Practice Free PK0-005 Exam Online Questions
Which of the following is the best example of a breach of physical security?
- A . System user IDs being used by multiple individuals
- B . Printers that do not request user authentication
- C . Developers having full access to both development and production environments
- D . Project documentation that is only kept on a removable device
D
Explanation:
A breach of physical security is an unauthorized access or damage to physical assets, such as equipment, data, or personnel. Project documentation that is only kept on a removable device is the best example of a breach of physical security, because it exposes sensitive information to theft, loss, or corruption. If the removable device is not encrypted or protected, anyone who obtains it can access the project documentation and compromise the project integrity, confidentiality, or availability. Therefore, project documentation should be stored in a secure location, backed up regularly, and protected by access controls and encryption.
The other options are not examples of physical security breaches, but rather logical or administrative security breaches. System user IDs being used by multiple individuals is a violation of the principle of least privilege and accountability, which could lead to unauthorized access or misuse of system resources. Printers that do not request user authentication is a lack of proper access control, which could allow unauthorized printing or retrieval of confidential documents. Developers having full
access to both development and production environments is a violation of the principle of separation of duties and environments, which could introduce errors, conflicts, or malicious code into the production system.
Reference = CompTIA Project+ Study Guide: Exam PK0-005, 3rd Edition, Chapter
9: Security Management1; CompTIA Project+ Certification Study Guide, 3rd Edition, Chapter 9: Security Management2; Types of Security Breaches: Physical and Digital3
An IT intern was assigned to set up workstations as part of a project. The IT intern was very careful to do the task well and initially referred to notes while performing the task. By the end of the two-week rotation, the IT intern no longer needed the notes and completed more set-ups in less time.
Which of the following MOST likely represents the observed relationship in this scenario?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
C
Explanation:
Option C shows a graph that most likely represents the observed relationship in this scenario. The graph shows a learning curve, which is a graphical representation of the relationship between a learner’s performance on a task and the number of attempts or time required to complete the task.
The learning curve theory proposes that a learner’s efficiency in a task improves over time the more the learner performs the task. In this case, the IT intern was able to complete more set-ups in less time as they gained more experience and proficiency over the two-week rotation12
Which of the following would be the most helpful in providing customers with an application accessible via a web browser?
- A . IaaS
- B . SaaS
- C . PaaS
- D . XaaS
B
Explanation:
SaaS (Software as a Service) provides customers with access to applications over the internet, typically through a web browser. This cloud model allows users to access software without managing the underlying infrastructure. This aligns with CompTIA Project+ guidance on cloud service models for project delivery.
A project manager buys an extended warranty for a set of servers.
Which of the following risk management strategies is the manager using?
- A . Transfer
- B . Avoid
- C . Accept
- D . Mitigate
A
Explanation:
Transfer is a risk management strategy that involves shifting the responsibility or impact of a risk to a third party, such as an insurance company, a vendor, or a contractor1. By buying an extended warranty for a set of servers, the project manager is transferring the risk of server failure or malfunction to the warranty provider, who will cover the cost of repair or replacement in case of a risk event. This way, the project manager reduces the exposure and liability of the project to the risk, while still retaining some level of accountability and oversight2.
Reference = CompTIA Project+ PK0-005 Certification Study Guide, Chapter 8: Planning Projects Part 4, page 245; 4 Risk Management Strategies for Successful Project Execution, Risk transferring section; How to Manage Project Risk: A 5-Step Guide, Risk treatment section.
A project manager reports that the implementation of a new system is on track to be completed under budget and ahead of the schedule. A stakeholder then asks the manager to add mobile device functionality.
Which of the following should the project manager do in response to the request?
- A . Decline because it is not included in the project scope.
- B . Assess the impact of the request and create a change request
- C . Create new functional and non-functional requirements for mobile devices.
- D . Revise the baseline of the project plan by adding the new requirements.
