Discount Offer
Go Back on PK0-005 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

PK0-005 Practice Test


Page 21 out of 58 Pages

A critical business initiative introduced new processes and technology to the organization. Which of the following approaches should be used to ensure the deliverables are increasingly adopted and leveraged by the organization over time?


A. Creation of a social news forum


B. Management directives to use the new system


C. New user kickoff meeting


D. Monthly feedback and training sessions





D.
  Monthly feedback and training sessions

Explanation: Monthly feedback and training sessions are the best approach to ensure that the deliverables of a critical business initiative are increasingly adopted and leveraged by the organization over time. Feedback and training sessions are communication and learning activities that provide information and guidance on how to use and benefit from the new processes and technology introduced by the initiative. Feedback and training sessions can help to increase awareness, understanding, acceptance, and adoption of the deliverables among the organization’s employees and stakeholders. They can also help to identify and address any issues or challenges that may arise during the implementation and transition phases.

During a complex, multiyear project, a PM must discern which project tasks overlap so resources can be allocated appropriately. Which of the following is best for determining this information?


A. PERT chart


B. Milestone chart


C. Gantt chart


D. Budget burndown chart





C.
  Gantt chart

Government projects require that personnel submit to background screenings for certain clearance requirements. Which of the following best describes this process?


A. Data security


B. Operational security


C. Physical security


D. Digital security





B.
  Operational security

Explanation: Operational security is the process of identifying, protecting, and controlling sensitive information and activities from unauthorized access or disclosure. Operational security includes background screenings for personnel who need to access classified or restricted information or resources, as well as implementing policies and procedures to prevent leaks, breaches, or espionage. Operational security is essential for government projects that involve national security, defense, intelligence, or law enforcement. Operational security is different from data security, which is the process of safeguarding data from unauthorized access, use, modification, or destruction. Data security includes encryption, authentication, authorization, backup, and recovery of data. Operational security is also different from physical security, which is the process of securing physical assets, such as equipment, data, or personnel, from unauthorized access or damage. Physical security includes locks, alarms, cameras, guards, and fences. Operational security is also different from digital security, which is the process of protecting digital devices, networks, and systems from cyberattacks, malware, or hacking. Digital security includes firewalls, antivirus, VPN, and passwords.

A project manager has received different functional requests from three individual stakeholders. The project manager is able to have all parties concede somewhat in order to find a reasonable solution. Which of the following outcomes would most likely occur?


A. Too much time might be spent generating project delays.


B. The project manager might be seen as weak.


C. The number of change requests throughout the project might be reduced.


D. Some stakeholders might not be completely satisfied.





D.
  Some stakeholders might not be completely satisfied.

Explanation: When a project manager achieves a compromise, it often means that stakeholders may not be entirely satisfied with the outcome. However, compromise is sometimes necessary to balance differing needs, consistent with CompTIA Project+ principles on stakeholder management and negotiation.

During a stand-up meeting, a team member asks to include a change that an important stakeholder requested in the project board. This request is denied, and the team member has to go back to what was originally planned for the sprint. Which of the following individuals should the stakeholder have asked to request the change instead of the team member?


A. Architect


B. Project sponsor


C. Scrum master


D. Product owner





D.
  Product owner

Explanation: The product owner is the person who is responsible for managing the product backlog, which includes adding, removing, or changing items based on stakeholder feedback and business value. The product owner is also the one who can collaborate with the development team and the scrum master to decide if a change can be accommodated in the current sprint or deferred to a future sprint. Therefore, the stakeholder should have asked the product owner to request the change instead of the team member, who is not authorized to make changes to the sprint backlog12.


Page 21 out of 58 Pages
Previous