Think You're Ready?

Your Final Exam Before the Final Exam.
Dare to Take It?

A new project team started work three months ago. The team members are increasing their work productivity and are comfortable asking for help with tasks. Which of the following describes the current stage of the project team?

A. Performing

B. Adjourning

C. Forming

D. Norming

D.   Norming

Explanation:

This question refers to Tuckman’s stages of team development.

Clues in the scenario
Team has been working together for some time (3 months)
Productivity is increasing
Members feel comfortable collaborating and asking for help

These are signs of the Norming stage:

🤝 Team members build trust, improve collaboration, and establish effective working relationships.

During Norming
Roles and processes become clear
Conflicts decrease
Cooperation increases
Team cohesion strengthens
Performance begins improving

Why the Other Options Are Wrong

A. Performing
Highest-functioning stage
Team operates smoothly with strong autonomy
Productivity is consistently high
❌ The question says productivity is increasing, not fully optimized yet

B. Adjourning
Project completion and team disbanding
Focus on wrap-up and transition
❌ Team is still actively working

C. Forming
Initial stage
Members are polite, cautious, and unsure of roles
Low productivity
❌ Team is already comfortable and productive

📚 References

Aligned with CompTIA Project+ (PK0-005) Objectives:
Team development and leadership
Team dynamics and performance stages

Also consistent with:
Tuckman Model — Forming, Storming, Norming, Performing, Adjourning

A few weeks before a project is scheduled to be completed, the client asks to add a new feature to the product that is being developed. The project manager analyzes the project schedule and determines the feature can be implemented quite easily without affecting the completion date. Which of the following should the project manager do first?

A. Escalate the change to the CCB.

B. Review the requested change.

C. Document the change recommendations.

D. Validate the implementation of the requested change.

B.   Review the requested change.

Explanation:

The question describes a scenario where a change request has been made by the client. The project manager has performed a preliminary analysis (determining it won't affect the date). However, the question asks for the first thing the PM should do in the formal process.

Why B is correct
Before any action can be taken on a change request, it must be formally reviewed. This review goes beyond just the schedule impact the PM already considered. It involves analyzing the full impact on scope, cost, quality, resources, and risk. The PM must fully understand the request and its implications before deciding on the next steps, such as documenting it formally or submitting it to the CCB.

Why A is incorrect
Escalating to the Change Control Board (CCB) is a step that comes after the review and documentation. The CCB needs a fully documented change request with a complete impact analysis to make an informed decision. The PM should not send an incomplete or un-reviewed request to the CCB.

Why C is incorrect
Documenting the change recommendations is a crucial step, but it comes after the review. The PM must first review the request to understand what needs to be documented. The documentation captures the findings of the review.

Why D is incorrect
Validating the implementation occurs at the very end of the change control process, after the change has been approved and implemented. This is the last step, not the first.

References
CompTIA Project+ PK0-005 Objective 3.2: Given a scenario, apply the change control process. The standard change control process flow is:
1) Submit/Log the change request
2) Review/Assess the impact
3) Document the analysis
4) Get approval/rejection (often from CCB)
5) Implement (if approved)
6) Validate implementation

A project manager is assigned an initiative in a highly regulated industry that requires employees to safeguard certain pieces of PII. Which of the following is the best approach for the project manager to keep the information confidential?

A. Encryption

B. Multifactor authentication

C. Quality assurance

D. Password protection

A.   Encryption

Explanation:

In a highly regulated industry, the "gold standard" for ensuring the confidentiality of PII (Personally Identifiable Information) is Encryption. Encryption transforms readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key. Even if an unauthorized person—whether an external hacker or an internal employee without the key—gains access to the file or database, they cannot read the information.

While other methods control who gets in, encryption protects the data itself. This is often a legal requirement under regulations like GDPR, HIPAA, or PCI-DSS to safeguard sensitive data "at rest" (stored on disks) and "in transit" (sent over networks).

Explanation of Incorrect Answers

B. Multifactor authentication (MFA)
MFA is an access control mechanism that requires users to provide two or more verification factors to gain entry to a system (e.g., a password and a code from a phone). While it makes it harder for someone to log in, it does not protect the data if the system itself is breached or if an authorized user mishandles the data.

C. Quality assurance (QA)
QA is a process used to ensure that a project's deliverables meet the required quality standards and are free of defects. It is not a security technology used for data confidentiality.

D. Password protection
Simple password protection is considered a "weak" form of security in regulated industries. Passwords can be easily guessed, shared, or bypassed via brute-force attacks. Unlike encryption, password protection often only locks the "front door" of a file rather than securing the underlying data bytes.

References
CompTIA Project+ (PK0-005) Exam Objectives: Domain 3.0 Project Risk and Change Management (3.4 Explain the importance of data security and privacy).
NIST Special Publication 800-175B: Guideline for Using Cryptographic Standards.

Someone claiming to be from a tax agency sent an email to a team member asking for access to the project repository. Which of the following BEST describes this scenario?

A. Social engineering

B. Phishing

C. Spoofing

D. Hacking

B.   Phishing

Explanation:

The scenario describes someone pretending to be from a tax agency and sending an email to gain unauthorized access to a project repository. This is a classic case of phishing, where attackers impersonate trusted entities to trick individuals into revealing sensitive information or granting access.

A. Social engineering
A broader category that includes phishing, pretexting, baiting, etc. While phishing is a type of social engineering, the specific method here is email impersonation.

B. Phishing
✅ Correct. This is the best description since the attacker used an email to impersonate a legitimate agency and request access.

C. Spoofing
Refers to falsifying identity (like fake email headers or IP addresses). While spoofing may be part of phishing, the broader attack here is phishing.

D. Hacking
General term for unauthorized access, but it doesn’t describe the social manipulation method used.

Thus, the best description of this scenario is phishing.

Reference
CompTIA Project+ PK0-005 Exam Objectives, Domain 4.0 (Project Closure and Support) — Phishing is a social engineering technique where attackers impersonate trusted entities via email or messages to gain unauthorized access.

An opportunity emerged in the middle of a project life cycle. Which of the following is the BEST action for the project manager to take?

A. Exploit the risk.

B. Accept the risk.

C. Avoid the risk.

D. Transfer the risk.

A.   Exploit the risk.

Explanation:

Exploit
In project risk management, an "opportunity" is defined as a positive risk. To exploit a risk means to take proactive and definite actions to ensure that the opportunity is realized and the project achieves the associated benefits (such as finishing early, reducing costs, or improving quality). Unlike "enhance," which only increases the probability, "exploit" aims to eliminate the uncertainty associated with a positive risk to make it a certainty.

Why the other options are incorrect

B. Accept the risk
This is a passive or "do nothing" approach. While you can accept a positive risk (passive acceptance), it is not the best action when an opportunity has emerged, as it leaves the realization of benefits to chance.

C. Avoid the risk
This strategy is used for negative risks (threats) to eliminate the cause of the risk entirely. You would not want to "avoid" a beneficial opportunity.

D. Transfer the risk
This is a negative risk strategy where the impact of a threat is shifted to a third party (e.g., insurance or a vendor). It is not a standard approach for managing a positive opportunity.

A project is executed to migrate all data to a single system following the merger of two companies. The team validates that system performance will not be impacted. Which of the following did the team perform?

A. Regression testing

B. Smoke testing

C. Stress testing

D. Automation testing

C.   Stress testing

Explanation:

The scenario states:

Data from two companies is being migrated into one system
The team verifies that system performance will not be impacted

This involves testing how the system behaves under heavy load and extreme conditions.

💪 Stress testing evaluates system stability and performance under high demand or peak loads.

It helps determine:
Maximum system capacity
Breaking points
Performance degradation
Reliability after major changes (like data migration)

This makes it the best match.

Why the Other Options Are Wrong

A. Regression testing
Ensures existing functionality still works after changes
❌ Focuses on features, not performance capacity

B. Smoke testing
Basic, high-level functionality test
Confirms system starts and major functions run
❌ Not focused on performance or load handling

D. Automation testing
Testing method using automated tools/scripts
❌ Not a specific performance testing type

📚 References

Aligned with CompTIA Project+ (PK0-005) Objectives:
Quality assurance and testing
Performance and system validation
Infrastructure change verification

Also consistent with:
Software Testing Fundamentals — Performance & Stress Testing

A third party needs to perform a short-term task for which the duration cannot be accurately estimated and the cost cannot be calculated in advance. Which of the following should the project manager put in place before work begins?

A. Time and materials contract

B. Master service agreement

C. Fixed-price contract

D. Statement of work

E. Cost-plus agreement

A.   Time and materials contract

Explanation:

The question specifies two key conditions for the work: the duration cannot be accurately estimated and the cost cannot be calculated in advance. This makes certain contract types impractical.

Why A is correct
A Time and Materials (T&M) contract is a hybrid agreement that combines aspects of both fixed-price and cost-reimbursable contracts. It pays the vendor at an agreed-upon hourly or labor rate for the time spent, plus the actual cost of materials. This type of contract is ideal when the scope is not well-defined, or when the duration and total cost cannot be estimated accurately at the outset, which matches the scenario perfectly.

Why B is incorrect
A Master Service Agreement (MSA) is a contract that outlines the general terms and conditions for future work between two parties. It is not a contract for a specific task; it is an umbrella agreement. Specific work is later authorized by separate statements of work or task orders under the MSA.

Why C is incorrect
A Fixed-price contract (also called lump-sum) sets a firm, fixed price for the defined scope of work. This requires a very clear and detailed scope, accurate cost estimates, and a well-defined duration. This is the opposite of what the scenario describes.

Why D is incorrect
The Statement of Work (SOW) is a document that describes the work to be performed. It is not a contract itself. The SOW would be attached to whichever contract type (T&M, fixed-price, etc.) is chosen. It defines the "what," not the "how" of payment.

Why E is incorrect
A Cost-plus agreement (Cost-reimbursable contract) pays the vendor for all actual costs incurred plus a fee or profit. While this is suitable for uncertain scope, it typically involves large, long-term projects with complex requirements (like research and development). For a short-term task, a T&M contract is more appropriate and administratively simpler than a full cost-plus agreement.

References
CompTIA Project+ PK0-005 Objective 2.5: Given a scenario, use the appropriate procurement documentation. This objective covers different contract types and when to use them, including fixed-price, cost-reimbursable, and time and materials.

Contract Selection: The choice of contract is based on the clarity of the scope and the ability to estimate costs. T&M contracts are specifically designed for situations where scope is variable or uncertain.

A car manufacturer is presenting to three vendors the abilities and qualifications required to develop the last module of a data warehouse application. The manufacturer is emphasizing the technical skills necessary to complete the project on time and highlighting its current internal IT project. Which of the following best describes this activity?

A. Key stakeholder identification

B. Preliminary procurement

C. Solution design determination

D. Critical factor enlistment

B.   Preliminary procurement

Explanation:

Preliminary procurement involves the initial activities a buyer (the car manufacturer) performs to engage potential sellers (the vendors). This stage typically includes sharing requirements, qualifications, and project context to see which vendors are a "good fit."

In this scenario:

Presenting to vendors: The manufacturer is in the "Bidder Conference" or "Vendor Briefing" phase of procurement.

Abilities and qualifications: They are defining the selection criteria and the Statement of Work (SOW) requirements.

Internal context: Sharing info about the current IT project helps vendors understand the environment they will be working in so they can provide accurate proposals.

Explanation of Incorrect Answers

A. Key stakeholder identification
This activity happens during the Initiation phase. While vendors become stakeholders once hired, "identifying" stakeholders is the process of listing who is affected by the project, not presenting technical requirements to outside firms.

C. Solution design determination
This refers to the technical engineering or architectural phase where the team decides how the software will be built (e.g., choosing a database type). While the manufacturer is discussing "abilities," they are looking for a partner to do the work, not necessarily finalizing the blueprint in this meeting.

D. Critical factor enlistment
While "Critical Success Factors" (CSFs) are important, this is not a standard Project Management term for a meeting with vendors. The manufacturer is highlighting "technical skills" (selection criteria), which is a subset of the formal procurement process.

References
CompTIA Project+ (PK0-005) Exam Objectives: Domain 1.0 Project Basics (1.5 Explain the importance of procurement and vendor selection).

PMBOK® Guide: Section on Conduct Procurements – Bidder Conferences.

Which of the following provides the best justification for undertaking a project?

A. Scope statement

B. Business case

C. Sponsor request

D. Project charter

B.   Business case

Explanation:

The business case provides the best justification for undertaking a project. It outlines the rationale, benefits, costs, risks, and alignment with organizational strategy. Essentially, it answers the question: Why should this project be done?

A. Scope statement
Defines the boundaries of the project (what is included/excluded), but does not justify why the project should be undertaken.

B. Business case
✅ Correct. Provides the justification, including expected value, ROI, and strategic alignment.

C. Sponsor request
A sponsor may request a project, but a request alone is not a justification.

D. Project charter
Authorizes the project and formally initiates it, but it is based on the business case.

Thus, the business case is the document that best justifies undertaking a project.

Reference
CompTIA Project+ PK0-005 Exam Objectives, Domain 1.0 (Project Management Concepts) — The business case is the primary document used to justify project initiation by demonstrating alignment with organizational goals and expected benefits.

Which of the following is a consideration when determining a project's ESG factors?

A. Project management methodology

B. IT infrastructure security

C. Proper accounting practices

D. Corporate values compliance

D.   Corporate values compliance

Explanation:

✅ Corporate values compliance: ESG stands for Environmental, Social, and Governance. Corporate values compliance is a core component of the Governance pillar. It ensures that a project or organization operates according to ethical standards, internal codes of conduct, and legal regulations. Aligning a project with these values helps manage non-financial risks and long-term sustainability.

Why the other options are incorrect

A. Project management methodology
This refers to the framework (e.g., Waterfall, Agile) used to manage the project. While a PM might integrate ESG into a methodology, the methodology itself is an operational choice, not an ESG factor.

B. IT infrastructure security
While critical for business operations and data protection, security is a technical requirement. It only becomes an ESG consideration if it specifically relates to social factors like data privacy or governance factors like transparency.

C. Proper accounting practices
Standard financial accounting focuses on traditional profit/loss metrics. While financial transparency is a governance factor, the act of following standard accounting practices is a basic business requirement rather than a specific sustainability or ethical metric used to evaluate ESG.

Page 6 out of 37 Pages