B
Explanation:
Assess the impact of the request and create a change request. The project manager should assess the impact of the request and create a change request in response to the stakeholder asking to add mobile device functionality to a project that is on track to be completed under budget and ahead of schedule. A change request is a document that formally proposes and records a modification or addition to some aspect of a project, such as scope, schedule, cost, quality, or resources. A change request can help to communicate and justify the need and rationale for the change and its implications on the project objectives and deliverables. A change request also helps to initiate the change control process, which involves reviewing, approving, implementing, and monitoring the change12
A project team is defining operational training, discussing a go-live date, and describing the operational handoff.
Which of the following best describes what the team is developing?
- A . The project closeout report
- B . A handover to operations
- C . Phase-gate review documentation
- D . A transition plan
D
Explanation:
A transition plan is a document that outlines how the project deliverables will be transferred to the operations team or the end users, and how the project team will disengage from the project. It typically includes details such as operational training, go-live date, support arrangements, roles and responsibilities, and acceptance criteria. A transition plan is different from a project closeout report, which summarizes the project performance, lessons learned, and final status. A handover to operations is a process of transferring the project deliverables to the operations team, but it is not a document. A phase-gate review documentation is a set of documents that are used to evaluate the project progress and readiness to move to the next phase, but it is not related to the operational handoff.
Reference = CompTIA Project+ PK0-005 Certification Study Guide, Chapter 14: Closing the Project, p. 409-410; [CompTIA Project+ Certification Exam Objectives], Domain 4: Project Closure, Objective 4.1: Compare and contrast various project closure activities.
During a status meeting for a multisystem program, a program manager learns that some deliverables from another project are delayed.
Which of the following should the program manager do next?
- A . Obtain details from the owner of the project.
- B . Update the critical path for the project.
- C . Apply contingency reserves.
- D . Reestimate epic user stories.
A
Explanation:
The program manager should first obtain details from the owner of the project that is causing the delay, such as the root cause, the impact, the mitigation plan, and the revised timeline. This will help the program manager to assess the situation, communicate with the stakeholders, and adjust the program schedule accordingly. Updating the critical path, applying contingency reserves, and reestimating epic user stories are possible actions that the program manager may take after obtaining the details, depending on the severity and duration of the delay. However, they are not the immediate next steps, as they require more information and analysis.
Reference = CompTIA Project+ Study Guide: Exam PK0-005, Third Edition, Chapter 10: Executing the Project, page 2431; Dealing with delays – Project Management Institute2
A project manager is leading the implementation of a new service for a well-known, global company for which brand image is most important. The project will rely on contracted services. As part of the request for proposal process, the project team has identified a short list of vendors to submit proposals.
Which of the following items should the project team consider as a primary factor to remove a vendor from consideration?
- A . The vendor’s proposed schedule does not align with the desired schedule.
- B . The vendor is new and not well established in the market.
- C . The vendor has been linked to ESG concerns within the past month
- D . The vendor’s quote was the highest of all the proposals.
C
Explanation:
ESG stands for environmental, social, and governance, and it refers to the criteria that measure the sustainability and ethical impact of an organization. ESG concerns can affect the reputation, performance, and value of a company, as well as its stakeholders and customers. For a well-known, global company that values its brand image, hiring a vendor that has been linked to ESG concerns can be a major risk and a source of negative publicity. Therefore, the project team should consider this as a primary factor to remove a vendor from consideration12.
When creating a project schedule, a project manager adds activities with zero duration.
Which of the following describes these types of activities?
- A . Critical paths
- B . Resources
- C . Milestones
- D . Work breakdown structures
C
Explanation:
Milestones are activities with zero duration that are added to a project schedule by a project manager. Milestones are significant events or achievements in a project that mark the completion of a phase, deliverable, or task. Milestones can help to track and measure the progress and performance of a project and communicate it to stakeholders.
Which of the following is a quantitative key performance indicator?
- A . The project sponsor ranked the graphics of an application as four out of five.
- B . The project implements the application in ten different geographical regions.
- C . The workers complete tasks on average 25% faster using a new application.
- D . The use of a multimedia interface appeals more to users under the age of 21.
C
Explanation:
Quantitative KPIs are measurable and based on numerical data. The statement about task completion time being 25% faster is quantitative, as it involves specific data that can be measured and tracked, as recommended by CompTIA Project+ for project performance evaluation.