CBAP Mock Test

July 17, 2017 | Author: Arnela Muslimovic-Sejdic | Category: Business Analysis, Use Case, Business Process, Risk, Systems Science
Share Embed Donate


Short Description

CBAP exam test...

Description

CBAP Mock Test This is an effort to reduce paper consumption and make earth a better place to live. Please do not mark anything on the question paper as they are re-used. Time: 90 Minutes 1. What is the purpose of the Business Analysis Communication plan? a. Used to ensure all Domain SMEs are involved in the project. b. Describes the proposed structure and schedule for communications regarding business analysis activities. c. Describes how to best utilize the stakeholders and sponsors in eliciting requirements. d. An implicit input in all planning activities. 2. Which techniques might you use during Define Solution Scope: a. Functional decomposition, scope modeling, user stories. b. Scope modeling, interface analysis, risk analysis. c. Problem or vision statement, interface analysis, risk analysis. d. Risk analysis, variance analysis, functional decomposition. 3. A solution or component of a solution that is the result of a project is called what? a. A product. b. A determination. c. A result. d. A deliverable. 4. Pim just presented a document to the team that contained cost and benefit analysis information for an upcoming proposed initiative. What document did Pim just give to the team? a. Business requirements document. b. Black box analysis document. c. Business analysis communication plan. d. Business case. 5. A business rule is: a. An organization-wide, self-imposed constraint on doing business. b. A capability or condition needed on a particular project to solve a problem or achieve an objective. c. Expressed as a relationship between one entity/business object and another. d. A regulation that an organization must adhere to. 6. Which of the following statements best describes the roles of the Project Manager in defining solution scope? a. Primarily responsible for determining the time and effort required to deliver a capability. b. Determines all assumptions and constraints about the solution. c. Approves the project budget. d. Provides detailed process knowledge on key business areas. 7. BAs working on a project will need to coordinate information among team members. What is the best example of information that will need to be coordinated? a. Lessons learned (both positive and negative). b. Anecdotes about stakeholders, personal information to promote team building. c. ERD, UML, ROI, ITIL and BABOK.

d. Organization standards and policies (OPAs), including document templates, lessons learned databases, and methodologies and processes. 8. Which of the following represent the best definition of the Requirements Management and Communication Knowledge Area? a. Planning how the business analyst will communicate with stakeholders and planning how requirements will be approached, traced, and prioritized. b. Often the starting point for initiating a new project and is continued as changes occur and more information becomes available. c. Ensure that all stakeholders have a shared understanding of the nature of a solution and to ensure that those stakeholders with approval authority are in agreement as to the requirements that the solution shall meet. d. The tasks that are performed in order to ensure that solutions meet the business need and for ensuring that stakeholders fully understand the solution requirements. 9. Which of the following documents contain key domain terms along with their business definitions? a. Requirements analysis plan. b. Data modeling. c. Glossary. d. Requirements package. 10. You have worked on a project to implement a new system. When it was first deployed, it seemed to be performing well. However, as transactions increased over a six-month period, the application slowed to a level deemed unacceptable by the end-users. You have been asked to evaluate this performance. In order to do this, you need to have: a. Performance metrics of the solution. b. Approval to repair any defects found. c. Approval to prevent future defects. d. An assessment of the solution performance. 11. Requirements communication is: a. More effective when planned and performed iteratively. b. More effective when planned and face-to-face. c. Performed iteratively and used when performing tasks in other knowledge areas. d. Used when performing tasks in other knowledge areas and is generally better done informally and faceto-face whenever possible. 12. Williams is defining the business need for his current assignment, and completed the following draft problem statement. How would you assess his problem statement? Mortgages take an average of 20 days to process, delaying closings by an average of 5 days each. 25% of the applicants lose their interest rate lock as a result of the delays, costing $500-1000 for loans on which we extend the lock, and angry customers when we choose not to extend the lock. a. It is complete and contains all the needed elements. b. It is missing who the problem affects. c. It is missing the impact of the problem. d. It is missing what a successful solution would produce. 13. All of the following are risk responses EXCEPT for: a. Mitigate. b. Avoid. c. Transcend.

d. Accept. 14. Mark is tracking how well the solution was implemented by collecting data and comparing it to expected results previously defined by the stakeholders. What is Mark doing? a. Observation. b. Data analysis. c. Monitoring. d. Shadowing. 15. Both a facilitator and a scribe are assigned to a requirements workshop session. Where these roles are carried out by different resources, the scribe will be responsible for which of the following processes: a. Follow up on any open action items that were recorded at the workshop. b. Complete the documentation and distribute it to the workshop attendees. c. Build consensus, but avoid participating in the content of the discussion. d. Document the business requirements in the format determined prior to the workshop. 16. Solution components can contain multiple aspects. Which of the following should a BA consider when allocating requirements? a. Data access rights and organization structure. b. People who maintain the solution and their processes. c. Software applications and vendor support. d. Organization structure and business approval. 17. One of the stakeholders on your project has decided that the project should not be implemented due to concerns over a previous lawsuit. What role does this stakeholder play on your project? a. Executive business sponsor. b. Project manager. c. Business sponsor. d. Regulator. 18. What has been accomplished if all stakeholders understand what the requirements are as well as the current state? a. Requirements have been communicated. b. Requirements have been defined. c. Requirements have been completed. d. Scope has been communicated. 19. John is struggling with getting the right level of requirements from his stakeholders. What technique should he possibly try? a. Brainstorming. b. Observation. c. Monitoring. d. Prioritization. 20. What is the purpose of the 'Define Solution Scope' task in the Enterprise Analysis knowledge area? a. To make sure the estimates given to the project manager are accurate. b. To conceptualize in enough detail the new business capabilities. c. To ensure the Organizational Process Assets are fully understood to select the appropriate Methodology.

d. Determines how solution requirements will be allocated to components and releases. 21. Which of the following best describe a technical constraint? a. Regulatory mandates. b. Project team skills. c. System capacity. d. Budget restrictions. 22. The Work Breakdown Structure (WBS) is a useful tool for the BA in what task or activity within the IIBA Knowledge Areas: a. Plan business analysis activities. b. Plan project scope. c. It isn't an activity. It's part of the technique called Decomposition. d. Functional Decomposition as part of structuring requirements packages Task. 23. When a requirement is changed a business can use traceability to: a. Perform impact analysis. b. Measure requirements metrics. c. Create a root cause effect diagram. d. Count how many requirements have been documented. 24. Which technique involves determining the objective of an initiative and identifying the internal and external factors that are favorable and unfavorable to achieving that objective? a. Force field analysis. b. Risk analysis. c. SWOT analysis. d. PERT analysis. 25. Mary is a BA working in a company that manufactures construction materials. She is working with a business owner on a new initiative to develop roofing material from recycled shingles. She has defined the business need and determined the capabilities needed for this “green” solution. In order to define the costs and benefits, she needs to know how big the solution is. She knows that included in this solution are: a. The capabilities supported by the solution components, including the business processes, new hardware, and software, as well as the scope of analysis. b. The capabilities supported by the solution components, including the business processes, new hardware, and software, as well as the scope of the solution approach. c. The capabilities supported by the solution components, including the business processes, new hardware, and software only. d. The capabilities supported by the solution components, including the business processes, new hardware, and software, as well as the organizational units and the enabling capabilities that are required to allocate requirements for re-use. 26. Traceability of requirements means: a. Requirements can be traced forward through design and to the finished product and are tested to ensure they work. b. Requirements can be traced back to the business or project objectives, and who provided them, to validate they will solve the problem being addressed. c. Requirements can be traced back to the business or project objectives to validate they will solve the problem being addressed and forward through design and to the finished product.

d. Requirements adhere to an organization template to ensure they help support strategic direction of the organization. 27. The purpose of finding and modeling entities/classes in requirements is to: a. Document the data characteristics which will become the columns or fields in a database. b. Document the business concepts that will be the basis for Use Cases that involve data. c. Document the business objects that will contain data characteristics. d. Be used mainly for database design, because entities or classes do not belong in requirements documentation. 28. David found that a requirement was incomplete when testing the latest release. What did he find? a. A defect. b. An anomaly. c. A bad requirement. d. A solution gap. 29. When might the BA model requirements? a. At any point in a project. b. Before requirements elicitation. c. After requirements elicitation but before solution assessment. d. After solution assessment but before communications and final sign-off. 30. Bill was working on requirements dependencies and prioritization. Requirement #5.1.2 was dependent on requirement #5.1. Requirement #5.1 was dependent on requirement #3.0. Requirement #3.0 was given a priority of medium and requirement #5.1 was given a priority of low. A new requirement #7.0 was added and it was determined that requirement #5.1 was actually dependent on #7.0. Requirement #7.0 was given a priority of high and the priority of #5.1 was changed to medium. What was the deciding factor to change the priority of requirement #5.1? a. Value. b. Necessity. c. Effort. d. Subset. 31. What type of use case relationship does the following scenario best describe: For a case law system for attorneys, many use cases need to search for legal cases. Instead of putting redundant search functionality into each use case, the search requirements were written in one use case and then referred to by any use case that needed it. a. Include. b. Extend. c. Expanded. d. Generalization. 32. Which of the following statements does NOT describe assumptions or constraints? a. Assumptions may affect all aspects of the project and pose a certain degree of risk. b. Assumptions and constraints are generally documented with associated attributes. c. Assumptions and constraints are generally documented to be generic, like business rules. d. Constraints are defined as restrictions or limitations on possible solutions. 33. You have worked on a project to implement a new system. When it was first deployed, it seemed to be performing well. However, as transactions increased over a six-month period, the application slowed

to a level deemed unacceptable by the end-users. To evaluate this performance what would be LEAST helpful to do? a. Ensure that the performance metrics are valid. b. Gather actual performance statistics. c. Describe current solution performance. d. Perform a SWOT analysis to ensure that the solution is minimizing the sunk cost. 34. The following best describes use of open-ended vs. closed-ended questions for eliciting requirements: a. Open-ended questions should be used whenever possible because closed-ended questions limit what the client reveals about their requirements. b. Open-ended and closed-ended questions are equal in their ability to discover requirements, and usage depends on personal preference. c. Open-ended questions should be used to uncover needs and closed-ended questions to confirm specifics. d. Closed-ended questions are preferable to open-ended questions because they keep clients and conversations focused better. 35. Which of the following list of techniques or their elements are most applicable to preparing a business case? a. Cost-Benefit Analysis, Payback Period, and SWOT analysis. b. Document Analysis, Estimating techniques, and Net Present Value. c. Goal Baselining, Estimating techniques, and SWOT analysis. d. Competitive analysis and benchmark studies, Estimating techniques, and Reverse Engineering. 36. Which two meeting roles should preferably NOT be the same person in a Requirements Elicitation session? a. Facilitator and Timekeeper. b. Facilitator and Scribe. c. Facilitator and Business Process Owner. d. Business Process Owner and Subject Matter Expert (SME). 37. What should NOT be considered when evaluating whether or not a solution should be retired or replaced? a. Necessity. b. Future investment required. c. Sunk cost. d. Opportunity cost. 38. In the first weeks following launch of a new web-based application, a critical report failed due to an unhandled exception. Investigation demonstrated that a worker in the system had used a financial field as a comment field and input the words 'Not available'. Even after extensive testing, there was no on-line screen edit for a numeric-only value in this field. Which techniques might have prevented this type of problem from occurring? a. Prototyping and document analysis. b. Use cases and process modeling. c. Use cases and prototyping. d. Data modeling and process modeling. 39. The key beneficiaries of constraints and assumptions are: a. SMEs and other business recipients of a solution

