100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

PK0-005 Comptia Project+ QUESTIONS AND ANSWERS GRADE A+ GURANTEED

Puntuación
-
Vendido
-
Páginas
38
Grado
A+
Subido en
04-04-2024
Escrito en
2023/2024

Which of the following describes the sharing of software, information, data, and services with technology devices on demand? A. Infrastructure B. Multitiered architecture C. Cloud computing D. Networking and connectivity C. Cloud computing Cloud computing provides data, information, software, and services on demand. Which of the following is not a resource life cycle phase? A. End-of-life software B. Maintenance C. Successor planning D. Hardware decommissioning E. Subscription E. Subscription Resource life cycles include acquisition, maintenance, hardware decommissioning, end-of-life software, and successor planning. All of the following describe the model of communication exchange except for which one? A. Sender-message-receiver. B. Senders are responsible for encoding the message and presenting it in such a way that the receiver can correctly understand it. C. Receivers decode the message and make certain the message is clear and concise. D. The message can take many forms, including written, verbal, formal, and informal. C. Receivers decode the message and make certain the message is clear and concise. Receivers decode the message and make certain they understand and have received all the information. Senders are responsible for making certain the message is clear and concise. You are working on a complex project and it's important that you show dependencies between tasks due to the resource shortages you are experiencing. Which of the following is true regarding this question? A. You should use a Gantt chart because it easily shows the dependencies between the tasks and the critical path. B. You should use a PERT chart because it shows the dependencies between the tasks along the entire project timeline. C. You should use a PERT chart because it easily shows the dependencies between the tasks and the critical path. D. You should use a milestone chart because it shows the dependencies between the tasks and the critical path. C. You should use a PERT chart because it easily shows the dependencies between the tasks and the critical path. A PERT chart shows the dependencies between tasks but does not display the entire project timeline. It's difficult (not easy, as the question states) to display dependencies and the critical path on a Gantt chart. A Gantt chart can display the entire project timeline, a PERT chart cannot (unless it's a very small project). The executives in your organization often travel up to 75 percent of their workdays. The IT department is implementing MFA to enforce a verification of identity to help mitigate exploits of their accounts. Which of the following option is not true about this process? A. MFA requires at least two methods to verify identity. B. The first step in MFA occurs with a username and password. C. MFA procedures are outlined in the data security policy. D. MFA provides a way for users to log in remotely to access corporate systems and data. C. MFA procedures are outlined in the data security policy. Multifactor authentication (MFA) is a process whereby the user must provide two or more methods to verify their identity during the sign-in process. MFA is outlined in the data security policy. You are procuring professional services for your agile project. This procurement document will include tasks the vendor will complete in the iteration and any standards that apply to the project. This document also states that each iteration is two weeks. What document does this describe and what contract type is it used with? A. SOW with an RFP B. TOR with an RFP C. TOR with an MSA D. SOW with an MSA C. TOR with an MSA A term of reference is often used within a master service agreement for agile projects. It is similar to a statement of work. This agile methodology focuses on frequent cycles and delivering software to the customer when the customer needs it. The core values for this methodology are communication, simplicity, feedback, courage, and respect. Which methodology does this describe? A. Feature-driven development B. Agile unified process C. Dynamic systems development method D. Extreme programming D. Extreme programming Extreme programming (XP) focuses on frequent cycles and delivering software to the customer when the customer needs it. This stakeholder analysis technique uses a model that analyzes elements such as power levels, interest levels, attitudes, influence levels, and ability to impact or change the project. A. Power/influence grid B. Power/interest grid C. Salience model D. Stakeholder cube D. Stakeholder cube This question describes a 3D stakeholder cube, which analyzes combinations of stakeholder influence, interest, attitudes, power, and more. For what reasons should you create milestones in your project plans? (Choose two. A. To signal the end of a task B. To provide a budgetary checkpoint C. To indicate the completion of a deliverable D. To provide a comparison of actual versus estimated time E. To perform a hand-off F. To measure quality assurance B. To provide a budgetary checkpoint C. To indicate the completion of a deliverable CONTINUED....

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
4 de abril de 2024
Número de páginas
38
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

PK0-005 Comptia Project+ QUESTIONS
AND ANSWERS GRADE A+ GURANTEED

Which of the following describes the sharing of software, information,
data, and services with technology devices on demand?
A. Infrastructure
B. Multitiered architecture
C. Cloud computing
D. Networking and connectivity
C. Cloud computing


Cloud computing provides data, information, software, and services on
demand.
Which of the following is not a resource life cycle phase?
A. End-of-life software
B. Maintenance
C. Successor planning
D. Hardware decommissioning
E. Subscription
E. Subscription


Resource life cycles include acquisition, maintenance, hardware
decommissioning, end-of-life software, and successor planning.
All of the following describe the model of communication exchange
except for which one?
A. Sender-message-receiver.
B. Senders are responsible for encoding the message and presenting it
in such a way that the receiver can correctly understand it.
C. Receivers decode the message and make certain the message is clear
and concise.
D. The message can take many forms, including written, verbal, formal,
and informal.
C. Receivers decode the message and make certain the message is clear
and concise.




Receivers decode the message and make certain they understand and

,have received all the information. Senders are responsible for making
certain the message is clear and concise.
You are working on a complex project and it's important that you show
dependencies between tasks due to the resource shortages you are
experiencing. Which of the following is true regarding this question?

A. You should use a Gantt chart because it easily shows the
dependencies between the tasks and the critical path.
B. You should use a PERT chart because it shows the dependencies
between the tasks along the entire project timeline.
C. You should use a PERT chart because it easily shows the
dependencies between the tasks and the critical path.
D. You should use a milestone chart because it shows the dependencies
between the tasks and the critical path.
C. You should use a PERT chart because it easily shows the
dependencies between the tasks and the critical path.




A PERT chart shows the dependencies between tasks but does not
display the entire project timeline. It's difficult (not easy, as the
question states) to display dependencies and the critical path on a
Gantt chart. A Gantt chart can display the entire project timeline, a
PERT chart cannot (unless it's a very small project).
The executives in your organization often travel up to 75 percent of
their workdays. The IT department is implementing MFA to enforce a
verification of identity to help mitigate exploits of their accounts.
Which of the following option is not true about this process?
A. MFA requires at least two methods to verify identity.
B. The first step in MFA occurs with a username and password.
C. MFA procedures are outlined in the data security policy.
D. MFA provides a way for users to log in remotely to access
corporate systems and data.
C. MFA procedures are outlined in the data security policy.




Multifactor authentication (MFA) is a process whereby the user must
provide two or more methods to verify their identity during the sign-
in process. MFA is outlined in the data security policy.
You are procuring professional services for your agile project. This
procurement document will include tasks the vendor will complete in
the iteration and any standards that apply to the project. This
document also states that each iteration is two weeks. What document

,does this describe and what contract type is it used with?
A. SOW with an RFP
B. TOR with an RFP
C. TOR with an MSA
D. SOW with an MSA
C. TOR with an MSA

A term of reference is often used within a master service agreement
for agile projects. It is similar to a statement of work.
This agile methodology focuses on frequent cycles and delivering
software to the customer when the customer needs it. The core values
for this methodology are communication, simplicity, feedback, courage,
and respect. Which methodology does this describe?
A. Feature-driven development
B. Agile unified process
C. Dynamic systems development method
D. Extreme programming
D. Extreme programming


Extreme programming (XP) focuses on frequent cycles and delivering
software to the customer when the customer needs it.
This stakeholder analysis technique uses a model that analyzes
elements such as power levels, interest levels, attitudes, influence
levels, and ability to impact or change the project.
A. Power/influence grid
B. Power/interest grid
C. Salience model
D. Stakeholder cube
D. Stakeholder cube

This question describes a 3D stakeholder cube, which analyzes
combinations of stakeholder influence, interest, attitudes, power,
and more.
For what reasons should you create milestones in your project plans?
(Choose two.
A. To signal the end of a task
B. To provide a budgetary checkpoint
C. To indicate the completion of a deliverable
D. To provide a comparison of actual versus estimated time
E. To perform a hand-off
F. To measure quality assurance
B. To provide a budgetary checkpoint
C. To indicate the completion of a deliverable

, Milestones are used as checkpoints to determine whether the project
is on time and on budget, and they may also note the completion of a
deliverable.
The business case presented for your project outlines the initial
cost of the project at $120,000. Today's current value of the project
is $150,000. The cost of investment is 6 percent. What is ROI?
A. 2.7%
B. <3%>
C. 3%
D. <2.7%>
C. 3%




ROI is calculated this way:

ROI = (Current Value or Gain from the Investment - Cost of Investment)
/ (Cost of the Investment)
ROI for this question is: (150,000 - 120,000) / (100,000) = .03
.03 × 100 = 3%
One of the risks identified on your risk list has come about. The
risk owner informed you the risk event is in motion. All of the
following are true regarding this scenario except which one?
A. Risks are potential future events and become issues once they
occur.
B. Contingency reserves and work-arounds are possible solutions to
help resolve this.
C. Because the risk has occurred, it should now be managed using the
issue management process.
D. Issues are potential events that could adversely affect the
project outcomes.
D. Issues are potential events that could adversely affect the
project outcomes.




Risks are potential future events and issues are events that have
occurred (or are in the process of happening). Issues are not
potential, they are real. Risks become issues once they happen and
should be managed using the issue management process.
Your project is in the Executing phase and the stakeholders are
requesting a change. All of the following should be included in the
$18.06
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
bitohvildia

Conoce al vendedor

Seller avatar
bitohvildia Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
4 año
Número de seguidores
1
Documentos
148
Última venta
1 año hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes