Practice Free PK0-005 Exam Online Questions
A project manager needs to develop a way to control who can modify documents, artifacts, and other data related to the product.
Which of the following would be the best way to accomplish this objective?
- A . Define access requirements.
- B . Develop a transition plan.
- C . Create a responsibility assignment matrix.
- D . Create a work breakdown structure.
A project was closed according to the planned project schedule. Security teams later identified that one of the contractors stole data after the project’s closure.
Which of the following would have most likely prevented the data from being stolen?
- A . Removing access
- B . Closing contracts
- C . Project sign-off
- D . Project evaluation
Because the project team lacks hands-on experience, the project manager has decided to involve a third-party vendor to complete the development of a product.
Which of the following documents should the project manager expedite first?
- A . RFI
- B . RFP
- C . RFQ
- D . RFB
A project is not progressing as planned following the departure of the project manager.
Which of the following would be the best tool to use to document this information?
- A . Issue log
- B . Risk register
- C . Change log
- D . Defect log
A project manager has decided to outsource portions of a project and will conduct a separate procurement.
In which of the following phases does this task occur?
- A . Planning
- B . Initiating
- C . Controlling
- D . Executing
A PM is working on the preliminary scope statement and identifies that this project has the same approach as another project that was completed last year.
Which of the following actions would the PM most likely perform?
- A . Call the previous PM for advice on risks and issues.
- B . Ask the project sponsor to provide previous final project report results.
- C . Complete the project charter using the other PM’s subject matter expertise.
- D . Use existing artifacts and accommodate based on the current project success criteria.
Which of the following should occur when implementing an IT infrastructure change that takes risks into consideration?
- A . Approving the change request
- B . Developing a rollback plan
- C . Gathering necessary resources
- D . Defining requirements
A PM is working with stakeholders in the discovery phase and comparing the cost of the project to the cost savings the project will produce when it is complete.
The output of this exercise will produce the:
- A . ROI.
- B . SOW.
- C . RFI.
- D . RPR
Which of the following best describes the difference between the current state and the desired future state in project management?
- A . The current state is a high-level view of the project scope, and the desired state is what is happening right now.
- B . The current state is where the business is now, and the desired state is where the project is going to take the business.
- C . The current state is a high-level view of the project scope, and the desired future state is the specific outcome the business wants.
- D . The current state defines the specific outcome the business wants, and the desired state documents what is happening now that prevents it.
A project manager is assigned an initiative in a highly regulated industry that requires employees to safeguard certain pieces of PII.
Which of the following is the best approach for the project manager to keep the information confidential?
- A . Encryption
- B . Multifactor authentication
- C . Quality assurance
- D . Password protection