You work as a project manager for TechSoft Inc. You are working with the project stakeholders on the
qualitative risk analysis process in your project. You have used all the tools to the qualitative risk analysis
process in your project. Which of the following techniques is NOT used as a tool in qualitative risk analysis
process?
After applying several risk identification techniques, the risk manager is ready to document project risks in the
risk register, including risk name, risk statement, probability of occurring, and potential impact. After this
information is complete, who is best suited to serve as risk owners?
When analyzing the reward system in a company, there is evidence that “fire-fighter behavior” is the highest
rewarded behavior. It suggests that people are dealing with major problems primarily in an emergency mode,
and deploying quickly. Secondly, those who work efficiently are getting the most attention and recognition for
their efforts.
What impact does this observation potentially have on the risk management process?
A stakeholder is asked to approve additional funding to implement a risk response plan. However, the
stakeholder is unsure of the amount that could be approved without escalation.
Where should the stakeholder look to determine the amount that can be approved?