Funding limit reconciliation is a tool and technique used in which process?
A. Control Costs
B. Determine Budget
C. Estimate Costs
D. Control Budget
In Plan Risk Management, which of the management plans determines who will be available to share information on various risks and responses at different times and locations?
A. Schedule
B. Quality
C. Communications
D. Cost
Under which type of contract does the seller receive reimbursement for all allowable costs for performing contract work, as well as a fixed-fee payment calculated as a percentage of the initial estimated project costs?
A. Cost Plus Fixed Fee Contract (CPFF)
B. Cost Plus Incentive Fee Contract (CPIF)
C. Firm Fixed Price Contract (FFP)
D. Fixed Price with Economic Price Adjustment Contract (FP-EPA)
An input of the Create WBS process is:
A. requirements documentation.
B. scope baseline.
C. project charter.
D. validated deliverables.
The cost benefit analysis tool is used for creating:
A. Pareto charts.
B. quality metrics.
C. change requests,
D. Ishikawa diagrams.
Which of the following are three inputs to the risk register?
A. Risk register updates, stakeholder register, and quality management plan
B. Communication management plan, enterprise environmental factors, and activity duration estimates
C. Risk management plan, activity cost estimates, and project documents
D. Project scope statement, organizational process assets, and scope baseline
Which of the following change requests can bring expected future performance of the project work in line with the project management plan?
A. Corrective action
B. Defect repair
C. Preventative action
D. Probable action
Which of the following is a tool or technique used in the Acquire Project Team process?
A. Networking
B. Training
C. Negotiation
D. Issue log
Identify Stakeholders is the process of identifying all of the people or organizations impacted by the project and documenting relevant information regarding their interests in, involvement in, and impact on the project:
A. manager.
B. success.
C. deadline.
D. scope.
Which of the following response strategies are appropriate for negative risks or threats?
A. Share, Accept, Transfer, or Mitigate
B. Exploit, Enhance, Share, or Accept
C. Mitigate, Share, Avoid, or Accept
D. Avoid, Mitigate, Transfer, or Accept
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only PMI exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PMI-001 exam preparations and PMI certification application, do not hesitate to visit our Vcedump.com to find your solutions here.