b. Business Analyst. c. Project Sponsor. d. Project Team. 40. Which of the following approaches is most likely to use a formal requirements change management system? a. Agile. b. Scrum. c. Waterfall. d. Extreme programming. 41. A Business Requirement can best be described as: a. Higher level statements of goals or objectives. b. Specific needs of a class, group or individual. c. They can contain both functional and non-functional aspects. d. Capabilities the solution has in the current state but no longer needed in the future state. 42. A Solution Requirement can best be described as: a. Higher level statements of goals or objectives. b. Specific needs of a class, group or individual. c. They can contain both functional and non-functional aspects. d. Capabilities the solution has in the current state but no longer needed in the future state. 43. Which of the following techniques is used to create transition requirements? a. SWOT analysis. b. Customer survey. c. Data modeling. d. Fishbone diagrams. 44. Which of the following groups of factors will best help analyze solution replacement or elimination: a. Opportunity cost, sunk cost, necessity. b. Sunk cost, actual cost vs. expected cost, ongoing cost. c. Ongoing cost vs. initial investment, necessity, fixed cost. d. Opportunity cost, on-going costs vs. initial investment, obsolescence of software. 45. Which of the following describes a disadvantage of interface analysis? a. Does not assess internal components. b. Does not have an impact on delivery dates. c. Does not show collaboration with other projects. d. Does not prevent difficulties in integrating multiple components. 46. A WBS is similar to which of the following items? a. Work breakdown system. b. Functional decomposition. c. Project plan. d. Structured planning. 47. Which set of techniques is used to manage business analysis performance? a. Problem tracking, variance analysis, the requirements management plan (RMP). b. Process modeling, root cause analysis, variance analysis.

c. Root cause analysis, problem tracking, stakeholder analysis. d. Interviews, surveys, risk control. 48. The last logical task in Enterprise Analysis is: a. Define the business case. b. Define the solution scope. c. Approve the business case. d. Determine solution approach. 49. Effective teamwork skills are demonstrated through all BUT: a. Developing trust. b. Effective conflict resolution. c. Shared ownership. d. Stakeholder analysis 50. You once co-facilitated a requirements workshop with a BA who did not follow through with her commitments. Because you were in two different locations, you decided to set up a web meeting. As you were preparing for the session you heard her mutter: 'I know we're doing this requirements workshop, but in the end I'm going to give them what I think they need, because they don't know what they want. They'll never know the difference.' This comment indicates that she is missing which of the following underlying competencies? a. Facilitation skills. b. Business principles. c. Ethics. d. Personal organization. 51. What are two types of context diagram notation? a. Gane-Sarson, Yourdon. b. Ishikawa, Delphi. c. Alpha, Omega. d. Scope, Solution. 52. You have been asked to facilitate a workshop to help clarify the scope of a solution. Your objective is to: a. Complete document analysis based on the project scope. b. Organize requirements based on the solution components they are related to. c. Complete a sequence diagram for all interactions within the scope of the project. d. Complete business architecture for the proposed scope of a solution. 53. Acceptance and evaluation criteria more than any other type of requirement must be expressed in a testable form. For that reason, this technique would be beneficial to which methodology? a. Waterfall. b. Iterative. c. Agile. d. RUP. 54. Which statement best describes the Requirements Elicitation Knowledge Area: a. Requirements for application software are defined.

b. Requirements Elicitation defines the generally accepted techniques used to collect the requirements of the solution. c. Requirements Elicitation is an isolated, compartmentalized activity that engages stakeholders in defining requirements. d. Requirements Elicitation and Requirements Gathering are synonymous. 55. Estimates are often taken as a commitment that the project team will meet both the delivery date and budget. What should a good estimate include? a. An assessment of the range of uncertainty associated with the estimate. b. The expertise of the individuals doing the estimate. c. Historic data used when creating the estimate. d. A variance of 20% should be added to account for inaccuracies in the estimate. 56. What are the two basic types of interviewing when eliciting requirements? a. Structured and unstructured. b. Top-down and bottom-up. c. Open-ended and closed-ended. d. End user and technical. 57. According to the authority in the requirements management plan, who is responsible for approving the solution or product scope and all requirements? a. Project manager. b. Sponsor. c. Resource manager. d. Domain SME. 58. Which of the following statements best describes how requirements may be allocated? a. Requirements are always allocated to a specific release. b. Requirements must be allocated by components of the Enterprise Architecture. c. Requirements can be allocated by job function, organizational units or releases. d. Requirements are allocated as they are verified by stakeholders. 59. You have been identifying all changes that will occur in each business area with the organization and the impact of those changes on each of the teams. What task have you been performing? a. Assess proposed solution. b. Assess organizational readiness. c. Analyze organizational policy change. d. Update organization knowledge. 60. According to the BABOK, which of the following statements best describes the inputs into Conduct Stakeholder Analysis? a. Business need, enterprise architecture, organizational process assets. b. Stakeholder position, solution scope, stakeholder communications. c. Business need, RACI matrix, project methodology. d. Enterprise architecture, process templates, solution scope. 61. UML standard Activity Diagrams typically include which of the following components: a. Rounded rectangles converging independent flows into a single flow. b. Joins represented by a diamond bringing a number of parallel flows into a single flow. c. Branches represented by a horizontal bar with multiple paths continuing forward.

d. Diamonds from one path to one or more mutually exclusive alternate paths. 62. In a short, 3-month project to implement a COTS system, the BA determined that a detailed Software Requirements Specification document was not necessary and planned instead upon Use Cases for the analysis technique and documentation format. This is an example of: a. An assumption that could become a risk. b. Appropriate use of risk mitigation. c. A common mistake leading to proscriptive requirements. d. Determining appropriate requirements analysis and documentation activities. 63. Performance of all requirements analysis activities are governed by which of the following documents? a. Project plan. b. Business analysis performance metrics. c. Business analysis plans. d. Organizational process assets. 64. Which of the following best describes something that is NOT an input to the 'Define Solution Scope' task in the Enterprise Analysis Knowledge Area? a. Defining goals and objectives. b. Further analysis of potential systems and processes. c. How stakeholders will respond to a new product or service or about the availability of technology. d. The delivery of new capabilities required by the business will be used when assessing options for the implementation of solution components. 65. Henry is working with his stakeholders and receives the following requirement: 'The Impact system must be used to calculate the rejected claims.' Henry questioned the stakeholders about that requirement and whether it truly met their need. They replied 'No, it does not, but Senior Management has made the decision so we have to live with it.' What best describes this statement? a. An assumption. b. A constraint. c. A risk. d. An issue. 66. Which statement best describes the Plan Business Analysis Activities task? a. Determine the activities that must be performed, the deliverables that must be produced, and estimate the effort required to perform that work. b. Determine the activities that must be performed to ensure compliance with stakeholder expectations, update organizational assets and perform requirements risk analysis. c. Identify management tools required to measure the progress of business analysis work. d. Build the requirements estimates. 67. The business analysis approach is a: a. Reference to how all business analysis work will be planned. b. Key component in the Risk Mitigation strategy. c. Is distinct from the organizational process assets. d. Planning consideration relevant to the Project Manager, where the methodology is relevant to the BA. 68. What is the output of assessing the proposed solution? a. Assumptions and constraints.

b. Prioritized requirements. c. Solution options. d. Assessment of proposed solution. 69. Process Models are typically used to: a. Document the scope of the problem domain. b. Document the process of modeling requirements. c. Document the 'as is' and 'to be' business workflow of a business. d. Document the interactions between an actor and a system. 70. Which of the following is NOT a managing principle of business rules? a. Document them independently of how they will be enforced. b. Separate them from the processes the rule supports. c. Stated at the atomic level in a descriptive format. d. May not occur in the instance of a data element 71. What is another common name for a scope model? a. Decomposition diagram. b. Context diagram. c. Fishbone diagram. d. Swim lane diagram. 72. As a senior business analyst, you are preparing the requirements package for a significant process improvement initiative that would be strategically important to the future of the company. It involves implementing an IT initiative to establish a Business Rules Management system across the enterprise. However you have met resistance from one particular stakeholder who seems to be loading unnecessary requirements and expectations into the go/no go criteria. What would be your approach before submitting the requirements package? a. Call a meeting with the Project Sponsor and the SME in question and layout your assessment of the situation. b. If you believe the stakeholder will be disruptive to the decision-making process, dis-invite the stakeholder from the decision package review meeting. c. Facilitate a brainstorming session among executive team members to deal with the SME's expectations. d. Seek a meeting with the SME to listen carefully to his concerns and be able to reflect them back to the stakeholder. Then engage the stakeholder in suggestions for how to mitigate the particular issues. Consider next steps after thoroughly understanding the concerns from the stakeholder's perspective. 73. Manage business analysis performance describes: a. How business analysis work will be tracked and assessed. b. Managing performance of non-functional requirements. c. Managing changes to the requirements baseline. d. How requirements will be communicated and changed. 74. UML stands for what? a. Unidentified memory loss. b. Unified modeling language. c. Unbounded modeling language. d. User modeling language.

