Chapter 02: Project Planning Flashcards

1
Q

What is the purpose of a project plan?

A
  • Tools for managing a project.
  • Understanding of the work that needs to be completed and the impact.
  • List of objectives.
  • List of specific tasks.
  • Schedule to track time and resources.
  • Staffing assignments and project responsibilities.
  • Strategies to address potential roadblocks.
  • Definitions of documentation, forms, and procedures used on the job.
  • Method for getting commitment from the project team.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Prior to starting a project, what type of program should be developed from a lessons learned meeting?

A

Corrective Action Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an RFP?

A

A Request for Proposal (RFP) is an invitation for contractors to submit a proposal for services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where would you be able to find the scope of the project, but not necessarily the design and construction decision?

A

Request for Proposal (RFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are the Code of Silence requirements a critical aspect of the RFP package?

A

The Code of Silence is an oath to maintain confidentiality about the RFP process. Violating the Code of Silence will automatically disqualify the proposal and may result in future penalties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which document, developed during the RFP process, communicates what is expected for the respondent?

A

Scope of Work (SoW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Words such as “should” or “may” have no place in the SoW unless the action requested is purely optional.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If the SoW does not provide detailed background materials, the PM will initiate a request for information (RFI). What information will the PM be asking the ICT designer to provide?

A
  • List the materials and state where they can be obtained or reviewed in a separate references section of the SoW.
  • Provide documentation (e.g., drawings and specifications) of the materials and methodologies included in the RFPs as an attachment to the SoW.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are open-ended requirements, such as “satisfactory to” and “subject to approval,” NOT used in general SoW guidelines?

A

A contractor cannot predict what is satisfactory or approved but must assume the risk once the contract has been signed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Always use these types of phrases when defining required deliverables:
* As necessary
* Carefully performed
* Securely mounted
* Where feasible
* But not limited to

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four design phases of a traditional design process?

A
  1. Planning
  2. Schematic Design
  3. Design Development
  4. Construction Documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: The design process for the data center is not focused on the people space and flow, but rather the network and computer equipment space and flow. This drives the process to start with the engineering effort prior to the architectural design effort.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who are the four key individuals that make up the design team?

A
  1. Owner
  2. Architect
  3. Professional Engineer
  4. Design Consultant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which member of the design team is hired by the owner to assist with the planning and design and will hire the engineers and consultants?

A

Architect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which member of the design team is a licensed design professional, recognized by state or local authority, who focuses on the design of a specific system requirement?

A

Professional Engineer (PE). Many members of an engineering firm are ICT professionals who are supervised by a PE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which design phase includes the following tasks?
* Design coordination
* Detailed construction cost estimates
* Architectural design development
* Structural design development
* Mechanical design development
* Electrical design development
* Civil engineering development

A

Design Development

17
Q

What are the three elements of a data center design?

A
  1. Specifications
  2. Drawings
  3. Cost Estimates
18
Q

Name the specification that focuses on results. In this specification, contractors can choose the material and installation methods to provide results.

A

Performance

19
Q

True or False: Existing conditions, such as asbestos or hazardous materials, should not be included in the cost estimates.

A

False

20
Q

Name the task that occurs within the technology design that helps conduct information-gathering sessions to identify and document the technology and business needs.

A

Needs Assessment

21
Q

True or False: The conceptual design for the data center’s IT and telecommunications infrastructure is developed during acquisition.

A

False. The detailed IT and telecommunications infrastructure design is developed during acquisition.

22
Q

What is the name of the QA package that includes the punch list walkthrough?

A

Construction Administration (CA)

23
Q

What is a DRP

A

A DRP is a Disaster Recovery Plan with processes and procedures for protecting and recovering a business in case of disaster.

24
Q

Define asset.

A

an asset is anything tangible or intangible that has value.

25
Q

What is the key factor in security system design?

A

A balance between the value of the asset to be protected and the cost of protection.

26
Q

What is the risk formula?

A

Risk = (Threat x Vulnerability x Impact) / (Control Measures)

27
Q

When considering the risk formula, the impact can be measured as low, medium, high, and critical. How else can impact be measured?

A

Monetary value

28
Q

What term is used to describe am indication of an event or the intent to do harm or damage?

A

Threat

29
Q

What are the three basic elements of threat assessment?

A
  1. Identifying potential threats.
  2. Analyzing risks associated with the threats.
  3. Determining which risks and occurrences are allowed and which require prevention.
30
Q

What are the generally accepted categories of threats? List a minimum of three categories.

A
  • Temperature
  • Chemicals and gases
  • Liquids
  • Biological
  • Projectiles
  • Movement
  • Energy anomalies
  • Radiological
  • Information related
31
Q

Name the four types of risk mitigation techniques that can be used to achieve higher levels of security while reducing overall capital and operational costs.

A
  1. Physical countermeasures
  2. Electronic countermeasures
  3. Operational security countermeasures
  4. Logical countermeasures
32
Q

Which element of a security program includes cryptography?

A

Logical

33
Q

The theory of concentric circles illustrates that utilizing multiple points of detection provides the greatest opportunity for evaluation and response can also be called:

A

Layering

34
Q

What are the four phases of network vulnerability assessment?

A
  1. Initial assessment
  2. Defining the current state
  3. Vulnerability scan
  4. Report creation
35
Q

This phase of network vulnerability assessment will include all discovered information and testing results.

A

Report Creation

36
Q

Which phase of quality focuses on physical quality and follows the principle of “plan, do, check, and act”?

A

Conformance Quality

37
Q

Which phase of quality involves asking clients for feedback and then using that feedback to improve performance?

A

Client Satisfaction Quality