CompTIA Project+ Exam Questions

Page 6 of 25

101.

Which term may be used to describe the point in a team project when the team knows each other fairly well and they are each comfortable with their roles on the team?

  • Norming

  • Forming

  • Storming

  • Adjourning

Correct answer: Norming 

According to Bruce Tuckman's model, all teams go through five phases: forming, storming, norming, performing, and adjourning. In the norming phase, the team knows each other fairly well and they are comfortable and settled in their roles on the team. 

Forming is the beginning phase of team formation, when all members are first brought together. Storming is working through who will have the most influence on a team. Adjourning refers to breaking the team up after the work has been completed. 

102.

What is the role of a weighting factor in a scoring model? 

  • Account for the importance of a criterion

  • Account for the number of stakeholders in a project

  • Offset depreciation of an asset 

  • Quantify effort for a task

Correct answer: Account for the importance of a criterion 

A weighting factor accounts for the importance of a criterion in a scoring model. For example, in the table below, a weighting factor ranging from 1–10 indicates the importance of specific criteria relative to one another and calculates an overall score for alternative solutions. 

Criteria WeightScore for Option 1Option 1 total scoreScore for Option 2Option 2 total score
Profitability5525420
Time to market10440550
Demand31030824
Total  95 94

103.

What type of information is typically stored in a CRM?

Select all that apply.

  • Customer contact information

  • Service records

  • Corporate tax records

  • Payroll

Customer Relationship Management (CRM) software enables organizations to manage relationships and interactions with customers and potential customers. CRMs store data such as contact information, service details, asset information, and purchase information.

Corporate tax records and payroll information are not typically stored in a CRM. 

104.

Jamar is managing seven related projects using coordinated processes. Because these projects are all related, there would be a loss of benefits if the projects were all handled separately without collective management. Which BEST describes what Jamar is managing?

  • Program

  • Portfolio

  • Project charter

  • Operations

Correct answer: Program

A program is a group of related projects that are managed together using coordinated processes. Managing the projects as a group provides benefits that would not exist if they were managed completely separately.

A portfolio is a group of projects and programs, but unlike a program, the projects in a portfolio do not need to be related to each other. Operations are the repetitive and ongoing functions of a business that support the production of goods and services. A project charter authorizes a project to begin. 

105.

When it comes to resource loading, what is the MOST effective way to ensure project success?

  •  Load resources at the beginning of the project

  • Load resources as needed throughout the project

  • Load resources at the end of the project

  • Load all resources simultaneously

Correct answer: Load resources at the beginning of the project

Loading resources at the beginning of the project is the most effective way to ensure project success. It ensures the necessary resources are available when needed and helps avoid delays or reworking. Loading resources as needed throughout the project may lead to delays and can cause confusion for team members who are not aware of the resource requirements. Loading resources at the end of the project may lead to delays and can cause project timelines to be extended. Loading all resources simultaneously is not practical or efficient.

106.

Which formula is used to calculate cost variance in project management?

  • CV = EV – AC

  • EV = CV – AC

  • AC = CV – EV

  • CV = AC – EV

Correct answer: CV = EV – AC

Cost Variance (CV) is calculated by subtracting the Actual Cost (AC) from the Earned Value (EV). The formula is expressed as CV = EV – AC.

107.

Which of the activities below occur in the Closing phase of the project life cycle?

Select all that apply.

  • Verifying and validating deliverables

  • Archiving documents

  • Closing contracts

  • Budget monitoring

  • Business case creation

The Closing phase is the last phase of the project life cycle. Verifying and validating deliverables, closing contracts, and archiving documents are all common activities in the Closing phase. 

Budget monitoring and business case creation occur earlier in the project life cycle.

108.

Casey has been tasked with performing a risk analysis for an upcoming project. Which type of analysis determines the probability of risks and their potential impact on the project, then ranks them in order of priority?

  • Qualitative analysis

  • Quantitative analysis

  • Scenario analysis 

  • Situational analysis 

Correct answer: Qualitative analysis 

A qualitative analysis determines the probability of risks and the impact of those risks on a project and ranks them in order of priority to determine which ones need response plans. 