75. The greatest amount of information about a speaker's attitude and feelings is conveyed during a conversation through which of the following means: a. Words and content. b. Emotions. c. Body language. d. Tone of voice. 76. Which statement about conflict is true? a. Conflicts that affect the requirements must be resolved before formal approval is given. b. Signoff can occur provisionally if the parties agree that not resolving the conflict does not present a risk to the business analysis effort. c. Conflicts do not need to be resolved when using a change-driven approach and no formal approval is required. d. When conflicts occur that jeopardize the effort, the business domain subject matter expert will resolve the conflict. 77. What does a desired outcome describe? a. The business benefits that will result from meeting the business need. b. The solution to a business problem or opportunity. c. The business need. d. The costs and benefits of implementing the solution. 78. Maria is a new BA on a project. Mike, the BA who defined the business need, was transferred to the company’s headquarters. The instructions he left Maria were to look at the existing capabilities related to the business need and figure out what was needed. Maria was unsure of what capabilities meant, thinking that they were system features. Mike told her that capabilities could include: a. Products, services, processes, and solution scope. b. Products, services, events, and software features. c. Software features, tasks, events, and requirements. d. Products, services, goals, and assumptions. 79. What are the key elements when conducting elicitation activities? a. Tracing requirements, capturing requirement attributes, tracking elicitation metrics. b. Requirements workshops, building data dictionaries, brainstorming. c. Observation, job shadowing, questionnaires. d. Domain SME, requirements workshops, tracing requirements. 80. The inputs to the Maintain Requirements for Re-Use task are: a. Organizational process assets, clearly defined requirements. b. Requirements, requirements management plan. c. Stakeholder analysis, achievable stated requirements. d. Requirements traceability, stated / non-stated requirements. 81. The oval shapes in a Use Case diagram: a. Must connect to at least one other use case to be valid. b. May be 'floaters' within the Use Case boundary, and not necessarily connected to each other. c. Must never be connected with another Use Case. d. Imply a process flow within the Use Case diagram.

82. The output from Manage Solution Scope and Requirements is used in ALL BUT which of these tasks: a. Maintain Requirements for Re-Use. b. Assess Proposed Solution. c. Define Solution Scope. d. Allocate Requirements. 83. What definition best fits a constructed solution? a. A solution that is in actual use by the enterprise. b. A solution that may not be in actual use by the enterprise. c. A solution that has distinct product hierarchy. d. A solution that is operationally managed. 84. To determine if a solution is delivering business value, a BA needs which of the following: a. Designed solution. b. Constructed solution. c. Tested solution. d. Deployed solution. 85. In the first weeks following launch of a new web-based application, a critical report failed due to an unhandled exception. Investigation demonstrated that a worker in the system had used a financial field as a comment field and input the words 'Not available'. Even after extensive testing, there was no on-line screen edit for a numeric-only value in this field. What document will most help the BA facilitate development and testing of an emergency maintenance release in order to get this report back into production as quickly as possible: a. Work Breakdown Structure. b. Technical architecture framework. c. Change Request form. d. Coverage matrix. 86. Interviews and Interface Analysis are techniques used during which activity? a. Conduct Elicitation. b. Prepare Documentation. c. Prepare the business needs assessment. d. Traceability. 87. All state machines must have an initial state and may have what? a. Optional and mandatory states. b. Beginning and ending states. c. Intermediate and ending states. d. Open and closed states. 88. You are working on a project to overhaul an existing system which interfaces to many other applications. A key SME, who has been with the organization for over ten years, has expressed concern about slow response time, which has often occurred when new systems have been implemented. Which technique would you use to mitigate this concern? a. Reverse Engineering. b. Interface analysis. c. Non-functional requirements analysis. d. Structured walkthrough.

89. Which best completes this sentence: A Business Analyst is_______________. a. Any person who performs business analysis activities, no matter what their job title or organizational role might be. b. Any person who is an expert in their domain. c. Any person who performs project activities, no matter what their job title or organizational role may be. d. Any person whose job title says they perform business analysis activities. 90. Which of the following is NOT an input to the Communicate Requirements task under the requirements management and communication area? a. BA Communication plan. b. BA Performance management. c. Requirements package. d. Requirements. 91. Which of the following is NOT an input to the Communicate Requirements task under the requirements management and communication area? a. BA Communication plan. b. BA Performance management. c. Requirements package. d. Requirements. 92. A use case model is: a. A diagram with stick-figure actors connected to use cases drawn in ovals. b. Text flows of events that describe the steps an actor takes to accomplish the goal of a use case. c. A diagram with stick-figure actors connected to use cases drawn in ovals, and text flows of events that describe the steps an actor takes to accomplish the goal of a use case. d. A diagram with stick-figure actors connected to use cases drawn in ovals, text flow of events that describe the steps an actor takes to accomplish the goal of a use case, and associated documented business rules affecting the use case. 93. Liz has just finished a report that showed some problems in the business analysis work for her current project. Specifically, there were several variances from she expected, and she needs to take some corrective action. What should Liz do to address the variances? a. Update the Business Analysis approach for the project, to correct the problems identified. b. Plan new or different Business Analysis activities, to correct the problems identified. c. Update the Business Analysis communication plan to ensure it includes reporting the variances. d. Plan new or different Requirements Management processes to reduce the variances. 94. In a meeting with a business owner about a new initiative, Eva learned that although the business owner expected pushback from some stakeholders, the initiative was an important one for the survival of the company. Eva takes this information into account when she: a. Determines the solution approach. b. Defines the business case. c. Defines the solution scope. d. Defines the business need. 95. A technique that is used to communicate requirements is: a. Structured walkthrough. b. Request for proposal (RFP).

c. Requirements documentation. d. Signoff. 96. A technique that is used to communicate requirements is: a. Structured walkthrough. b. Request for proposal (RFP). c. Requirements documentation. d. Signoff. 97. The requirements review process can best be described as: a. An Agile process for continually identifying and refining requirements before any development begins. b. A completed requirements document that is reviewed by a list of appropriate reviewers. c. A working session where invited participants review and discuss a set of requirements. d. A formal presentation ending in sign-off by all stakeholders after which no more requirements will be elicited. 98. Ben is working on verifying a solution that adds some cutting edge options to his company's order processing web site. The solution has some identified defects after testing. The team has a tight deadline and there is pressure on the team to release the solution immediately. Specifically, Ben is tasked with determining the effect that defects will have on the company's operations. Which stakeholders would Ben need to involve to determine if the solution meets business needs? a. End User, Customer, and Operational Support. b. Tester, Regulator, and Sponsor. c. Tester, Implementation SME, and Domain SME. d. Implementation SME and Customer. 99. Requirements that don't meet quality standards have likely been evaluated in which task in requirements analysis? a. Validate requirements. b. Verify requirements. c. Variance requirements. d. Verify and validate requirements. 100. Which of the following are quantitative benefits that might be included in a business case? a. Reduced maintenance as a result of using use cases on the project. b. Reduced inventory from having more accurate counts and through auto-replenishment. c. Improved customer satisfaction as a result of better web site navigation. d. Improved communication between order-entry and warehouse staff.

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF