Exam QS-CBAP-4
Short Description
ok...
Description
Questions 1-201 1) BPMN stands for: a. Business Process Model and Notation b. Business Performance Model and Notation c. Business Process Metrics and Notation d. Business Performance Metrics and Notation 2) Which of the following is not true about BPMN? a. It is a graphical representation for specifying business processes in a business process model b. It serves as a common language, bridging the communication gap that frequently occurs between business process design and implementation c. The primary goal of BPMN is to provide a standard notation readily understandable by all business stakeholders d. The BPMN specification also provides a mapping between the graphics of the notation and the underlying constructs of execution languages, particularly Business Process Execution Language 3) Which of the following are examples of development methodologies? a. Extreme programming b. Pair programming c. Slow programming d. Continuous test driven development 4) Your organization follows a software development process that tells what to produce, when to produce it, and how much to produce. It encourages small continuous, incremental and evolutionary changes that stick and respects organizational roles. Which of the below methodologies does your company follow? a. Continuous test-driven development b. Slow programming c. Quick-and-dirty d. Kanban 5) Your organization follows a software development process that promotes adaptive planning, evolutionary development, early delivery, continuous improvement and encourages rapid and flexible response to change. Which of the below methodologies does your company follow? a. Agile software development b. Scrum pattern c. Release early, release often d. Spiral model 6) Your management is asking that you view problems as parts of an overall system rather than reacting to specific parts, outcomes or events and potentially contributing to further development of unintended consequences. They are asking you to do which of the following? a. Apply systems thinking b. Use nominal group technique c. Use critical chain project management d. Use Event chain methodology 7) You have collected a number of ideas using brainstorming. Now, you use a voting process
to rank the most useful ideas for prioritization. Which of the below techniques are you using? a. Nominal group technique b. Idea/mind mapping c. Affinity diagram d. Multicriteria decision analysis 8) A technique in which ideas created through individual brainstorming sessions are consolidated into a single map to reflect commonality and differences in understanding, and generate new ideas is called: a. Nominal group technique b. Idea/mind mapping c. Affinity diagram d. Multicriteria decision analysis 9) A technique that allows large numbers of ideas to be classified into groups for review and analysis is: a. Nominal group technique b. Idea/mind mapping c. Affinity diagram d. Multicriteria decision analysis 10) A technique that utilizes a decision matrix to provide a systematic analytical approach for establishing criteria, such as risk levels, uncertainty, and valuation, to evaluate and rank many ideas is: a. Nominal group technique b. Idea/mind mapping c. Affinity diagram d. Multicriteria decision analysis 11) Which of the below are classification models used for stakeholder analysis? a. Power/interest grid b. Power/influence grid c. Influence/impact grid d. Salience model 12) Salience model describes classes of stakeholders based on which of the following? a. Power, Urgency, Legitimacy b. Power, Interest, Legitimacy c. Power, Interest, Legality d. Position, Interest, Legitimacy 13) In the control chart for your manufacturing process, you notice that only one data point has exceeded the control limit. Out of the remaining 14 points, seven are well above the mean and seven are well below the mean. This means that your process is: a. Well within control b. Out of control c. Within control but needs to be closely monitored d. Can’t say with the information provided 14) Which of the below are considered quality tools? a. Affinity diagrams b. Process decision program charts (PDPC)
c. Interrelationship digraphs d. Tree diagrams 15) Which of the following is not true about ‘Planning poker’ technique? a. It is a consensus-based technique for estimating, mostly used to estimate effort or relative size of development goals in software development b. Members of the group make estimates by playing numbered cards face-down to the table, instead of speaking them aloud c. Anchoring, where the first number spoken aloud sets a precedent for subsequent estimates d. The winning person/team is subsequently awarded the project 16) Which of the below is true about semantic interoperability? a. If two or more systems are capable of communicating and exchanging data, they are exhibiting syntactic interoperability b. It is the ability to automatically interpret the information exchanged meaningfully and accurately in order to produce useful results as defined by the end users of both systems c. To achieve semantic interoperability, both sides must refer to a common information exchange reference model d. The content of the information exchange requests are unambiguously defined: what is sent is the same as what is understood 17) Which of the following problems does Planguage not address? a. Requirement creep b. Unclear requirements c. Resource utilization d. Error in specifications 18) Which of the below maps the journey of user with his emotions and experience and seeks to improve customer retention? a. User journey map b. Behavior-driven development c. Kano model d. Test driven development 19) The Kano model uses which of the following customer preferences? a. Must-be Quality, One-dimensional Quality, Attractive Quality, Indifferent Quality , Reverse Quality b. Must-be Quality, One-dimensional Quality, Attractive Quality, Indifferent Quality , Forward Quality c. Must-be Quality, Two-dimensional Quality, Attractive Quality, Indifferent Quality , Reverse Quality d. Must-be Quality, One-dimensional Quality, Attractive Quality, Different Quality , Reverse Quality 20) Which of the below are part of the ‘Purpose-based alignment model’? a. Supplier, Differentiating, Who cares, Parity b. Partner, Differentiating, Competitor, Parity c. Partner, Differentiating, Who cares, Parity d. Partner, Differentiating, Employee, Parity 21) Which of the below is true of ‘Value stream mapping’? a. Given an initial context, when an event occurs, then some outcomes are ensured
b. It is a lean management method for analyzing the current state and designing a future state for the series of events that take a product or service from its beginning through to the customer c. It is a management tool that can be used to gauge the loyalty of a firm's customer relationships d. It helps drive business decisions based on purpose 22) A management tool that can be used to gauge the loyalty of a firm's customer relationships is: a. Net Promoter b. Value stream mapping c. Purpose-based alignment model d. Kano model 23) PESTLE technique is used to examine the business environment within which an organization. PESTLE stands for which of the following? a. Political, Economic, Socio-cultural, tactical, legal, environmental b. Physiological, Economic, Socio-cultural, technological, legal, environmental c. Political, Economic, Socio-cultural, technological, legal, environmental d. Political, Economic, Socio-cultural, technological, legal, ergonomical 24) During your examination of the business environment, you have noticed that there is an increase in the number of working mothers. Which of the below factors does this belong to in the PESTLE technique? a. Economic b. Socio-cultural c. Environmental d. Economic 25) During your examination of the business environment, you have noticed that there is a need to comply with SOX audit laws when reporting financial numbers. Which of the below factors does this belong to in the PESTLE technique? a. Economic b. Legal c. Environmental d. Economic 26) During your examination of the business environment, you have noticed that there is a need to comply with a new law that the plastic used to manufacture all baby feeding bottles should be free of BPA. Which of the below factors does this belong to in the PESTLE technique? a. Economic b. Legal c. Environmental d. Economic 27) Which of the below are techniques used to examine the internal capability of an organization? a. MOST Analysis b. Resource Audit c. Boston Box d. External business environment analysis
Choose the correct answer: i. a, b, c ii. a, b iii. Only a iv. Only b 28) Porter’s five forces framework is used to examine the business environment. Which of the below are the five forces in the framework? a. Potential customers, Buyers, Substitutes, Suppliers, Industry competitors b. Potential entrants, Legal restrictions, Substitutes, Suppliers, Industry competitors c. Potential entrants, Buyers, Substitutes, Suppliers, Industry competitors d. Potential entrants, Buyers, Substitutes, Suppliers, Industry regulations 29) When examining the business environment, you are digging into factors such as who the competitors in your industry are, what the likelihood of new entrants coming into the industry is, what are the alternatives to products offered by this company, what the bargaining power of suppliers and buyers is. Which of the following techniques are you using? a. MOST Analysis b. Porter’s five forces framework c. Boston Box d. Resource audit 30) In MOST analysis used to be used to examine the internal capability of an organization, MOST stands for: a. Mission, Options, Strategy, Tactics b. Mission, Objectives, Strengths, Tactics c. Mission, Objectives, Strategy, Technology d. Mission, Objectives, Strategy, Tactics 31) During resource audit, you find that your organization has the technological resources needed for the next initiative. Technology is an example of: a. Tangible resource b. Intangible resource c. Human resource d. None of the above 32) The Boston Box is used to assess an organization’s products and services according to their market shares and their market growth prospects. The four quadrants of the Boston Box are: a. Problem, Star, Dog, Cash cow b. Wild cat, Star, Market share, Cash cow c. Market growth, Star, Dog, Cash cow d. Wild cat, Star, Dog, Cash cow 33) You are performing the SWOT analysis for your company. What does SWOT stand for? a. Social factors, Weaknesses, Opportunities, Threats b. Strengths, Weaknesses, Opportunities, Threats c. Strengths, Weaknesses, Options, Threats d. Strengths, Weaknesses, Opportunities, Technologies
34) You are considering using Ansoff’s matrix to define your company’s business strategy. The 2x2 matrix maps new and existing markets against new and existing products. The matrix consists of which of the following? a. Market preference, Market development, Product development, Diversification b. Market penetration, Market development, Product development, Diversification c. Market penetration, Market challenges, Product development, Diversification d. Market penetration, Market development, Product determination, Diversification 35) Your company is planning to introduce their existing clothing maternity product line to new countries. Which of the below (using Ansoff’s matrix) is the strategy the company is using? a. Market penetration b. Market development c. Product development d. Diversification 36) Your company is planning to use extensive marketing and sales campaigns and offers to increase sales of their existing clothing maternity product line. Which of the below (using Ansoff’s matrix) is the strategy the company is using? a. Market penetration b. Market development c. Product development d. Diversification 37) McKinsey 7-S model defines the areas of an organization that need to be in alignment if it is to operate effectively. Which of the below are the seven S’s in the McKinsey 7-S model? a. Structure, Simplicity, Shared values, Systems, Skills, Staff, Style b. Structure, Strategy, Shared values, Systems, Skills, Staff, Schemes c. Structure, Strategy, Shared values, Systems, Skills, Staff, Style d. Structure, Strategy, Shared values, Sociology, Skills, Staff, Style 38) One of the S’s in the McKinsey 7-S model stands for ‘Style’. This can refer to culture and management style. You notice that the managers in your organization tells the staff how to go about doing their tasks and the staff follow. Which of the below styles does this fit in? a. Mentoring manager/empowered staff b. Commanding manager/instructed staff c. Mentoring manager/instructed staff d. Commanding manager/Empowered staff 39) You are using the ‘Four-view’ model to make changes to your organization. Which of the below key areas would you consider? a. People, Processes, Technology, Organization b. People, Politics, Technology, Organization c. People, Processes, Technology, Opportunities d. People, Processes, Threats, Organization 40) Your organization has defined ‘Excellent customer service’ as a critical success factor. It has also decided to measure the number of complaints received from customers in a quarter. The number of complaints received is a: a. Key measure b. Critical success measure c. Key performance indicator d. Key improvement indicator
41) In a recent customer satisfaction survey, 75% of your customers have rated your organization’s customer service’ as excellent. This is a: a. Key measure b. Critical success measure c. Key performance indicator d. Key improvement indicator 42) When using the ‘Balanced Business Scorecard’, which of the following are key aspects of the performance that have to be considered? a. Financial, Customer, Internal Business Processes, Learning and Development b. Financial, Customer, Internal Business Processes, Learning and Growth c. Financial, Customer, Internal Business Principles, Learning and Growth d. Economic, Customer, Internal Business Processes, Learning and Growth 43) You use different types of questions in the interviews you conduct with stakeholders. Which of the following are types of questions? a. Open, Closed, Limited choice, Link, Leading, Pointing b. Open, Closed, Limited choice, Lagging, Leading, Probing c. Open, Contained, Limited choice, Link, Leading, Probing d. Open, Closed, Limited choice, Link, Leading, Probing 44) As the business analyst, you follow workers around and record what they do to obtain an understanding of how they assemble printers. Sometimes, you also get trained on the job as if you were an apprentice. This technique is called: a. Shadowing b. Impersonating c. Following d. Observing 45) As a business analyst, you observe workers to understand how they assemble printers. You notice that the first few days, the workers are nervous about being observed and work more. But after a few days of having you around, they settle down and get back to their normal work habits. This is called which of the following? a. Shadowing effect b. Protocol analysis c. Interview effect d. Heisenberg effect 46) As a business analyst, you systematically examine data sources, usually forms, screen layouts and reports of the existing system to analyze the data requirements of a proposed computerized information system. Which of the following are you using? a. Rich pictures b. Document analysis c. Sampling d. Special purpose records 47) As a business analyst, you talk to different users to get their requirements and understand their relationships with each other and the system to be revamped. You capture your observations of the essential elements of a business issue in a pictorial form to facilitate a more holistic understanding and analysis. Which of the following tools are you using? a. Rich pictures b. Document analysis
c. Sampling d. Special purpose records 48) Which of the below is not true of a ‘Rich picture’? a. It is a ‘brain dump’ of everything the BAs have discovered in their initial studies b. It provides a ‘shopping list’ of issues that need to be investigated further c. The idea is to capture in pictorial form the essential elements of a business issue or problem, to facilitate a more holistic understanding and analysis of it d. Rich pictures were popularized in the hard systems methodology 49) You prepare a visual representation of a set of ideas, words, things, or tasks, and the relationships between them. This is called: a. Mind map b. Context diagram c. Rich picture d. Pictogram 50) A diagrammatic representation of a proposed or existing IT system in relation to the wider world-to the people and the other systems to which it must interface is called: a. Mind map b. Context diagram c. Rich picture d. Pictogram 51) You have used the stakeholder wheel to look for stakeholders. Which of the below is not true about the power interest grid? a. The stakeholders who need to be managed actively fall in the high power/high interest grid. These are the people who need to be kept informed of each step in the project b. High power/ low interest grid is comprised of the senior stakeholders who usually only need to be kept satisfied that the work is travelling in the right direction c. Stakeholders who will have to operate the new business system fall in the low power/high interest grid d. Low power/low interest grid consists of the stakeholders who are on the fringes of the study. They might be external suppliers of commodity products or infrequent customers, and as a result they exercise a great deal of influence 52) Which of the below should be captured in a stakeholder management plan? a. Power and interest of stakeholder b. Current attitude of stakeholder c. Support desired from stakeholder d. Any actions or communications 53) As a business analyst, you have classified activities as existing and satisfactory, existing but not satisfactory, and not existing. You have come up with the as-is and to-be states-if people need modified job roles and if a re-org is required. Which of the below have you performed? a. Gap analysis b. Decision tree analysis c. Root cause analysis d. Fishbone analysis 54) You have come up with ARM requirements for a new system to be built. ARM stands for: a. Accuracy, reliability, and maintainability
