【单选题】
哪个过程能最直接地提高相关方对项目的支持,降低相关方对项目的抵制,从而显著提高项目成功的机会? ( )
A. 管理相关方参与
B. 监督相关方参与
C. 识别相关方
D. 规划相关方参与
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
A
解析
A.正确答案。 管理相关方参与过程是直接与相关方打交道的过程。 B. 监督相关方参与过程是监督和纠偏。 C. 不如 A 那么直接。 属于为 A 做准备。 D. 不如 A 那么直接。 属于为 A 做准备。 考点与页码: 管理相关方参与过程。 注意题目中的 “ 最直接地”。 《 指南》 第 523 页, 《 解读》 第 275 页。
相关试题
【单选题】
为了方便考察相关方参与项目工作的程度, 可以对凸显模型做怎样的调整? ( )
A. 用参与度取代凸显模型中的任一维度
B. 用邻近性取代合法性
C. 用影响取代紧迫性
D. 用邻近性取代凸显模型中的任一维度
【单选题】
管理相关方参与过程旨在与相关方沟通和协作, 引导相关方合理参与项目。 该过程应该在项目的哪个阶段进行?( )
A. 在启动项目阶段
B. 在组织与准备阶段
C. 在执行项目工作阶段
D. 在整个项目生命周期中
【单选题】
相关方登记册中通常包括 ( )。
A. 相关方的身份信息、 评估信息和分类
B. 相关方的身份信息、 分类和管理策略
C. 相关方的身份信息、 所在位置和分类
D. 相关方的身份信息、 在项目中的角色和分类
【单选题】
团队成员在使用一种头脑风暴的改良技术来识别相关方。大家围成一圈,每个人单独思考,将识别出的相关方写在 A4 白纸上,再传递给下一个人;一轮接一轮书写和传递纸张, 直到每张纸都传回到最初发出者那里。 而后,大家把纸张交给主持人, 主持人组织大家讨论。 他们很可能是在用以下哪种技术? ( )
A. 亲和图
B. 名义小组技术
C. 头脑风暴
D. 头脑写作
【单选题】
关于相关方参与计划, 下列说法错误的是 ( )
A. 相关方参与计划与沟通管理计划有密切的联系
B. 相关方参与计划可以是非常详细或高度概括的
C. 相关方参与计划必须是正式的
D. 相关方参与计划要随着项目进展更新和优化
【单选题】
识别相关方, 最好采用以下哪种方法? ( )
A. 一次就识别出全部的相关方
B. 对已识别的相关方进行访谈, 识别出更多的相关方
C. 与相关方一起解决问题
D. 对他们的能力进行评估
【单选题】
识别相关方过程, 可能因以下哪个原因而提出变更请求? ( )
A. 首次开展识别相关方过程
B. 直到项目计划被批准, 才开展识别相关方过程
C. 在项目执行开始之前无须识别相关方
D. 在项目执行阶段开展识别相关方过程
【单选题】
已识别出来的某位相关方可能到项目晚期才会对项目产生显著影响, 那么项目经理现阶段应该怎么做? ( )
A. 不把他列入相关方登记册
B. 列人相关方登记册并密切关注变化情况
C. 到项目晚期再列人相关方登记册
D. 向高级管理层请示该如何处理
【单选题】
职能经理也是项目的一个重要相关方, 项目经理必须与职能经理密切合作, 因为( )
A. 职能经理掌握着项目所需的人力资源
B. 职能经理负责为项目提供资金
C. 职能经理是项目产品的直接使用者
D. 出现利益冲突时要按有利于职能经理的原则处理
【单选题】
项目规划阶段即将结束, 项目经理正在筹备开工会议。 项目经理担心不能召集几个非常重要的相关方参加这个会议, 他应该向谁求助?( )
A. 项目发起人
B. 团队成员
C. 客户
D. 职能经理
【单选题】
项目团队想要采用世界一流的做法来引导重要相关方大力支持项目。 项目团队可以用以下哪个技术来收集一流做法?( )
A. 文献检索
B. 图书馆服务
C. 专家判断
D. 标杆对照
【单选题】
某个相关方的参与程度没有达到要求。 项目经理应该通过以下哪个来解决这个问题? ( )
A. 不让该相关方再参与项目
B. 修改相关方参与计划
C. 备选方案分析
D. 修改项目管理计划
【单选题】
某相关方的当前参与程度分类为抵制型, 项目需要其参与程度为支持型, 项目管理团队正在策划如何把他的参与程度提高到项目所需的程度上来。 这是在进行 ( )。
A. 识别相关方过程
B. 管理相关方参与过程
C. 规划相关方参与过程
D. 监督相关方参与过程
【单选题】
用三维模型来呈现项目相关方的权力、 影响和作用, 能更加直观地呈现分析结果,这是哪种分类方法? ( )
A. 凸显模型
B. 影响方向
C. 相关方立方体
D. 权力影响作用方格
【单选题】
下面何种情况下由前APU燃油泵和隔离活门为APU供油:___
A. 地面上两分钟后
B. 飞行中低于FL255时
C. 飞行中高于FL255,当调整油箱已空
D. 以上A+B+C
【单选题】
APU主电门选择在ON位时:___
A. ON亮蓝色,APU系统被供电且APU在95%时起动,AVAILA亮
B. ON亮蓝色,APU系统被供电,只要起动按钮按下且进气门打开,APU即起动
【单选题】
当后APU泵向APU供油时:___
A. 前APU泵不工作,APU隔离活门关闭
B. 前APU泵工作,APU隔离活门关闭,
C. 前APU泵不工作,APU隔离活门打开
D. 前APU泵工作,APU隔离活门打开
【单选题】
ECAM状态显示上的APU排气温度最大值:___
A. 起动时为715度,APU运行温度为650度
B. 起动时为1250度,APU运行时为650度
C. 起动时为715度,APU运行时为625度,
D. 起动时为1250,APU运行时为625
【单选题】
除了驾驶舱APU面板上的开关外,APU还可用下列哪项关断:___
A. 加油/卸油面板上的APU紧急关断按钮
B. 按下APU灭火按钮
C. 按下外部内话面板上的APU关断按钮
D. 以上A,B和C均可
【单选题】
当APU主电门关断时,APU正常关车在何时发生:___
A. APU以100%转速继续降温运行100秒后,另外运行15秒,APU关断
B. APU以100%转速继续降温运行105秒后,另外运行15秒,APU关断
C. APU以100%转速继续降温运行100秒后,APU关断
D. APU以100%转速继续降温运行105秒后,APU关断
【单选题】
下列陈述哪一句正确?___
A. APU自动关车只会发生在地面
B. APU只能从驾驶舱内关车
C. APU只会在探测到火警时,才会自动关车
D. 如果在加油/卸油面板上的APU紧急关车按钮被按压,APU将会紧急关车
【单选题】
如果你发现APU火警,下面哪一句陈述是正确的:___
A. 在空中,APU将会紧急关车并且APU灭火瓶会自动释放
B. 在地面,你必须完成ECAM动作,从驾驶舱中将APU中关断
C. 在地面,APU将会自动关车,但你必须人工释放灭火瓶
D. 在地面,APU将会紧急关车并且APU灭火瓶将会自动释放
推荐试题
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface