logo

CuriousTab

CuriousTab

Discussion


Home Certification PMP Certification See What Others Are Saying!
  • Question
  • The project life cycle can be broken into five phases that tend to overlap with each other frm one phase to another;however ,the control phase does not overlap with a specific phase. why?


  • Options
  • A. Change control management is seperate from the other phases
  • B. Change control management has a plan that can be usede throughout the initiation, planning, execution, and closeout of the project
  • C. Because the project sponsor is responsible for change control management , the project manager is not involved with that phase of the project
  • D. Change control extends throughout the entire project from initiation to closeout

  • Correct Answer
  • Change control extends throughout the entire project from initiation to closeout 

    Explanation

    Change control management is utilized from the begining to the end of the project in order to keep it focused with an emphasis on the time and budget. Answer A is incorrect because change control management is not seperate from the other phases. Answer B is incorrect because the control plan must be throughout the other phases of a project. Its usage is not optional, and consistent utilization is imperative to managing scope creep and other scope expansions. Answer C is incorrect because the project sponsors is generally not responsible for the change control documentation, although it should be involved in the buy-in and approval process.


  • More questions

    • 1. Which two descriptions are correct about characteristics of IPv6 unicast addressing? (Choose two) A. Global addresses start with 2000::/3. B. Link-local addresses start with FF00::/10. C. Link-local addresses start with FE00:/12. D. There is only one loopback address and it is ::1.
    • Discuss
    • 2. What are the six OSPF route types?
    • Discuss
    • 3. How many non- overlapping channels are available with 802.11b?

    • Options
    • A. 3
    • B. 12
    • C. 23
    • D. 40
    • Discuss
    • 4. Which IEEE committee has been sanctioned by WAP and is called WPA2?
    • Discuss
    • 5. When a station sends a transmission to the MAC address ff : ff : ff : ff : ff : ff, what type of transmission is it?

    • Options
    • A. Unicast
    • B. Multicast
    • C. Anycast
    • D. Broadcast
    • Discuss
    • 6. In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

    • Options
    • A. All hosts have equal priority
    • B. The two hosts that caused the collision will have equal priority
    • C. The host that sent the jam signal after the collision
    • D. The host with the highest MAC address
    • Discuss
    • 7. What is the Classs A Private IP address space?
    • Discuss
    • 8. What is the Class C private IP address space?
    • Discuss
    • 9. To use VLSM, what capability must the routing protocols in use possess?

    • Options
    • A. Support for multicast
    • B. Multi-protocol support
    • C. Transmission of subnet mask information
    • D. Support for unequal load balancing
    • Discuss
    • 10. If you wanted administrators to see a message when logging into the router, which command would you use?

    • Options
    • A. message banner motd
    • B. banner message motd
    • C. banner motd
    • D. message motd
    • Discuss


    Comments

    There are no comments.

Enter a new Comment