Chapter 11: Project Risk Management Flashcards

1
Q

The Project Risk Management processes are:

A

Plan Risk Management, Identify Risks, Perform Qualitative Risk Analysis, Perform Quantitative Risk Analysis, Plan Risk Responses, Implement Risk Responses, Monitor Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define “Individual project risk”

A

An uncertain event or condition that, if it occurs, has a positive or negative effect on one or more project objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define “Overall project risk”

A

The effect of uncertainty on the project as a whole, arising from all sources of uncertainty including individual risks, representing the exposure of stakeholders to the implications of variations in project outcome, both positive and negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false: Individual project risks can have a positive or negative effect on project objectives if they occur

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false: Project Risk Management processes should be conducted iteratively

A

True. Risks will continue to emerge during the lifetime of the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “Risk threshold”

A

Risk thresholds express the degree of acceptable variation around a project objective. They are explicitly stated and communicated to the project team and reflected in the definitions of risk impact levels for the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some possible examples of Non-event risks?

A

A key seller may go out of business during the project, the customer may change the requirement after design is complete, or a subcontractor may propose enhancements to the standard operating processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There are two main types of non-event risks:

A

Variability risk: Uncertainty exists about some key characteristics of a planned event or activity or decision. And Ambiguity risk: Uncertainty exists about what might happen in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Variability risks can be addressed using _____ analysis, with the range of variation reflected in probability distributions, followed by actions to reduce the spread of possible outcomes

A

Monte Carlo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Emergent risks can be tackled through developing _______

A

project resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Emergent risks can be tackled through developing project resilience. This requires each project to have:

A
  1. Right level of budget and schedule contingency for emergent risks, in addition to a specific risk budget for known risks, 2. Flexible project processes that can cope with emergent risk while maintaining overall direction toward project goals, including strong change management, 3. Empowered project team that has clear objectives and that is trusted to get the job done within agreed- upon limits, 4. Frequent review of early warning signs to identify emergent risks as early as possible, 5. Clear input from stakeholders to clarify areas where the project scope or strategy can be adjusted in response to emergent risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Considerations for tailoring Project sizeProject Risk Management include but are not limited to:

A

Project size, Project complexity, Project importance, Development approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: The Plan Risk Management process should begin when the first iterations and/or activities begin

A

False. The Plan Risk Management process should begin when a project is conceived and should be completed early in the project. It may be necessary to revisit this process later in the project life cycle, for example at a major phase change, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data analysis techniques that can be used for the Plan Risk Management process includes but are not limited to:

A

A stakeholder analysis to determine the risk appetite of project stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define “risk breakdown structure (RBS)”

A

A hierarchical representation of potential sources of risk. An RBS helps the project team consider the full range of sources from which individual project risks may arise. This can be useful when identifying risks or when categorizing identified risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The risk appetites of key stakeholders on the project are recorded in the _____

A

risk management plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define “Definitions of risk probability and impacts”

A

They are specific to the project context and reflect the risk appetite and thresholds of the organization and key stakeholders. The project may generate specific definitions of probability and impact levels or it may start with general definitions provided by the organization. The number of levels reflects the degree of detail required for the Project Risk Management process, with more levels used for a more detailed risk approach (typically five levels), and fewer for a simple process (usually three)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define “Reporting formats”

A

Reporting formats define how the outcomes of the Project Risk Management process will be documented, analyzed, and communicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identify Risks is an _____ process, since new individual project risks may emerge as the project progresses through its life cycle and the level of overall project risk will also change

A

iterative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The enterprise environmental factors that can influence the Identify Risks process include but are not limited to:

A

Published material, including commercial risk databases or checklists, Academic studies, Benchmarking results, and Industry studies of similar projects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define “SWOT analysis”

A

This technique examines the project from each of the strengths, weaknesses, opportunities, and threats (SWOT) perspectives. For risk identification, it is used to increase the breadth of identified risks by including internally generated risks. It identifies any opportunities for the project that may arise from strengths, and any threats resulting from weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define “prompt list”

A

A prompt list is a predetermined list of risk categories that might give rise to individual project risks and that could also act as sources of overall project risk. The prompt list can be used as a framework to aid the project team in idea generation when using risk identification techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

On completion of the Identify Risks process, the content of the risk register may include but is not limited to:

A

List of identified risks, Potential risk owners, List of potential risk responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define the process “Perform Qualitative Risk Analysis”

A

It is the process of prioritizing individual project risks for further analysis or action by assessing their probability of occurrence and impact as well as other characteristics. The key benefit of this process is that it focuses efforts on high-priority risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Where a facilitator is used to support the Perform Qualitative Risk Analysis process, addressing ____ is a key part of the facilitator’s role

A

bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define “Risk data quality assessment”

A

It evaluates the degree to which the data about individual project risks is accurate and reliable as a basis for qualitative risk analysis. The use of low-quality risk data may lead to a qualitative risk analysis that is of little use to the project. Risk data quality may be assessed via a questionnaire measuring the project’s stakeholder perceptions of various characteristics, which may include completeness, objectivity, relevancy, and timeliness. A weighted average of selected data quality characteristics can then be generated to give an overall quality score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define “Risk probability and impact assessment”

A

Risk probability assessment considers the likelihood that a specific risk will occur. Risk impact assessment considers the potential effect on one or more project objectives such as schedule, cost, quality, or performance. Impacts will be negative for threats and positive for opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define “Assessment of other risk parameters”

A

The project team may consider other characteristics of risk (in addition to probability and impact) when prioritizing individual project risks for further analysis and action

29
Q

The considered characteristics involved in the technique “Assessment of other risk parameters” may include but are not limited to:

A

Urgency, Proximity, Dormancy, Manageability, Controllability, Detectability, Connectivity, Strategic impact, Propinquity

30
Q

Define “Propinquity”

A

The degree to which a risk is perceived to matter by one or more stakeholders. Where a risk is perceived as very significant, propinquity is high

31
Q

Define “Probability and impact matrix”

A

It is a grid for mapping the probability of each risk occurrence and its impact on project objectives if that risk occurs. This matrix specifies combinations of probability and impact that allow individual project risks to be divided into priority groups

32
Q

Define “Hierarchical charts”

A

Where risks have been categorized using more than two parameters, the probability and impact matrix cannot be used and other graphical representations are required. For example, a bubble chart displays three dimensions of data, where each risk is plotted as a disk (bubble), and the three parameters are represented by the x-axis value, the y-axis value, and the bubble size

33
Q

A Risk Workshop is a specialized kind of _____

A

meeting

34
Q

Use of a skilled _____ will increase the effectiveness of a meeting

A

facilitator

35
Q

Define the process “Perform Quantitative Risk Analysis”

A

It is the process of numerically analyzing the combined effect of identified individual project risks and other sources of uncertainty on overall project objectives. The key benefit of this process is that it quantifies overall project risk exposure, and it can also provide additional quantitative risk information to support risk response planning

36
Q

True or false: the process Perform Quantitative Risk Analysis is not required for all projects

A

True

37
Q

Where the duration, cost, or resource requirement for a planned activity is uncertain, the range of possible values can be represented in the model as a ______

A

probability distribution

38
Q

What are some of the most commonly used forms of probability distribution?

A

triangular, normal, lognormal, beta, uniform, or discrete distributions

39
Q

Simulations are typically performed using a _____ analysis

A

Monte Carlo

40
Q

Define “Sensitivity analysis”

A

Sensitivity analysis helps to determine which individual project risks or other sources of uncertainty have the most potential impact on project outcomes. It correlates variations in project outcomes with variations in elements of the quantitative risk analysis model

41
Q

Define “tornado diagram”

A

A tornado diagram is a typical display of sensitivity analysis, which presents the calculated correlation coefficient for each element of the quantitative risk analysis model that can influence the project outcome. Items are ordered by descending strength of correlation, giving the typical tornado appearance

42
Q

Define “Decision tree analysis”

A

Decision trees are used to support selection of the best of several alternative courses of action. Alternative paths through the project are shown in the decision tree using branches representing different decisions or events, each of which can have associated costs and related individual project risks (including both threats and opportunities). The decision tree is evaluated by calculating the expected monetary value of each branch, allowing the optimal path to be selected

43
Q

Define “Influence diagrams”

A

Influence diagrams are graphical aids to decision making under uncertainty. An influence diagram represents a project or situation within the project as a set of entities, outcomes, and influences, together with the relationships and effects between them. Where an element in the influence diagram is uncertain as a result of the existence of individual project risks or other sources of uncertainty, this can be represented in the influence diagram using ranges or probability distributions. The influence diagram is then evaluated using a simulation technique, such as Monte Carlo analysis, to indicate which elements have the greatest influence on key outcomes

44
Q

The risk report will be updated to reflect the results of the quantitative risk analysis. This will typically include:

A

Assessment of overall project risk exposure, Detailed probabilistic analysis of the project, Prioritized list of individual project risks, Trends in quantitative risk analysis results, Recommended risk responses

45
Q

When conducting an assessment of overall project risk exposure, overall project risk is reflected in two key measures:

A

Chances of project success, indicated by the probability that the project will achieve its key objectives (e.g., required end date or interim milestones, required cost target, etc.) given the identified individual project risks and other sources of uncertainty, AND
Degree of inherent variability remaining within the project at the time the analysis was conducted, indicated by the range of possible project outcomes

46
Q

Risk responses should be:

A

Appropriate for the significance of the risk, cost-effective in meeting the challenge, realistic within the project context, agreed upon by all parties involved, and owned by a responsible person

47
Q

Define “Secondary risks”

A

Secondary risks are risks that arise as a direct result of implementing a risk response

48
Q

The _____ [document] identifies the nominated risk owner for each risk

A

risk register

49
Q

Five alternative strategies may be considered for dealing with threats, as follows:

A

Escalate, Avoid, Transfer, Mitigate, Accept

50
Q

Define “Escalate” as a strategy to deal with risks and threats

A

Escalation is appropriate when the project team or the project sponsor agrees that a threat is outside the scope of the project or that the proposed response would exceed the project manager’s authority. Escalated risks are managed at the program level, portfolio level, or other relevant part of the organization, and not on the project level. The project manager determines who should be notified about the threat and communicates the details to that person or part of the organization. Escalated threats are not monitored further by the project team after escalation, although they may be recorded in the risk register for information

51
Q

Define “Avoid” as a strategy to deal with risks and threats

A

Risk avoidance is when the project team acts to eliminate the threat or protect the project from its impact. It may be appropriate for high-priority threats with a high probability of occurrence and a large negative impact. Examples of avoidance actions may include removing the cause of a threat, extending the schedule, changing the project strategy, or reducing scope

52
Q

Define “Transfer” as a strategy to deal with risks and threats

A

Transfer involves shifting ownership of a threat to a third party to manage the risk and to bear the impact if the threat occurs. Risk transfer often involves payment of a risk premium to the party taking on the threat. Transfer can be achieved by a range of actions, which include but are not limited to the use of insurance, performance bonds, warranties, guarantees, etc. Agreements may be used to transfer ownership and liability for specified risks to another party

53
Q

Define “Mitigate” as a strategy to deal with risks and threats

A

In risk mitigation, action is taken to reduce the probability of occurrence and/or impact of a threat. Early mitigation action is often more effective than trying to repair the damage after the threat has occurred. Adopting less complex processes, conducting more tests, or choosing a more stable seller are examples of mitigation actions

54
Q

Define “Accept” as a strategy to deal with risks and threats

A

Risk acceptance acknowledges the existence of a threat, but no proactive action is taken. This strategy may be appropriate for low-priority threats, and it may also be adopted where it is not possible or cost-effective to address a threat in any other way. Acceptance can be either active or passive. The most common active acceptance strategy is to establish a contingency reserve, including amounts of time, money, or resources to handle the threat if it occurs. Passive acceptance involves no proactive action apart from periodic review of the threat to ensure that it does not change significantly

55
Q

Five alternative strategies may be considered for dealing with opportunities, as follows:

A

Escalate, Exploit, Share, Enhance, Accept

56
Q

Define “Escalate” as a strategy to deal with risk opportunities

A

This risk response strategy is appropriate when the project team or the project sponsor agrees that an opportunity is outside the scope of the project or that the proposed response would exceed the project manager’s authority. Escalated opportunities are managed at the program level, portfolio level, or other relevant part of the organization, and not on the project level. Opportunities are usually escalated to the level that matches the objectives that would be affected if the opportunity occurred. Escalated opportunities are not monitored further by the project team after escalation, although they may be recorded in the risk register for information