b. Availability, reliability, and maintainability c. Availability, resilience, and maintainability d. Availability, reliability, and measurability 55) You are examining the forces within and outside the organization that can contribute to acceptance or rejection of a proposed option. Which of the below techniques are you using? a. Force-impact analysis b. Force-field analysis c. Force-effect analysis d. Force-benefit analysis 56) You have just performed the cost-benefit analysis for an upcoming project. Which of the below is an example of tangible cost? a. Development staff costs b. Short-term loss of productivity c. Reduced accommodation costs d. Organization flexibility 57) You have just performed the cost-benefit analysis for an upcoming project. Which of the below is an example of intangible cost? a. User staff costs b. Disruption c. Staff savings d. More creative thinking time 58) You have just performed the cost-benefit analysis for an upcoming project. Which of the below is an example of tangible benefit? a. User staff costs b. Disruption c. Staff savings d. More creative thinking time 59) You have just performed the cost-benefit analysis for an upcoming project. Which of the below is an example of an intangible benefit? a. User staff costs b. Disruption c. Staff savings d. More creative thinking time 60) For an upcoming report automation project, you are comparing the financial benefits expected to flow from a proposal or project with the predicted costs, to see if it is worth undertaking. Which of the below are methods of presenting an investment appraisal? a. Payback analysis b. Discounted cash flow leading to a net present value c. Internal rate of return d. Break high analysis 61) You have performed a business analysis study and are now documenting why the study was done, what the principal findings were, what options were considered with their main advantages and disadvantages, and a recommendation of what should be done. Which of the below are you creating? a. Feasibility report b. Business case report c. Impact analysis
d. Risk analysis 62) Which of the following techniques can you use in requirements elicitation? a. Storyboarding b. Prototyping c. Hothousing d. Scenarios 63) Which of the below is a technique used in requirements analysis? a. Storyboarding b. Prototyping c. Hothousing d. MoSCoW prioritization 64) When you are ensuring that requirements have been defined correctly, you are performing which of the following? a. Requirement verification b. Requirement validation c. Requirement analysis d. Requirement structuring 65) When you are ensuring that all requirements support the delivery of value to the business, fulfill its goals and objectives, and meet stakeholder needs, you are performing which of the following? a. Requirement verification b. Requirement validation c. Requirement analysis d. Requirement structuring 66) Your stakeholder has informed you that he will accept the web application only if the login functionality works as expected. This is called: a. Fit criteria b. Productivity measure c. Requirement verification d. Requirement validation 67) Requirements you gathered are undergoing verification. Which of the below techniques can be used to carry out checks? a. Peer group reviews b. Walkthroughs c. Technical reviews d. Feasibility checking 68) Requirements you gathered are undergoing validation. Which of the below techniques can be used to carry out checks? a. Stakeholder sign offs b. Inspections c. Prototyping d. Scenarios 69) Your colleague, a business analyst has asked you to check if the requirements he prepared are of good quality. Which of the below are characteristics of good requirements? a. Current
b. Modifiable c. Traceable d. Feasible 70) As a Business analyst you make sure that requirement changes requested by stakeholders are handled, concerned folks informed of changes and correct version of the requirements document is referred to always. Which of the below are you performing? a. Requirement communication b. Requirement verification c. Requirement validation d. Requirement management 71) To maintain requirements you add a version number to the requirements document. Which of the following are techniques can you use to manage requirements? a. Naming conventions b. Baselining c. Configuration identification d. Change control 72) You are preparing the requirements traceability matrix and have found that a requirement doesn’t seem to have a business need. Which of the below is true of a requirements traceability matrix? a. It is bidirectional in that it tracks the requirements ‘forwards’ by examining the development of the solution deliverables and ‘backwards’ by looking at the business requirement that was specified for a particular feature of the solution b. It is bidirectional in that it tracks the requirements ‘backwards’ by examining the development of the solution deliverables and ‘forwards’ by looking at the business requirement that was specified for a particular feature of the solution c. It traces the deliverables by establishing a thread for each requirement, from the project’s initiation through to the final implementation d. It is a document which helps ensure that a project’s scope, requirements, and deliverables remain consistent with each other when compared with the baseline 73) You are designing a reporting solution for your stakeholders. The use case is for the user to login successfully into the system, access and run reports. The user using the system in the use case is called: a. Secondary actor b. Primary actor c. Primary User d. Secondary user 74) Which of the below belong to the four cultures defined by Deal and Kennedy? a. Rapid feedback and reward, low risk b. Rapid feedback and reward, high risk c. Slow feedback and reward, low risk d. Slow feedback and reward, high risk 75) In Johnson and Scholoe’s cultural web, stories refer to past events and personalities that are talked about both inside and outside the organization that affects how customers perceive the organization. Which of the below is not a part of Johnson and Scholoe’s cultural web? a. Rituals and routines b. Symbols, Organizational structures
c. Power structures, Control systems d. Practices and power 76) Your organization is going through a change. Having adopted Kurt Lewin’s model, which of the below are the stages to pass through in sequence? a. Unfreeze, Transition, Refreeze b. Unfreeze, Transition, Freeze c. Freeze, Transition, Refreeze d. Freeze, Transition, Unfreeze 77) Which of the following are part of the cultures defined by Deal and Kennedy? a. Rapid feedback and reward, low risk b. Rapid feedback and reward, high risk c. Slow feedback and reward, low risk d. Slow feedback and reward, high risk 78) Which of the following are part of Johnson and Scholes’s cultural web? a. Rituals and Routines b. Stories c. Symbols d. Power structures 79) Your company is implementing a new web system to automate the process vendors upload items for buyers to view. There is resistance to the change and the new tool. What can be done to improve adoption of the new system? a. Provide training to users on how to use the new system b. Tell users that they can leave if they won’t use the new tool c. Encourage users to continue using the old system d. Provide training documents and conduct office hours to answer questions on the new tool 80) Your company implemented a new web system to automate the process vendors upload items for buyers to view. But even after the implementation, buyers still handle this process manually with the vendors. What can be done to improve adoption of the new system? a. Provide training to users on how to use the new system b. Provide training documents and conduct office hours to answer questions on the new tool c. Establish the new web system as the only way to process vendor-uploaded items d. Encourage users to continue using the old system 81) To improve customer satisfaction, you plan to implement IT system changes. Which of the below will enable the change? a. Hiring IT staff b. Creating training for support team c. Developing IT system d. Offer efficient customer support 82) Your company has implemented a multi-million dollar project that did not go very well. Five years later, you are tasked with doing the benefits realization review. Which of the following could be possible obstacles to doing the benefits realization review? a. Lack of senior management support b. Timing of review c. Defects in the system d. Organizational culture and politics 83) Your company is transitioning from the existing enterprise order management system to