A quantitative analysis quantifies the aggregate risk exposure for a project by assigning numerical probabilities to risks. Scenario and situational analyses look at risks from the perspective of various situations and scenarios that may occur as the project progresses. 

109.

Which of the following BEST describes Agile project management and how it differs from traditional project management?

  •  Agile project management is a more flexible approach to project management, while traditional project management is more structured

  • Agile project management is a newer methodology, while traditional project management has been around for decades

  • Agile is a more cost-effective approach to project management, while traditional project management is more expensive

  • Agile is more focused on scope, while traditional project management is more focused on budget

Correct answer: Agile project management is a more flexible approach to project management, while traditional project management is more structured

Agile project management is an iterative and adaptive approach to project management that values collaboration, flexibility, and continuous improvement. 

Traditional project management, on the other hand, is a more structured and linear approach that emphasizes planning, control, and predictability.

110.

You are a project manager, and you have been using the earned value management technique to track your project's progress. You estimated that you would have completed 60% of the project work by the end of the second month, which was your Planned Value (PV). However, by that time, you managed to complete only 40% of the project work, which is your Earned Value (EV). Using the formula, what is the value of the Schedule Variance (SV)?

  • –0.2

  • 0.2

  • 0.4

  • –0.4

Correct answer: –0.2

The formula for Schedule Variance (SV) is: SV = EV – PV

In this scenario, the Earned Value (EV) is 40%, and the Planned Value (PV) is 60%. Plugging these values into the formula gives:

SV = 40% – 60% = –20%

Therefore, the Schedule Variance (SV) is –0.2, which means the project is running behind schedule. 

111.

A database server related to a healthcare project was hacked, and PII was exposed to unauthorized third parties. Which of the following describes this scenario? 

  • Breach of confidentiality 

  • Integrity deterioration 

  • OWASP Top 10 breach

  • Integrity distribution

Correct answer: Breach of confidentiality 

Protecting Personally Identifiable Information (PII) is an important aspect of project management because breaches can lead to penalties, negatively impact users, and damage brand value. A breach of confidentiality occurs when PII is exposed to unauthorized parties, which is what the scenario in the question describes. 

Data integrity means data is unaltered from its intended form. Integrity deterioration and integrity distribution are not real terms in project management. 

The OWASP Top 10 is a popular list of common web server vulnerabilities. OWASP Top 10 breach is not a real term.  

112.

As a project manager, it is important to keep in mind the various privacy regulations for country, state, and province. Which of the following privacy regulations was developed by Canada to protect PII?

  • PIPEDA

  • CCPA

  • GDPR

  • HIPAA

Correct answer: PIPEDA

Canada developed the Personal Information Protection and Electronic Documents Act (PIPEDA) to protect Personally Identifiable Information (PII). 

The California Consumer Privacy Act (CCPA) provides additional privacy standards for companies that conduct business in California. The General Data Protection Regulation (GDRP) was established by the European Union (EU) and applies to all organizations that conduct business in the EU. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was introduced to regulate the safekeeping of electronic healthcare information in the US. 

113.

Which of the following BEST defines the principle of least privilege in a project management context?

  • Providing only the necessary level of access to resources to complete assigned tasks

  • Granting unlimited access to resources to all project team members

  • Assigning administrative access to all project team members

  • Sharing access credentials to resources across the project team

Correct answer: Providing only the necessary level of access to resources to complete assigned tasks

The principle of least privilege is a security concept that refers to providing users with only the necessary level of access to perform their assigned tasks. In a project management context, this means restricting access to project resources so that the only team members who have access are those who need it to complete their work. 

Granting unlimited access to all project team members is the opposite of the principle of least privilege. Assigning administrative access to all project team members would give them more access privileges than they need to complete their work. Sharing access credentials across the project team increases the risk of unauthorized access and security incidents.

114.

What should the x-axis of a budget burndown chart represent in a waterfall project?

  • Timeline

  • Iterations

  • Budget

  • Person-hours 

Correct answer: Timeline

A budget burndown chart visualizes a budget's burn rate over time. It plots the planned budget and actual remaining funds over time. In waterfall projects, the y-axis represents the budget, and the x-axis represents the timeline. In Agile projects, the y-axis represents the budget, and the x-axis represents iterations. 

115.

Trademarks and copyrights are both examples of what?

  • Branding restrictions

  • OBS

  • PII

  • Operational security control

Correct answer: Branding restrictions

Branding restrictions are a form of security that protects unique products, services, and intellectual property. Trademarks typically identify specific brands and logos. Copyrights typically protect works such as music, books, and movies. 

An Organizational Breakdown Structure (OBS) is a hierarchical representation of resources that is similar to an organization chart but shows groups (e.g., departments or teams) and related work packages instead of individuals. 

Operational security deals with items like performing background checks and providing security clearances. The goal of operational security is to verify that a candidate's background (e.g., criminal record, driving history, financial status, etc.) makes them a viable candidate for a role. A background check is a typical example of operational security. 

Personally Identifiable Information (PII) is information about an individual that can be used to identify them. 

116.

Lucian, a project manager at Acme Inc., is creating a document that includes a list of risks related to a project. 

What document is Lucian creating, and which phase of the project life cycle is the project in?

  • Risk register and Execution phase

  • Risk register and Initiation phase

  • RAM and Execution phase

  • RAM and Initiation phase

Correct answer: Risk register and Execution phase

A risk register is a document that details project risks. A risk register is created and updated during the Execution phase of a project.

A Responsibility Assignment Matrix (RAM) is typically created during the Initiation phase of the project life cycle. A RAM uses a RACI chart and defines stakeholder responsibilities. 

117.

What stakeholder is responsible for ensuring uniformity in an organization's project management efforts?

  • PMO

  • SME

  • Program manager

  • Project manager

Correct answer: PMO

Identifying and assessing stakeholder responsibilities is a key aspect of the Initiation phase of a project. Here is a list of common stakeholder types and their roles:

  • Project Management Office (PMO): a business unit that helps enable a uniform approach to project management across an organization
  • Project sponsor: a person who has the authority to fund and provide resources to a project, typically the one who approves a project charter
  • Senior Management Team: executives responsible for meeting organizational goals; often responsible for project prioritization and finances
  • Business analyst: a person responsible for gathering and documenting requirements for a project
  • Project manager: the person who manages the work related to a project
  • Subject Matter Experts (SMEs): people with knowledge and experience related to a specific domain (subject matter)
  • Customers or end-users: the person or group that receives the output (product or service) from a project
  • Program manager: the person who manages multiple related projects and to whom a project manager typically reports
  • IT Team: the group of three key IT roles related to projects—architects who design IT solutions, developers/engineers who develop solutions (usually with code), and testers / Quality Assurance (QA) representatives who test solutions

118.

A project has a planned budget of $120,000 over a year. Six months into the project, project expenditures are $90,000. Which of the following statements correctly describes expenditures on the project?

Select all that apply.

  • The expected burn rate is $10,000 per month

  • The actual burn rate is higher than the expected burn rate

  • The actual burn rate is $10,000 per month

  • The expected burn rate is higher than the actual burn rate

Expected burn rate is calculated as: total budget / project time period = expected burn rate

Actual burn rate is calculated as: expenditures to date / project time to date = actual burn rate

Using the values from the question, the expected burn rate is $10,000 per month ($120,000 / 12 months), and the actual burn rate is $15,000 per month ($90,000 / 6 months).

119.

During the Initiation phase of a new project, a project manager on your team is drafting a RACI matrix. Which column should have only a single person marked for any given row? 

  • Accountable

  • Responsible

  • Consulted

  • Risk

Correct answer: Accountable

RACI stands for Responsible, Accountable, Consulted, and Informed. Only one person can be flagged as Accountable for a given item in a RACI matrix.  

Multiple team members can be marked as Responsible or Consulted in a RACI matrix. Risks are not tracked with owners in a RACI matrix.

120.

Acme Inc. has a security policy that requires all secondary storage devices to be scanned by IT before use. What devices below would be affected by this policy?

Select all that apply.

  • DVDs

  • Flash drives

  • NAS

  • WAN

  • Random-access memory

Secondary storage is also known as external memory. Flash drives, Network-Attached Storage (NAS), DVDs, and hard drives are all examples of secondary storage. 

A Wide Area Network (WAN) is a type of computer network. Random-access memory is a type of volatile primary storage.