57
Q

Define “Exploit” as a strategy to deal with risk opportunities

A

The exploit strategy may be selected for high-priority opportunities where the organization wants to ensure that the opportunity is realized. This strategy seeks to capture the benefit associated with a particular opportunity by ensuring that it definitely happens, increasing the probability of occurrence to 100%. Examples of exploiting responses may include assigning an organization’s most talented resources to the project to reduce the time to completion, or using new technologies or technology upgrades to reduce cost and duration

58
Q

Define “Share” as a strategy to deal with risk opportunities

A

Sharing involves transferring ownership of an opportunity to a third party so that it shares some of the benefit if the opportunity occurs. It is important to select the new owner of a shared opportunity carefully so they are best able to capture the opportunity for the benefit of the project. Risk sharing often involves payment of a risk premium to the party taking on the opportunity. Examples of sharing actions include forming risk-sharing partnerships, teams, special-purpose companies, or joint ventures

59
Q

Define “Enhance” as a strategy to deal with risk opportunities

A

The enhance strategy is used to increase the probability and/or impact of an opportunity. Early enhancement action is often more effective than trying to improve the benefit after the opportunity has occurred. The probability of occurrence of an opportunity may be increased by focusing attention on its causes. Where it is not possible to increase probability, an enhancement response might increase the impact by targeting factors that drive the size of the potential benefit. Examples of enhancing opportunities include adding more resources to an activity to finish early

60
Q

Define “Accept” as a strategy to deal with risk opportunities

A

Accepting an opportunity acknowledges its existence but no proactive action is taken. This strategy may be appropriate for low-priority opportunities, and it may also be adopted where it is not possible or cost-effective to address an opportunity in any other way. Acceptance can be either active or passive. The most common active acceptance strategy is to establish a contingency reserve, including amounts of time, money, or resources to take advantage of the opportunity if it occurs. Passive acceptance involves no proactive action apart from periodic review of the opportunity to ensure that it does not change significantly

61
Q

True or false: When formulating plans to address risks, some responses are designed for use only if certain events occur

A

True. Risk responses identified using this technique are often called contingency plans or fallback plans and include identified triggering events that set the plans in effect

62
Q

Define the process “Implement Risk Responses”

A

It is the process of implementing agreed-upon risk response plans. The key benefit of this process is that it ensures that agreed-upon risk responses are executed as planned in order to address overall project risk exposure, minimize individual project threats, and maximize individual project opportunities

63
Q

Proper attention to the _______ process will ensure that agreed-upon risk responses are actually executed

A

Implement Risk Responses

64
Q

Define the process “Monitor Risks”

A

Monitor Risks is the process of monitoring the implementation of agreed-upon risk response plans, tracking identified risks, identifying and analyzing new risks, and evaluating risk process effectiveness throughout the project. The key benefit of this process is that it enables project decisions to be based on current information about overall project risk exposure and individual project risks

65
Q

The Monitor Risks process uses performance information generated during project execution to determine if:

A

Implemented risk responses are effective, Level of overall project risk has changed, Status of identified individual project risks has changed, New individual project risks have arisen, Risk management approach is still appropriate, Project assumptions are still valid, Risk management policies and procedures are being followed, Contingency reserves for cost or schedule require modification, and Project strategy is still valid

66
Q

Data analysis techniques that can be used for the Monitor Risks process include but are not limited to:

A

Technical performance analysis, and Reserve analysis

67
Q

Define “Technical performance analysis”

A

It compares technical accomplishments during project execution to the schedule of technical achievement. It requires the definition of objective, quantifiable measures of technical performance, which can be used to compare actual results against targets. Such technical performance measures may include weight, transaction times, number of delivered defects, storage capacity, etc. Deviation can indicate the potential impact of threats or opportunities

68
Q

Define “Reserve analysis”

A

Throughout execution of the project, some individual project risks may occur with positive or negative impacts on budget or schedule contingency reserves. Reserve analysis compares the amount of the contingency reserves remaining to the amount of risk remaining at any time in the project in order to determine if the remaining reserve is adequate. This may be communicated using various graphical representations, including a burndown chart