a new system. Requirements that will not be needed once the migration is complete and those that describe capabilities that the solution must have in order to facilitate movement from the current state of the enterprise to a desired future state are called: a. Transition requirements b. Functional requirements c. Solution requirements d. Non functional requirements 84) Which of the following is not true about plan-driven approach? a. Focus is on maximizing up-front uncertainty b. Ensures that the solution is fully defined before implementation c. Business analysis work occurs early in the project d. Formal change management and formal communication are the norm 85) Which of the following is not true about change-driven approach? a. Focus is on rapid delivery of business value in short iterations in return for acceptance of a higher degree of uncertainty regarding the overall delivery of the solution b. Business analysis effort conducted early to produce an initial list of high-level requirements c. Formal documentation is often produced before the solution is implemented to facilitate knowledge transfer d. There is generally no separate change management process distinct from the selection of new requirements for a given iteration 86) Which of the below increase the complexity of business analysis efforts as they increase? a. Number of business systems affected b. Amount and nature of risk c. Uniqueness of requirements d. Number of technical resources required 87) You are assessing stakeholder attitudes towards a new data conversion initiative. Which of the below will you assess in the stakeholder onion diagram you prepare? a. Influence-on project b. Influence in the organization c. Influence with other stakeholders d. Complexity of stakeholder requirements 88) Which of the following is not true about dispersed stakeholder engagement and communication? a. All key stakeholders are located in the same local geographic area b. The factors of distance, possible time differences and cultural and language differences increase the complexity for business analysis c. More effort will be needed to identify and account for cultural differences d. More detailed requirements documentation and acceptance criteria or more frequent review sessions might be needed 89) Which of the following is not true about work breakdown structure? a. A WBS may break down the project into iterations, releases, or phases b. A WBS may break deliverables into work packages c. A WBS may break activities into smaller tasks. This decomposition of activities and tasks creates the Activity List
d. A WBS may be created before the project is approved 90) Which of the below is true about milestones? a. They represent significant events in the progress of a project b. They are used to measure the progress of the project and compare actual progress to earlier estimates c. They can be used as a time to celebrate the completion or delivery of a major deliverable or section of project work d. An example of a major milestone is the stakeholders’ and sponsor’s formal approval of a requirements document 91) Which of the below are requirement attributes? a. Absolute reference (unique requirement id) b. Author of the requirement c. Complexity d. Ownership 92) Which of the below are requirement attributes? a. Priority b. Risks c. Source of the requirement d. Stability 93) Which of the below are requirement attributes? a. Status b. Urgency c. Defect id d. Risks 94) Your company has decided to use Agile methodology for the next project. Which of the below is true about this methodology? a. All requirements, including “new” and “changed” requirements, are recorded in the product backlog and prioritized b. At the beginning of each iteration, the highest priority requirements are selected from the backlog and estimated, and these estimates are used as input to determine whether the requirement will be implemented in that iteration c. At the beginning of each iteration, the highest priority requirements are selected from the backlog and estimated, and these estimates are used as output to determine whether the requirement will be implemented in that iteration d. All requirements are prioritized at the beginning of the project 95) You conduct a performance review for your fellow business analyst. Which of the following could you use to measure? a. Deliverable due dates as specified in the business analysis plan b. Frequency of changes to requirements c. The number of review cycles required d. Qualitative feedback from stakeholders 96) If a proposed requirement is not accepted by key stakeholders, the project manager must manage the associated risk to the project: a. By altering the project scope b. By escalating the issue c. By other appropriate responses
d. By doing nothing 97) You have the below requirements for building a web application: Requirement A-Provide the ability to authenticate the user Requirement B-Provide the ability to post to forums You note that for the user to post to forums, he has to first login and be authenticated. The relation between Requirement A and Requirement B is: a. Cover b. Subset c. Effort d. Necessity 98) You have the below requirements for a web application: Requirement A-Source data about customers Requirement B-Source data to send emails to customers about quote expiration dates You note that to send emails about quote expiration dates, you need customer data such as customer name, email, etc. If Requirement A is implemented, Requirement B is easier to implement. The relation between Requirement A and Requirement B is: a. Cover b. Subset c. Effort d. Necessity 99) You have the below requirements for a web application: Requirement A-Source data about customers Requirement B-Source data about quotes Requirement C-Source data about orders Requirement D-Source data about invoices Requirement E-Source data for order management You note that if Requirements A through D are implemented, Requirement E is automatically implemented. The relation between Requirements A-D and Requirement E is: a. Cover b. Subset c. Effort d. Necessity 100) The different types of requirement relationships are: a. Necessity b. Effort c. Subset d. Cover 101) During the requirements development process, you collected notes and created diagrams. This collection of notes and diagrams is called: a. Work model b. Work product c. Presentation d. Formal documentation 102) You are preparing a requirements package for formal review and approval by stakeholders. What other purposes does a requirements package serve? a. Provide inputs to solution design
b. For conformance to contractual and regulatory obligations c. For maintenance for re-use d. For early assessment of quality and planning 103) You organization is trying to find possible solutions to implement an order entry system and is seeking information to evaluate possible options. Which of the below would be used to capture the requirements? a. Business proposal document b. Request for Information (RFI) c. Request for Proposal (RFP) d. Request for Quote (RFQ) 104) You organization is trying to find vendors to implement an order entry system. The solution option has been decided. Which of the below would be used to capture the requirements? a. Business proposal document b. Request for Information (RFI) c. Request for Proposal (RFP) d. Request for Presentation 105) Your company’s competitors have achieved significant revenue growth by automating their customer management process. Your company now has a business need to match up to the competition. This business need has been generated by which of the following? a. The need to achieve a strategic goal b. A problem with the current state of a process c. Additional information to make sound decisions and perform additional functions to meet business objectives d. From external drivers 106) Business objectives should be SMART. SMART stands for: a. Specific, Measurable, Achievable, Relevant, Time-bounded b. Specific, Measurable, Achievable, Resilient, Time-bounded c. Specific, Measurable, Aggressive, Relevant, Time-bounded d. Specific, Measurable, Achievable, Relevant, Testable 107) You have spent time discussing various alternatives to a problem. Which of the below can be used to determine when enough alternatives have been investigated: a. At least one of the alternative approaches is acceptable to key stakeholders b. At least some of the approaches are distinctly different from one another c. The effort to investigate alternatives is producing diminishing returns d. When you feel you have done enough 108) You are performing a preliminary analysis of solution alternatives to determine whether and how each option can provide an expected business benefit to meet the business need. This is called: a. Solution scoping b. Requirement gathering c. Feasibility study d. Alternative analysis 109) Your organization is planning to computerize all medical records. The costs to be considered are: a. Costs of developing and implementing the change
b. Costs related to changing the work and practices of the organization c. Total cost of ownership to support the new solution d. Capital expenditures for the new investment 110) You reviewed your fellow BA’s business requirements document and found that it was too complex to understand as the assumption was that the reader would have the domain knowledge. You provided feedback that this assumption should not be made when writing requirements. What are other guidelines that should be followed when writing requirements? a. Express multiple requirements at a time b. Avoid complex conditional clauses c. Use terminology that is consistent d. Use terminology familiar to the stakeholders who must review or use the requirement 111) Which of the below are characteristics of good requirements? a. Cohesive b. Complete c. Consistent d. Correct 112) Which of the below are characteristics of good requirements? a. Feasible b. Modifiable c. Unambiguous d. Testable 113) You are evaluating the effect a new reporting solution will have on your organization and whether the organization is prepared for the organizational change that the solution implementation will cause. Which of the following are you performing? a. Organizational readiness assessment b. Business process assessment c. Political assessment d. Organizational change assessment 114) Force field analysis involves identifying the forces that support and oppose a change, depicting them on opposite sides of a line, and then estimating the strength of each force in order to assess which set of forces are stronger. Once this analysis is complete, the next step is to look for ways to strengthen the forces that support the desired outcome or generate new forces. You have completed force field analysis for a project and have determined that the opposing forces are stronger. Stakeholder A supports your project-the strength of this force is 4. Stakeholder B opposes your project-which of the following is true about the strength of this force? a. It’s strength is greater than 4 b. It’s strength is equal to 4 c. It’s strength is lesser than 4 d. It’s strength cannot be determined with the information provided 115) A project to build a new reporting solution for your organization has been initiated. There is no current reporting system used. Which of the following statements is not true? a. Transition requirements do not need to be analyzed when there’s no existing solution
b. Transition requirements need to be analyzed when there’s no existing solution c. Transition requirements remain relevant only during the transition period between solutions d. Transition requirements cease to be relevant once the existing solution is eliminated 116) During quality assurance, a defect has been found in the solution. Your development team has told you that the defect cannot be resolved because the cause cannot be identified. Which of the below are options you can investigate as a business analyst? Choose the best answer. a. Including additional quality control checks b. New manual processes c. Removal of support for certain exception cases d. All of the above 117) You have implemented a reporting solution with key reports for your sales users. You measure usage statistics to see who is using the reports, how often are reports used and the time spent on each report. This activity is called: a. Feasibility assessment b. Transition readiness c. Solution design d. Post-implementation assessment 118) a. b. c. d.
Which of the below are key business analyst competencies? Critical thinking Successful decision making Problem solving Systems thinking
119) a. b. c. d.
In the context of systems theory, the term “system” includes which of the following? People involved Interactions between the people External forces affecting their behavior Other relevant elements and factors
120) Which of the below are interaction skills that are useful for a business analyst to have? a. Facilitation b. Negotiation c. Leadership d. Team work 121) A structured process which captures the key characteristics of an industry to predict the long-term profitability prospects and to determine the practices of the most significant competitors is called: a. Organizational analysis b. Competitive Analysis c. Systems analysis d. Solutions design 122) An analysis model that specifies complex business rules or logic concisely in an easyto-read tabular format, specifying all of the possible conditions and actions that need to be accounted for in business rules is called: a. Operative rules b. Decision Tables
c. Solution model d. Alternative assessment model 123) Which of the below does Enterprise Architecture comprise of? a. Organization’s business processes b. IT software and hardware c. People d. Operations and projects 124) You prepare a set of user stories, requirements and features. These have been identified as candidates for potential implementation, prioritized, and estimated. This is called: a. Product backlog b. Use cases c. Business requirements d. Functional requirements 125) Which of the below does benchmarking require of the business analyst? a. Identify the area to be studied and identify organizations that are leaders in the sector b. Conduct a survey of selected organizations to understand their practices c. Arrange for visits to best-in-class organizations d. Develop a project proposal to implement the best practices 126) Which of the below are commonly used financial valuation techniques? a. Discounted Cash Flow b. Net Present Value c. Internal Rate of Return d. Average Rate of Return 127) Which of the below are commonly used financial valuation techniques? a. Internal Rate of Return b. Average Rate of Return c. Pay Back Period d. Cost-Benefit Analysis 128) You are in the requirements gathering phase. You have been told that the stakeholder will not be available for the duration of the elicitation process. Which of the below can you refer to for collecting requirements? a. Existing guidelines, procedures, training guides b. Competing product literature, published comparative product reviews c. Problem reports, customer suggestion logs d. Existing system specifications 129) You are in the requirements gathering phase. You have been told that the stakeholder is no longer with the company. Which of the below can you refer to for collecting requirements? a. Market studies b. Contracts c. Requests for proposal d. Statements of work 130) Which of the following is not true about analogous cost estimating? a. It is a gross value estimating approach
b. It is used to estimate a value when there is a limited amount of detailed information about the project c. It uses historical information and expert judgment d. It relies on the actual cost of the current project as the basis to estimate previous, similar projects 131) You conduct a focus group to elicit ideas and attitudes about a specific product. Which of the following is not true of a focus group? a. The participants share their impressions, preferences and needs, guided by a moderator b. It is less structured than brainstorming c. Individuals with similar characteristics in the focus group may mean that differing perspectives will not be shared d. Individuals with diverse backgrounds and/or perspectives may mean that individuals may self-censor if not comfortable with others’ backgrounds or opinions, resulting in a lower quality of data collected 132) Which of the below is not true of lessons learned process? a. The purpose of lessons learned sessions is to identify blame to a specific person or team b. Lessons learned sessions may take place in formal, facilitated meetings with set agendas and meeting roles, formal or informal working sessions, or informal get-togethers c. Lessons learned sessions may or may not include a celebration d. Lessons learned sessions are a waste of time and serve no purpose 133) Your organization wants to measure how satisfied the customers are. But there is no survey of client satisfaction. Instead, the organization has decided to use the proportion of all contracts renewed as an indicator. The proportion of all contracts renewed is called: a. Proxy b. Target c. Measure d. Indicator 134) Which of the below are non-functional requirement categories? a. Reliability b. Performance Efficiency c. Operability d. Security 135) “The reporting system shall provide 90% of responses in no more than 2 seconds.” This is a non-functional requirement belonging to which of the below categories? a. Reliability b. Performance Efficiency c. Operability d. Security 136) “The reporting system shall be up 99.99% of time.” This is a non-functional requirement belonging to which of the below categories? a. Reliability b. Performance Efficiency c. Operability d. Security 137) “Ninety percent of operators shall be able to use all the functionality of the system after no more than six hours of training.” This is a non-functional requirement belonging to
which of the below categories? a. Reliability b. Performance Efficiency c. Operability d. Security 138) Which of the below are process improvement methods? a. Value stream mapping b. Statistical analysis and control c. Process simulation d. Benchmarking 139) You would like to change processes to improve them. Which of the below can you do? a. Analysis of a process to identify and remove activities that do not add value to a stakeholder, where possible b. Reduction of the time required to complete a process (by reducing the time to perform a task or the wait time between tasks) c. Improving interfaces or handoffs between roles and organizational units to remove errors d. Reduction or elimination of bottlenecks and backlogs 140) Your organization knows there is a risk in implementing a solution as a response to a competitor’s action. It still wants to proceed. Your organization is: a. Risk averse b. Risk neutral c. Risk seeking d. None of the above 141) Which of the below are part of the seven basic quality tools (7QC)? A. Fishbone diagrams B. Flowcharts C. Pareto diagrams D. Checklists 1.A 2. A, B 3. A, B, C 4. A, B, C, D 142) A state diagram is also known as: a. State Machine Diagram b. State Transition Diagram c. Entity Life Cycle Diagram d. SWOT diagram 143) Which of the below is not true of a state diagram? a. It shows how the behavior of a concept, entity or object changes in response to events b. It specifies a sequence of states that an object goes through during its lifetime, and defines which events cause a transition between those states c. It shows strengths and weaknesses of the process d. It is used to model the logic of usage scenarios, by showing the information passed between objects in the system through the execution of the scenario 144) You are assessing a vendor based on his knowledge and expertise. Which of the below
can you also use? a. Product Reputation and Market Position b. Terms and conditions c. Vendor Experience and Reputation d. Vendor Stability 145) Which of the below can lead to poor software cost estimation? a. Frequent requirements changes b. Missing requirements c. Insufficient communication with users d. Insufficient requirements analysis 146) You have learnt that some of the assumptions you made in the project are wrong. Which of the below can you do to achieve the objectives? a. Change scope b. Adjust the schedule c. Launch other projects d. Proceed with the initial assumptions 147) Which of the following is not true? a. When resolving conflicts between requirements from different user classes or making priority decisions, favored user classes receive preferential treatment b. Disfavored user classes are groups who aren’t supposed to use the product for legal, security, or safety reasons c. You might build in features to deliberately make it hard for disfavored users to do things they aren’t supposed to do d. Favored user classes and disfavored user classes should be treated the same when resolving conflicts between requirements from them 148) Which of the following is true about product champions? a. They are a few key members of the user community that provide the requirements for the project b. Each product champion serves as the primary interface between members of a single user class and the project’s business analyst c. Ideally, the champions will be actual users, not surrogates such as funding sponsors, marketing staff, user managers, or software developers imagining themselves to be users d. Product champions gather requirements from other members of the user classes they represent and reconcile inconsistencies 149) Planguage uses which of the following? a. Tag b. Ambition c. Stretch d. Wish 150) Which of the below is not true about requirement prioritization? a. If you go through a prioritization process and all of the requirements come out with about the same priority, you really haven’t prioritized them at all b. The highest priority requirements are those that provide the largest fraction of the total product value at the smallest fraction of the total cost c. The prioritization can include considerations of customer value, business value, business or technical risk, cost, difficulty implementation, time to market, regulatory or policy compliance, competitive marketplace advantage, and contractual commitments
d. ‘Decibel prioritization’ and ‘Threat prioritization’ are best practices 151) You have dissatisfied customers who reject the product and provide bad reviews. Which of the below could be possible root causes? a. Inadequate user involvement in requirements development b. Unrealistic customer expectations c. Mismatch between customer’s and developer’s perception of specific requirements d. Poor problem definition 152) You have dissatisfied customers who reject the product and provide bad reviews. Which of the below could be possible solutions? a. Build prototypes and have users evaluate them. b. Have customer representatives review requirements. c. Convene focus groups d. Use collaborative requirements elicitation approaches 153) In your organization, requirements processes and document templates are inconsistent across projects. Which of the below could be possible solutions? a. Adopt one or more standard templates for requirements deliverables b. Provide guidance to help project teams tailor the standard templates as appropriate c. Collect and share good examples of templates and actual requirements documents in a shared repository d. Consider whether the templates are too complex for all projects; simplify them if you can 154) People performing the BA role don’t know how to do it well. Which of the below could be possible solutions? a. Train prospective BAs in both requirements engineering and associated soft skills b. Write a job description and a skills list for your BAs c. Set up a mentoring program for new BAs d. Develop a professional BA career path in the organization 155) The product you have developed doesn’t achieve business objectives. Which of the below could be possible solutions? a. Develop business requirements with key stakeholders b. Understand which success metrics are important to the project’s business stakeholders c. Communicate business objectives to other stakeholders to achieve alignment d. Convene focus groups 156) The requirements for your project are incomplete and insufficiently detailed. Construction begins before the requirements for a development iteration or enhancement cycle are sufficiently understood. Which of the below are possible root causes? a. Inadequate user involvement in requirements development b. Insufficient time spent on requirements development c. Release date set before requirements are understood d. Key marketing or business stakeholders are not engaged in the requirements process 157) More requirements are planned than can be implemented with available time and resources. Which of the below are possible root causes? a. Schedule is set before requirements are defined b. Project is committed to before scope is accurately assessed c. Insufficient staff is allocated to project d. Stakeholders are afraid they will have only one release opportunity
158) Scope is undocumented or poorly defined and releases are poorly planned. Which of the below are possible root causes? a. Haste to begin construction b. Lack of understanding of the importance of scope definition c. Lack of agreement on scope among stakeholders d. Volatile market or rapidly changing business needs 159) Scope is undocumented or poorly defined and releases are poorly planned. Which are the possible solutions? a. Don’t begin a project without clear business objectives b. Write a vision and scope document and obtain buy-in from key stakeholders c. Postpone or cancel the project if sponsorship and scope definition are not achieved d. Use shorter development iterations to adapt to rapidly changing requirements 160) Requirements questions and issues are not resolved for your project. Which are possible root causes? a. Lack of coordination of questions and issues that arise about requirements b. Responsibilities for resolving issues are not clear c. No one is responsible for tracking issues and their status d. Team is unable to obtain necessary information from a vendor, client, contractor, or other stakeholder 161) Requirements questions and issues are not resolved for your project. Which of the below are possible solutions? a. Assign each open issue to an individual for resolution b. Use an issue-tracking tool for tracking requirements issues to closure c. Monitor open issues as part of project tracking d. Obtain commitment from all stakeholders early on for open and timely information exchange and for answering questions and resolving issues 162) Your project participants don’t share the same vocabulary. Which of the below are possible solutions? a. Define terms in a glossary. b. Define data structures and elements in a data dictionary. c. Train development team in the business domain. d. Train user representatives in requirements engineering 163) You notice that there is ambiguity in how different users understand the requirements. Which of the below can help clear ambiguities in requirements? a. Writing tests against the requirements b. Building prototypes c. Collaborative elicitation d. Collaborative validation 164) You have prepared a set of requirements that has been reviewed and agreed upon and serves as the basis for further development. This is called: a. Requirement baseline b. Initial scope c. Preliminary requirements d. Project scope 165) You have decided to implement a commercial off-the-shelf (COTS) system. You want to develop additional functionality with custom code to enhance the package’s capabilities to close needs gaps. Which of the below is the type of COTS implementation you are
implementing? a. Out-of-the-box b. Configured c. Integrated d. Extended 166) Requirements management tools are underutilized in your organization. Which of the below could be root causes? a. Inadequate training in tool capabilities b. Processes and culture haven’t been modified to take full advantage of tools c. No one is responsible for leading the use of the tool d. Amount of time needed to configure, learn how to use, and employ the tool is underestimated 167) More requirements are planned than can be implemented with available time and resources. Which of the below are possible solutions? a. Prioritize requirements based on business objectives b. Plan for multiple delivery cycles to accommodate lower-priority requirements c. Document vision and scope, aligned with business objectives, before making commitments d. Timebox the development or deliver product features incrementally 168) The team can’t get customer representatives to participate in elicitation. Which of the below could be root causes? a. Customer representatives don’t have time to participate in requirements development b. Customers don’t understand the need to participate c. Customers don’t know what BAs need from them d. Customers aren’t committed to the project 169) The team can’t get customer representatives to participate in elicitation. Which of the below could be possible solutions? a. Educate customers and managers about requirements and the need for their participation b. Describe the risks from insufficient user involvement to customers and managers c. Identify a product champion for each user class d. Obtain customer management commitment to an effective requirements process 170) Wrong user representatives are involved in requirement elicitation. Which of the below could be possible solutions? a. Define user classes b. Identify and empower appropriate and effective product champions c. Develop user personas as stand-ins for real users d. Decline requirement requests from unauthorized or inappropriate sources 171) Users are unsure about their needs. Which of the below could be possible solutions? a. Compile a list of generic questions as a starting point for elicitation activities b. Develop use cases or user stories c. Build prototypes and have users evaluate them d. Use incremental development to clarify requirements a bit at a time 172) Users are unsure about their needs. Which of the below could be root causes? a. Users don’t understand or can’t describe their business process well b. System is being built to support a new, incompletely defined business process c. Users aren’t committed to the project, perhaps are threatened by it
d. Business objectives are not well defined or communicated 173) Too many people are involved in requirements elicitation. Which of the below could be root causes? a. Everyone wants to be represented for political reasons b. User classes aren’t clearly defined c. Lack of delegation to specific user representatives d. There really are a lot of different user classes 174) Too many people are involved in requirements elicitation. Which of the below could be possible solutions? a. Define user classes b. Identify product champions or product owners c. Identify requirements decision makers d. Focus on the needs of favored user classes 175) Implemented “requirements” don’t meet user needs. Which of the below could be possible solutions? a. Ask “why” several times to understand the real user needs behind the presented requirements and the rationale behind design constraints. b. Understand user requirements before addressing user interface specifics. c. Develop skilled BAs who can ask the right questions and elicit true needs. d. Educate customers about requirements development. 176) Needed requirements are missed. Which of the below could be root causes? a. Users don’t know what they need b. BA didn’t ask the right questions c. Insufficient time was provided for elicitation d. Some user classes aren’t represented 177) Needed requirements are missed. Which of the below could be root causes? a. Appropriate, knowledgeable user representatives did not participate in elicitation b. Elicitation participants make incorrect assumptions c. Insufficient communication between developers and customers d. Users don’t express their implicit and assumed requirements 178) Needed requirements are missed. Which of the below could be possible solutions? a. Develop skilled BAs who can ask the right questions b. Elicit use cases or user stories c. Use multiple elicitation techniques d. Represent requirements in multiple ways, emphasizing visual models, to look for gaps 179) Needed requirements are missed. Which of the below could be possible solutions? a. Conduct requirements reviews. Use multiple, incremental reviews b. Build prototypes and have users evaluate them c. Build the product incrementally and incorporate new requirements in later iterations d. Create and use a requirements traceability matrix to find missing requirements 180) Requirements specified are incorrect or inappropriate. Which of the below could be possible solutions? a. Determine what was wrong with the flawed requirements and why they were specified b. Define user classes
c. Identify appropriate product champions, educate them, and empower them d. Have a multifunctional team review requirements 181) Requirements specified are incorrect or inappropriate. Which of the below could be root causes? a. The wrong user representatives or inappropriate surrogates are involved b. User representatives speak for themselves, not for those they represent c. Managers do not provide access to user representatives d. Business requirements are not clearly established 182) All requirements seem to be equally important. Which of the below could be root causes? a. Fear that low-priority requirements will never be implemented. b. Insufficient or evolving knowledge about the business and its needs. c. The product isn’t usable unless a large, critical set of functionality is implemented. d. Unreasonable customer or developer expectations 183) There are conflicting requirements priorities among stakeholders. Which of the below could be root causes? a. Different user classes have conflicting needs b. Lack of focus on the original product vision, or the vision evolves during the project c. Unclear business objectives, or lack of agreement on business objectives d. Changing business objectives 184) There are conflicting requirements priorities among stakeholders. Which of the below could be possible solutions? a. Perform sufficient market research b. Establish and communicate business objectives c. Base priorities on vision, scope, and business objectives d. Identify favored user classes or market segments 185) Rapid descoping late in the project could be resolved by: a. Define priorities early on. b. Use priorities to guide decisions about what to work on now and what to defer. c. Reprioritize when new requirements are incorporated. d. Adjust scope periodically, not just late in the project 186) Developers find requirements vague and ambiguous. They have to track down missing information and they misunderstand requirements and have to rework their implementations. This can possibly be avoided by: a. Train BAs in writing good requirements. b. Avoid using subjective, ambiguous words in requirements specifications. c. Have developers and customers review requirements early for clarity and appropriate detail. d. Model requirements to find missing information and enhance details. 187) Developers find requirements vague and ambiguous. They have to track down missing information and they misunderstand requirements and have to rework their implementations. This can possibly be avoided by: a. Build prototypes and have users evaluate them. b. Refine requirements in progressive levels of detail. c. Document business rules. d. Define terms in a glossary
188) Requirements contain TBDs, information gaps, and open issues. This can possibly be resolved by: a. Review requirements to identify information gaps. b. Assign responsibility for resolving each TBD or open issue to an individual. c. Prioritize TBDs to be resolved if time is tight. d. Track each TBD or open issue to closure before baselining a set of requirements. 189) Stakeholders assume that functionality in the existing system will be replicated in a new system. This can possibly be avoided by: a. Reverse engineer the existing system to understand its full capabilities. b. Write a requirements specification that includes all the desired functionality for the new system. c. Build as-is and to-be process models so that stakeholders are clear on what the future system will and won’t do d. Don’t replicate old functionality that might not be needed 190) Product doesn’t achieve business objectives or meet user expectations. This can possibly be avoided by: a. Perform market research to understand market segments and their needs. b. Engage product champions representing each user class throughout the duration of the project. c. Have customers participate in requirements reviews. d. Have users write acceptance tests and acceptance criteria. 191) Product does not achieve performance goals or satisfy other quality expectations that users have. The possible root causes are: a. Quality attribute requirements were not elicited and specified. b. Stakeholders don’t understand nonfunctional requirements and their importance. c. The requirements template or tool being used doesn’t have sections for nonfunctional requirements. d. Users don’t state their assumptions about the system’s quality characteristics 192) Product does not achieve performance goals or satisfy other quality expectations that users have. The possible solutions are: a. Educate BAs and customers about nonfunctional requirements and how to specify them. b. Have BAs explore nonfunctional requirements during elicitation. c. Use an SRS template that includes sections for nonfunctional requirements. d. Use Planguage to specify quality attributes precisely. 193) Some planned requirements were not implemented. The possible root causes could be: a. Individual requirements were not discretely identified and labeled b. Requirements were inadvertently overlooked during implementation. c. Responsibilities for implementing requirements were not assigned. d. The status of individual requirements was not tracked accurately 194) Some planned requirements were not implemented. The possible solutions could be: a. Keep requirements current and make them available to the whole team. b. Make sure the change control process includes communication to stakeholders. c. Store requirements in a requirements management tool. d. Track the status of individual requirements 195) Requirements move in and out of scope. The possible solutions could be: a. Clearly define the business objectives, vision, and scope.
b. Use the scope statement to decide whether proposed requirements are in or out of scope. c. Record the rationale for rejecting a proposed requirement. d. Ensure that the change control board has the appropriate members and a shared understanding of project scope. 196) Requirements move in and out of scope. The possible root causes are: a. Vision and scope are not clearly defined. b. Business objectives are not clearly understood and communicated. c. Scope is volatile, perhaps in response to changing market demands. d. Requirements priorities are poorly defined. 197) People don’t know the scope or understand scope changes. The possible root causes are: a. Requirements changes aren’t communicated to all affected stakeholders. b. Requirements specifications aren’t updated when requirements change. c. Customers request changes directly from developers. d. Not everyone has ready access to the requirements documentation. 198) People don’t know the scope or understand scope changes. The possible solutions are: a. Define an owner for each requirement. b. Define trace links between requirements and other artifacts. c. Include all affected areas in requirements communications. d. Establish a change control process that includes the communication mechanisms. 199) Requirements changes take much more effort than planned. The possible root causes are: a. Insufficient impact analysis of proposed requirements changes. b. Developers underestimate the impact of requirements changes. c. Team members are afraid to be honest about the impact of proposed changes. d. Change requests do not provide enough information to permit good impact analysis. 200) Stakeholders bypass the change control process and customers request changes directly from developers. Possible root causes are: a. Change control process isn’t practical and effective. b. Change control board is ineffective. c. Stakeholders don’t understand or accept the change control process. d. Management doesn’t require that the change control process be followed 201) Stakeholders bypass the change control process and customers request changes directly from developers. Possible solutions are: a. Ensure that the change control process is pragmatic, effective, efficient, and accessible to all stakeholders. b. Make the change control process flexible in how it handles small versus large changes. c. Establish and charter an appropriate change control board. d. Enlist management to commit to and champion the change control process
Answer Key 1-201 1a
2 None of the above 3 All of the above
4d 5a 6a 7a 8b 9c 10 d 11 All of the above 12 a 13 b 14 All of the above 15 d 16 All of the above 17 c 18 a 19 a 20 c 21 b 22 a 23 c 24 b 25 b 26 b 27 i 28 c 29 b 30 d
31 b 32 d 33 b 34 b 35 b 36 a 37 c 38 b 39 a 40 c 41 c 42 b 43 d 44 a 45 d 46 b 47 a 48 d 49 a 50 b 51 d 52 All of the above 53 a 54 b 55 b 56 a
57 b 58 c 59 d 60 a, b, c 61 b 62 a, b, c, d 63 d 64 a 65 b 66 a 67 All of the above 68 All of the above 69 All of the above 70 d 71 All of the above 72 a, c, d 73 b 74 All of the above 75 d 76 b 77 All of the above 78 All of the above 79 a, d 80 a, b, c 81 a, b, c 82 a, b, d 83 a
84 a 85 c 86 All of the above 87 a, b, c 88 a 89 d 90 All of the above 91 All of the above 92 All of the above 93 a, b, d 94 a, b 95 All of the above 96 a, b, c 97 d 98 c 99 a 100 All of the above 101 b 102 All of the above 103 b 104 c 105 d 106 a,d 107 a, b, c 108 c 109 All of the above
110 b, c, d 111 All of the above 112 All of the above 113 a 114 a 115 b 116 d 117 d 118 All of the above 119 All of the above 120 All of the above 121 b 122 b 123 All of the above 124 a 125 All of the above 126 All of the above 127 All of the above 128 All of the above 129 All of the above 130 a 131 b 132 a, d 133 a 134 All of the above 135 b 136 a
137 c 138 All of the above 139 All of the above 140 c 141 All of the above 142 a, b, c 143 c, d 144 All of the above 145 All of the above 146 a, b, c 147 d 148 All of the above 149 All of the above 150 d 151 All of the above 152 All of the above 153 All of the above 154 All of the above 155 All of the above 156 All of the above 157 All of the above 158 All of the above 159 All of the above 160 All of the above 161 All of the above 162 All of the above
163 All of the above 164 a 165 d 166-201 All of the above
View more...
Comments