty,there can be no such category as known risks.
Question
Failure to follow a formal risk management plan will often cause organizations to be reactive and find themselves in a state of perpetual crisis,a condition known as crisis management.
Question
Learning cycles can be used as a tool for identifying threats and opportunities.
Question
Effective project risk management requires that each risk have an owner.
Question
Since IT projects are developed in an environment that changes so rapidly and so extensively,there is little value in using past projects to guide our risk assessment of new ones.
Question
The goal of a sound risk management is to completely avoid all risk.
Question
The deployment of a specific risk management strategy is in part a function of risk tolerance levels of the stakeholders.
Question
Unknown-unknown risks are residual risks that we cannot even imagine happening.
Question
Project risk management focuses solely on the downside of risk that results from unexpected problems or threats.
Question
The best time to plan for risk is during the project execution phase when risk can be assessed most accurately.
Question
Sensitivity analysis is used to determine the joint effects of multiple risky tasks,while Monte Carlo Simulation is used to measure which individual tasks pose the greatest project risk.
Question
_____ is an interim lessons learned to determine how the risk was handled.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk evaluation
Question
The first step in managing IT project risk is _____.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
Question
The IT Project Risk Management Processes include all of the following except:

A)Plan Risk Management
B)Identify Risks
C)Risk Elimination
D)Perform Qualitative Risk Analysis
E)Monitor and Control Risks
Question
_____requires determining the problem,or cause,of the risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
Question
Successful risk management requires _____

A)misunderstanding the benefits of risk management
B)inadequate time for risk identification
C)use of a non-standard approach to assess risk
D)stakeholder responsibility
E)occasional monitoring of risks to ensure compliance
Question
Risks may be positive or negative.For a positive risk,a project manager would want to _____.

A)accept the risk
B)share ownership
C)avoid the risk
D)reduce the impact of the risk
E)transfer the risk
Question
_____ is an uncertain event that,if it occurs,has a positive or negative effect on project objectives.

A)Risk management
B)Risk response
C)Project risk
D)Risk plan
E)Risk control
Question
_____ is the core layer in the IT Project Risk Identification Framework.

A)Measurable Organizational Value
B)Project objectives
C)Risk sources
D)Internality / Externality
E)Known / Unknown
Question
_____ involves development of a risk management plan.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Question
Identifying what you know,what you think you know,and things you need to find out would be activities most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Question
_____determines how to deal with the occurrence of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
Question
_____involves determining the likelihood and project impact of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
Question
Once a risk is made known,_____ will execute the planned risk strategy.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk strategies
Question
Through _____,the project manager will scan the project environment to watch for risks as they may arise.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
Question
_____ are the processes of conducting risk management planning,identification,analysis,response planning,and monitoring and control on a project.

A)Project risk management
B)Project risk response
C)Project risk planning
D)Project risk analysis
E)Project risk control
Question
_____ involves developing procedures and techniques to reduce the threat of risks and enhance the likelihood of opportunities.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Question
_____ involves deciding which risks can impact the project.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Question
Gaining consensus from a group of experts would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Question
_____ provides an early warning system to monitor identified risks and any new risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Question
_____ involves developing a probabilistic model for understanding and responding to identified risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Question
In a normal distribution we would expect to find _______ of all values with in + or - 1 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
Question
_____ randomly generates specific values for a variable with a specific probability distribution.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Monte Carlo Simulation
E)Binomial Distribution
Question
Which of the following distributions has mean which is equal to a + 4b +c)/ 6 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
Question
What are the seven IT project risk management processes?
Question
A _____ identifies threats and opportunities in the external environment as well as organizational strengths and weaknesses .

A)Learning Cycle
B)SWOT Analysis
C)Nominal Group Technique
D)Delphi Technique
E)Checklist
Question
_____ use only integer or whole numbers,where fractional values are not allowed or would not make sense.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
Question
_____ focuses on root-cause analysis and determining the cause of risks,as well as the effects of risks on the project.

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Question
A _____ is a structured tool that identifies risks that have occurred in the past.

A)learning cycle
B)brainstorming session
C)Nominal Group Technique
D)Delphi Technique
E)checklist
Question
In which step of the risk planning process does the text say one might decide to transfer project risk to someone else i.e. ,use insurance)?

A)risk planning
B)risk identification
C)risk assessment
D)risk strategies
E)risk monitoring and control
Question
_____ determines each identified risk's probability of occurrence and impact on the project.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
Question
Which of the following distributions has mean which is equal to a +b +c)/ 3 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
Question
A structured technique for identifying risks which requires participants to rank and prioritize ideas in round-robin fashion is most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Question
Receiving a much larger than usual gas utility bill because of an early spring cold spell is an example of what type of risk?

A)known risk
B)known-unknown risk
C)unknown-unknown risk
D)known-known
E)none of the above
Question
The Payoff Table would be used with which risk assessment technique ?

A)Qualitative Risk Analysis
B)Quantitative Risk Analysis
C)Cause-and- Effect Diagram
D)Simulations
E)Probability Distributions
Question
In a normal distribution we would expect to find _______ of all values with in + or - 2 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
Question
Initial generation of ideas without evaluation would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Question
What is project risk?
Question
_____ prioritizes risks so that an effective risk strategy can be formulated.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
Question
What is project risk management?
Question
What is meant by crisis management? And why do many organizations find themselves in this mode?
Question
Describe how learning cycles can be used to identify IT project risks.
Question
What is a Monte Carlo simulation? Describe a situation other than the one used in this chapter)that could make good use of a Monte Carlo simulation.
Question
Define and discuss the four risk strategies described in this chapter.
Question
What is a risk response plan? What should be included?
Question
Why can identifying IT project risks be difficult?
Question
What is the Delphi Technique? How can this technique be used to identify IT project risks?
Question
What is the purpose of a risk impact table?
Question
What is SWOT analysis? How can this technique be used to identify IT project risks?
Question
What is a contingency plan?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Managing Project Risk
1
It never pays to ignore an element of project risk.
False
2
Qualitative risk analysis has as one of its strengths the ability to include subjective analysis based on experience and judgment.
True
3
Nominal Group Technique is a free form,unstructured process similar to Brainstorming.
False
4
The PMBOK definition of project risk suggests that a systematic process is needed to effectively manage the risk of a project.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
Triggers or flags in the form of metrics should be identified to draw attention to a particular risk when it occurs.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
In general,because of the similarities in IT projects,one can manage all projects and risks in the same manner.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
The fishbone or Ishikawa diagram is a form of cause and effect analysis diagramming.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
The area under the normal distribution curve that lies within 2 standard deviations of the mean plus or minus)includes about 68% of all the values.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
The concept of expected value rests on the notion of a probability-weighted summation of component parts.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
Since risk arises from uncertainty,there can be no such category as known risks.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
Failure to follow a formal risk management plan will often cause organizations to be reactive and find themselves in a state of perpetual crisis,a condition known as crisis management.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
Learning cycles can be used as a tool for identifying threats and opportunities.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
Effective project risk management requires that each risk have an owner.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
Since IT projects are developed in an environment that changes so rapidly and so extensively,there is little value in using past projects to guide our risk assessment of new ones.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
The goal of a sound risk management is to completely avoid all risk.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
The deployment of a specific risk management strategy is in part a function of risk tolerance levels of the stakeholders.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
Unknown-unknown risks are residual risks that we cannot even imagine happening.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
Project risk management focuses solely on the downside of risk that results from unexpected problems or threats.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
The best time to plan for risk is during the project execution phase when risk can be assessed most accurately.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
Sensitivity analysis is used to determine the joint effects of multiple risky tasks,while Monte Carlo Simulation is used to measure which individual tasks pose the greatest project risk.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
_____ is an interim lessons learned to determine how the risk was handled.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk evaluation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
The first step in managing IT project risk is _____.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
The IT Project Risk Management Processes include all of the following except:

A)Plan Risk Management
B)Identify Risks
C)Risk Elimination
D)Perform Qualitative Risk Analysis
E)Monitor and Control Risks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
_____requires determining the problem,or cause,of the risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
Successful risk management requires _____

A)misunderstanding the benefits of risk management
B)inadequate time for risk identification
C)use of a non-standard approach to assess risk
D)stakeholder responsibility
E)occasional monitoring of risks to ensure compliance
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
Risks may be positive or negative.For a positive risk,a project manager would want to _____.

A)accept the risk
B)share ownership
C)avoid the risk
D)reduce the impact of the risk
E)transfer the risk
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
_____ is an uncertain event that,if it occurs,has a positive or negative effect on project objectives.

A)Risk management
B)Risk response
C)Project risk
D)Risk plan
E)Risk control
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
_____ is the core layer in the IT Project Risk Identification Framework.

A)Measurable Organizational Value
B)Project objectives
C)Risk sources
D)Internality / Externality
E)Known / Unknown
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
_____ involves development of a risk management plan.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Identifying what you know,what you think you know,and things you need to find out would be activities most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
_____determines how to deal with the occurrence of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
_____involves determining the likelihood and project impact of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Once a risk is made known,_____ will execute the planned risk strategy.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk strategies
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
Through _____,the project manager will scan the project environment to watch for risks as they may arise.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
_____ are the processes of conducting risk management planning,identification,analysis,response planning,and monitoring and control on a project.

A)Project risk management
B)Project risk response
C)Project risk planning
D)Project risk analysis
E)Project risk control
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
_____ involves developing procedures and techniques to reduce the threat of risks and enhance the likelihood of opportunities.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
_____ involves deciding which risks can impact the project.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
Gaining consensus from a group of experts would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
_____ provides an early warning system to monitor identified risks and any new risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
_____ involves developing a probabilistic model for understanding and responding to identified risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
In a normal distribution we would expect to find _______ of all values with in + or - 1 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
_____ randomly generates specific values for a variable with a specific probability distribution.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Monte Carlo Simulation
E)Binomial Distribution
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following distributions has mean which is equal to a + 4b +c)/ 6 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
What are the seven IT project risk management processes?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
A _____ identifies threats and opportunities in the external environment as well as organizational strengths and weaknesses .

A)Learning Cycle
B)SWOT Analysis
C)Nominal Group Technique
D)Delphi Technique
E)Checklist
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
_____ use only integer or whole numbers,where fractional values are not allowed or would not make sense.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
_____ focuses on root-cause analysis and determining the cause of risks,as well as the effects of risks on the project.

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
A _____ is a structured tool that identifies risks that have occurred in the past.

A)learning cycle
B)brainstorming session
C)Nominal Group Technique
D)Delphi Technique
E)checklist
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
In which step of the risk planning process does the text say one might decide to transfer project risk to someone else i.e. ,use insurance)?

A)risk planning
B)risk identification
C)risk assessment
D)risk strategies
E)risk monitoring and control
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
_____ determines each identified risk's probability of occurrence and impact on the project.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following distributions has mean which is equal to a +b +c)/ 3 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
A structured technique for identifying risks which requires participants to rank and prioritize ideas in round-robin fashion is most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
Receiving a much larger than usual gas utility bill because of an early spring cold spell is an example of what type of risk?

A)known risk
B)known-unknown risk
C)unknown-unknown risk
D)known-known
E)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
The Payoff Table would be used with which risk assessment technique ?

A)Qualitative Risk Analysis
B)Quantitative Risk Analysis
C)Cause-and- Effect Diagram
D)Simulations
E)Probability Distributions
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
In a normal distribution we would expect to find _______ of all values with in + or - 2 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
Initial generation of ideas without evaluation would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
What is project risk?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
_____ prioritizes risks so that an effective risk strategy can be formulated.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
What is project risk management?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
What is meant by crisis management? And why do many organizations find themselves in this mode?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
Describe how learning cycles can be used to identify IT project risks.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
What is a Monte Carlo simulation? Describe a situation other than the one used in this chapter)that could make good use of a Monte Carlo simulation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
Define and discuss the four risk strategies described in this chapter.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
What is a risk response plan? What should be included?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
Why can identifying IT project risks be difficult?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
What is the Delphi Technique? How can this technique be used to identify IT project risks?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
What is the purpose of a risk impact table?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
What is SWOT analysis? How can this technique be used to identify IT project risks?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
What is a contingency plan?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 69 flashcards in this deck.