In this blog post, I’m going to provide you with 100 free PMI-RMP exam sample questions.
Most of these questions are definition-based and well suited for you to try during your studies to check your progress. The questions are comparatively easier than the real PMI-RMP exam questions.
All these questions are based on the fifth edition of the PMBOK Guide and aligned with the latest exam format.
I have also included a PMBOK reference for most of the questions. Please refer to the PMBOK Guide every time when you see the reference, it will help you understand the PMBOK Guide better.
It is my hope that these questions will help you identify and fill your knowledge gaps.
Question: 1
Which of the following is not a part of the risk register?
(a) Identified Risks
(b) List of Stakeholders
(c) Low Value Risks
(d) All of the above
Question: 2
Which of the following is not one of the three estimates used in PERT?
(a) Optimistic Estimate
(b) Pessimistic Estimate
(c) Probabilistic Estimate
(d) Most Likely Estimate
Question: 3
Which of the following is an output of the Identify Risks process?
(a) Watch List
(b) High Impact Risks
(c) Low Impact Lists
(d) Risk Register
Question: 4
You are collecting risks using various techniques. Which of the following techniques will you not use in this process?
(a) Checklist Analysis
(b) Earned Value Management
(c) SWOT Technique
(d) Assumption Analysis
Question: 5
In resource smoothing:
(a) Start and finish dates are adjusted based on resource constraints
(b) Critical path changes
(c) The critical path does not change
(d) Project completion date changes
Question: 6
Which of the following is an example of force majeure?
(a) A very high impact risk
(b) Unidentified risk
(c) Natural calamity
(d) Non-important risks
Question: 7
In which process do you create the plan to manage risks?
(a) Plan Risk Management
(b) Control Risks
(c) Plan Risk Responses
(d) Identify Risks
Question: 8
Which of the following is a correct statement?
(a) Crashing increases risks
(b) Fast-tracking increases risks
(c) Crashing reduces risks
(d) Fast-tracking increases cost
Question: 9
In which contract does the seller bear the risk?
(a) Time and Material
(b) Cost Plus Award Fee
(c) Firm Fixed Price
(d) Cost Plus Fixed Fee
Question: 10
Which of the following is not a knowledge area in the PMBOK Guide?
(a) Time
(b) Budget
(c) Quality
(d) Risk
Question: 11
During which phase is risk highest?
(a) Closing
(b) Planning
(c) Executing
(d) Initiating
Question: 12
You want to review lessons learned for past projects. Where will you look for them?
(a) Enterprise Environment Factor
(b) Old Contract Document
(c) Project Plan
(d) Organizational Process Assets
Question: 13
Which of the following is not true about the risk register?
(a) No changes are allowed in the risk register once it is approved
(b) It is developed during the Identify Risks process
(c) It contains a list of identified risks
(d) All of the above
Question: 14
A risk that is an outcome of a response of a previously identified risk is known as a:
(a) Primary Risk
(b) Secondary Risk
(c) Residual Risk
(d) Unidentified Risk
Question: 15
Which is the correct PERT formula?
(a) (Optimistic + Most likely + Pessimist)/6
(b) (Optimistic + Most likely + Pessimist)/3
(c) (Optimistic + 4*Most likely + Pessimist)/3
(d) (Optimistic + 4*Most likely + Pessimist)/6
Question: 16
Which strategy can’t be used with positive risks?
(a) Enhance
(b) Exploit
(c) Accept
(d) Mitigate
Question: 17
Which statement is true about the issue log?
(a) It monitors the resolution of the issues
(b) It contains a list of risks
(c) It has a list of problematic stakeholders
(d) All of the above
Question: 18
Which one is the least source of conflict in projects?
(a) Schedule Priority
(b) Low Salary
(c) Personal Work Style
(d) Scarce Resource
Question: 19
A risk that remains after the applying the response is known as a:
(a) Secondary Risk
(b) Primary Risk
(c) Residual Risk
(d) Unidentified Risk
Question: 20
A Pareto diagram:
(a) Is used to identify risks
(b) Is used in sensitivity analysis
(c) Explains the 80-20 principle
(d) Identifies the cause of the risk
Question: 21
A network diagram has more than one critical path. This means:
(a) More risks
(b) Fewer risks
(c) Budget may increase
(d) Time may increase
Question: 22
What is the risk breakdown structure?
(a) A classification of risks
(b) Types of risks
(c) A hierarchical representation of threats
(d) A hierarchical representation of risks
Question: 23
The contingency reserve is used to manage:
(a) Primary risks
(b) Secondary risks
(c) Residual risks
(d) All of the above
Question: 24
When is a project manager required to get permission to use the management reserve?
(a) It is up to the project manager
(b) Never
(c) Sometimes
(d) Always
Question: 25
In what kind of risk response strategy do you transfer the risk?
(a) Avoid
(b) Mitigate
(c) Insurance
(d) Share
Question: 26
Which of the following denotes unauthorized addition to the project scope to make the client happy?
(a) Scope Creep
(b) Gold Plating
(c) Crashing
(d) Fast Tracking
Question: 27
What are the triple constraints?
(a) Scope, Time, Cost
(b) Risk, Scope, Time
(c) Quality, Cost, Time
(d) Human Resource, Scope, Cost
Question: 28
Which need is on the lowest level of Maslow’s Hierarchy of Needs?
(a) Security
(b) Physiological
(c) Self Esteem
(d) Self Actualization
Question: 29
Which statement is true about the RACI chart?
(a) RACI stands for: Responsible, Accountant, Consult, and Inform
(b) RACI is an example of responsibility assignment matrix
(c) RACI charts connect risks to risk owner
(d) None of the above
Question: 30
In the Control Risks process, you do all except:
(a) Monitoring Triggers
(b) Ranking Risks
(c) Updating Risk Register
(d) All of the above
Question: 31
In which risk response strategy do you make sure that the risk is realized?
(a) Mitigate
(b) Enhance
(c) Accept
(d) Exploit
Question: 32
Which diagram has an S-curve shape?
(a) Bar Chart
(b) Ishikawa Diagram
(c) Scatter Diagram
(d) Cost Baseline
Question: 33
Which statement is true about the contingency reserve?
(a) It is a percentage of the cost of the project
(b) It is used for identified risks
(c) It is used for unidentified risks
(d) None of the above
Question: 34
Probability and impact matrix helps you in which of the following?
(a) Identifying Risks
(b) Analyzing Risks
(c) Ranking Risks
(d) Quantifying Risks
Question: 35
You want to see a particular responsibility assigned to each person. Where will you look for it?
(a) GANTT Chart
(b) Probability Impact Matrix
(c) Pareto Diagram
(d) RACI Chart
Question: 36
Which of the following is a network analysis technique?
(a) EVM
(b) EMV
(c) Delphi Technique
(d) CPM
Question: 37
During the project execution, an unidentified risk came up which may affect your project outcome. What will you do now?
(a) Create a workaround
(b) Develop a Risk Response Plan
(c) Inform management
(d) Inform the client
Question: 38
What accuracy is required in 5 Sigma?
(a) 69%
(b) 93.3%
(c) 99.977%
(d) 99.38%
Question: 39
In which risk response strategy do you go for the teaming agreement?
(a) Exploit
(b) Share
(c) Enhance
(d) Transfer
Question: 40
The goal of qualifying risks is:
(a) Identify risks
(b) Evaluate individual risk
(c) Determine the EMV
(d) All of the above
Question: 41
In a decision tree diagram, a circle represents:
(a) Decision
(b) Events
(c) Probability
(d) Impact
Question: 42
The indication that any risk is about to occur is known as:
(a) Risk Threshold
(b) Tolerance
(c) Risk Trigger
(d) None of the above
Question: 43
When do you perform the risk identification process?
(a) Throughout the project
(b) At the beginning of the project
(c) At the end of the project
(d) Before signing the project charter
Question: 44
Which is not a communication methods type?
(a) Interactive Communication
(b) Pull Communication
(c) Push Communication
(d) Aggressive Communication
Question: 45
Risk management includes all, except?
(a) Create WBS
(b) Identify risks
(c) Qualify risks
(d) Sensitivity Analysis
Question: 46
Which of the following is not a contract type?
(a) T&M
(b) CPIF
(c) Make or Buy
(d) FFP
Question: 47
Reducing the probability of a negative risk happening is known as:
(a) Risk Mitigation
(b) Risk Transfer
(c) Exploit
(d) Enhance
Question: 48
A person who prefers to avoid risk is known as:
(a) Risk Tolerant
(b) Risk Averse
(c) Risk Hater
(d) Risk Seeker
Question: 49
Some of your stakeholders are hesitating in helping you identify risks. Which technique will you use to get their output?
(a) Monte Carlo
(b) Delphi Technique
(c) Facilitated Workshop
(d) Interview
Question: 50
Your team is located in different geographic locations and you want to discuss some issues with all team members. Which communication tool will you use?
(a) Live Meeting
(b) Telephone
(c) War Room
(d) Internet
Question: 51
Which statement is not true about the decision tree method?
(a) It is a tool and technique of the Quantitative Risk Analysis process
(b) It helps choose the best option
(c) It helps in identifying risks
(d) It is an EMV technique
Question: 52
Who determines the size of the management reserve?
(a) The Project Manager
(b) Management
(c) Team Members
(d) Client
Question: 53
The risk register is created in the Identifying Risks process, and then it is continuously updated. Which of the following is not updated during the Qualitative Risk Analysis process?
(a) Risk prioritization
(b) New risks
(c) Response plan for risks
(d) None of the above
Question: 54
Which risk response strategy will utilize the contingency reserve?
(a) Enhance
(b) Exploit
(c) Mitigate
(d) Share
Question: 55
In which phase will the project experience most of the identified risks?
(a) Initiation
(b) Planning
(c) Execution
(d) Closing
Question: 56
To whom should you send the Performance Reports?
(a) Everyone
(b) Client
(c) As mentioned in the communication plan
(d) Team members
Question: 57
Sending information from one place to another place is known as:
(a) Transmit Message
(b) Noise
(c) Feedback
(d) Medium
Question: 58
In which format will you ask your client to submit change requests?
(a) Verbal
(b) Written
(c) Formal Written
(d) On Phone
Question: 59
You discover a risk that a team member may suffer an accident if you allow the project to continue. What would be your next step?
(a) Remove the team member
(b) Analyze the risk
(c) Stop the concerning activity
(d) Inform management
Question: 60
Your management told you that if you complete the project before two months, you can bid for a new project. You do everything you are capable of completing the project ahead of time so that you can get the new project. What kind of response strategy are you using here?
(a) Enhance
(b) Exploit
(c) Accept
(d) Mitigate
Question: 61
In your team, there are 15 members including you. How many lines of communications are there?
(a) 105
(b) 120
(c) 60
(d) 210
Question: 62
In your team, five members report to you. Later on, three more members are added. What is the increase in communication lines?
(a) 42
(b) 21
(c) 18
(d) 36
Question: 63
Which is an example of active listening?
(a) Making eye contact
(b) Rubbing your nose
(c) Reading an SMS
(d) Feeling sleepy
Question: 64
Your team member informs you that a particular piece of equipment may malfunction during the peak of its usage. You told him to do nothing, and you decide to manage it once the equipment fails. What kind of strategy is this?
(a) Avoid
(b) Accept
(c) Exploit
(d) Mitigate
Question: 65
Which one is a root cause analysis tool?
(a) Fishikawa Diagram
(b) Monte Carlo Simulation
(c) Bar Chart
(d) Pareto Diagram
Question: 66
To get risks from a few important stakeholders, you approach them individually and ask questions. Which technique are you using here?
(a) Brainstorming
(b) Facilitated Workshop
(c) Interview
(d) Delphi
Question: 67
There is a 30% chance that a certain piece of equipment may fail, which may cost you 500 USD. Find the expected monetary value for this event.
(a) 150
(b) 500
(c) 1500
(d) 60
Question: 68
Which statement is not true about the risk register?
(a) It should include both positive and negative risks
(b) It should not include positive risks
(c) It should include low impact risks
(d) It should always be updated
Question: 69
In which process do you select the seller?
(a) Plan Procurement Management
(b) Conduct Procurements
(c) Control Procurements
(d) Close Procurements
Question: 70
A stakeholder has a bad reputation for requesting many changes. How will you manage this stakeholder?
(a) Ignore him
(b) Involve him from the beginning of the project
(c) Flatly deny all of his requests
(d) Speak with management
Question: 71
Your team member told you that if you rent some equipment a little earlier than planned, you will save some money. What will be your next step?
(a) You will follow his advice
(b) You will reject the suggestion
(c) You will review it further
(d) You’ll inform management
Question: 72
You raise a change request to approve changes in the schedule baseline. Which form of communication is it?
(a) Informal Written
(b) Formal Written
(c) Written
(d) Para-lingual
Question: 73
During risk analysis, you come to the conclusion that a particular risk has a remote chance of occurring. Even if it occurs, there will be very little impact on any project parameter. What will you do with this risk?
(a) You will ignore it
(b) You will further analyze it
(c) You will keep it on the watch list
(d) None of the above
Question: 74
According to Herzberg’s Hygiene theory, which is a motivating factor?
(a) Salary
(b) Good working condition
(c) Relationship with Boss
(d) Career growth
Question: 75
Which of the following risk response strategies can be used for negative and positive risks?
(a) Accept
(b) Mitigate
(c) Enhance
(d) Exploit
Question: 76
In which project process do you identify the project risks?
(a) Initiating and Planning
(b) Initiating, Planning, and Executing
(c) Initiating, Planning, and Monitoring & Controlling
(d) All phases
Question: 77
Usually, which risk management process is avoided for low cost and non-important projects?
(a) Perform Qualitative Risk Analysis
(b) Perform Quantitative Risk Analysis
(c) Control Risks
(d) Plan Risk Responses
Question: 78
While reviewing the project scope, you notice that a part of the project is beyond your capability. Then your team suggests you assign this work to any contractor who is a specialist in it. What kind of risk response strategy is it?
(a) Share
(b) Enhance
(c) Transfer
(d) Avoid
Question: 79
Which of the following strategies cannot be used with negative risks?
(a) Transfer
(b) Avoid
(c) Mitigate
(d) Exploit
Question: 80
According to the PMBOK Guide 5th Edition, how many risk response strategies are available to manage risks?
(a) 7
(b) 5
(c) 4
(d) 3
Question: 81
A joint venture is an example of which kind of risk response strategy?
(a) Exploit
(b) Share
(c) Transfer
(d) Enhance
Question: 82
During the execution phase of the project, you discover a risk that was not previously identified. What will your next step be?
(a) Note it to the risk register and analyze it
(b) Ignore it
(c) Create a workaround
(d) Create a response plan
Question: 83
In a decision tree diagram, a square or rectangle represents:
(a) Decisions
(b) Events
(c) Probability
(d) Impact
Question: 84
In which project process do you identify the project stakeholders?
(a) Initiating and Planning
(b) Initiating, Planning, and Executing
(c) Initiating, Planning, and Monitoring & Controlling
(d) All phases
Question: 85
In which process do you define the risk categories?
(a) Identify Risks
(b) Plan Risk Management
(c) Perform Qualitative Risk Analysis
(d) Plan Risk Responses
Question: 86
The project budget consists of:
(a) Cost baseline plus management reserve
(b) Cost baseline plus contingency reserve
(c) Cost baseline plus activity contingency reserve
(d) Control account plus contingency reserve
Question: 87
You are in the risk qualifying process and qualifying risks. Considering the low-risk tolerance level of your stakeholders, which of the following statements is true?
(a) As the risk tolerance is high, you will have fewer risks on the watch list
(b) As the risk tolerance is high, you will have more risks on the watchlist
(c) As tolerance is high, there will be no watchlist
(d) There is no impact on the watchlist
Question: 88
What kind of probability distribution curve has an only minimum and maximum values?
(a) Beta
(b) Triangular
(c) Uniform
(d) Traditional
Question: 89
In which of the following cases will you have the largest number of risks?
(a) If your stakeholders are risk-averse
(b) If your stakeholders are risk seekers
(c) If your stakeholders are risk-neutral
(d) If the risk attitude of stakeholders is high
Question: 90
In which of the following process do you analyze stakeholders’ risk attitude?
(a) Plan risk management
(b) Plan risk response
(c) Perform qualitative risk analysis
(d) Perform quantitative risk analysis
Question: 91
Which of the following risk evaluation techniques can be used to analyze and demonstrate causal relationships in high-risk scenarios?
(a) Tornado Analysis
(b) Monte Carlo
(c) Bowtie
(d) AHP
Question: 92
While implementing a risk response plan, a secondary risk comes up which you did not identify earlier. How will you manage it?
(a) Using an accept risk response strategy
(b) Using a mitigation risk response strategy
(c) Using an avoid risk response strategy
(d) Through a workaround
Question: 93
An identified risk occurred and you successfully managed it. However due to this response, another risk was generated and you have to manage it immediately, otherwise, it will impact your project objective severely. What will your next step be?
(a) Develop a response plan and implement it
(b) Develop a response plan, get permission to use the management reserve, and implement the response
(c) Develop a contingency response plan and implement it
(d) As the risk can severely impact your project objective, try to avoid it
Question: 94
Which of the following statements is true about risks?
(a) Risks are highest during the execution phase
(b) Risks are highest when the project nears the end
(c) Risks are highest when the project starts
(d) Risks remain constant during the whole project life cycle
Question: 95
You are in an African country and identifying risks for your project. Your team members identify a risk that during a particular time there is a 3% probability of rain. As the probability of this risk is low, you only ask team members to set a contingency reserve for this risk. What risk response strategy is this?
(a) Accept
(b) Mitigate
(c) Avoid
(d) Enhance
Question: 96
You are in an African country and identifying risks for your project. Your team members identify a risk that during a particular time there is a 3% probability of rain. As the probability of this risk is low, you ask team members to note down this risk and do nothing. What risk response strategy is this?
(a) Avoid
(b) Mitigate
(c) Accept
(d) Enhance
Question: 97
There is a risk of equipment failure and you have identified another piece of equipment to replace it if it fails. However, there is a chance that this equipment may not perform as well as the original equipment. What kind of risk is this?
(a) Known risk
(b) Secondary risk
(c) Unknown risk
(d) Residual risk
Question: 98
After analyzing the risks and developing the risk response plan, which technique helps you see if the overall project risks have decreased?
(a) EMV
(b) Latin Hypercube
(c) Tornado Analysis
(d) EVM
Question: 99
How is the nominal group technique different from the Delphi technique?
(a) An open discussion is conducted in the nominal group technique, while in Delphi you ask questions anonymously
(b) An open discussion is conducted in the Delphi technique, while in the nominal group technique you ask questions anonymously
(c) In the nominal group technique, after a discussion voting takes place to rank opinions, while in Delphi a moderator collects opinions anonymously and compiles them
(d) Both are the same except Delphi is anonymous
Question: 100
How is an affinity diagram different from the brainstorming technique?
(a) Both categorize risks, however, an affinity diagram uses a diagram and brainstorming uses slips
(b) Brainstorming categorizes risks while an affinity diagram prioritizes them
(c) Both prioritize risks but brainstorming uses a voting system
(d) Brainstorming prioritizes risks while an affinity diagram categorizes them
Answers
Answer-1: b
Explanation: The list of stakeholders is recorded in the stakeholder register, not in the risk register.
***
Answer-2: c
Explanation: Probabilistic Estimate is not an estimate which is used in the PERT formula.
Reference: The PMBOK Guide 5th Edition, Page: 170
***
Answer-3: d
Explanation: The risk register is the only output of the Identify Risks Process.
Reference: The PMBOK Guide 5th Edition, Page: 319
***
Answer-4: b
Explanation: Earned Value Management is a technique of the Control Costs process.
Reference: The PMBOK Guide 5th Edition, Page: 215
***
Answer-5: c
Explanation: In resource smoothing, activities are allowed to be delayed within their free and total float; therefore the critical path does not change here.
Reference: The PMBOK Guide 5th Edition, Page: 180
***
Answer-6: c
Explanation: Natural calamity (such as flood or earthquake) is an example of force majeure because you cannot control it.
***
Answer-7: c
Explanation: In the Plan Risk Responses process you create the plan to manage the identified risks.
Reference: The PMBOK Guide 5th Edition, Page: 342
***
Answer-8: b
Explanation: Fast-tracking increases the risks and the crashing technique increases the cost. Although the crashing process also increases the risks, it is less risky than fast-tracking.
Reference: The PMBOK Guide 5th Edition, Page: 181
***
Answer-9: c
Explanation: In a firm-fixed-price contract the price is fixed, and if the cost escalates it has to be borne by the seller. This type of contract should be used when you have a very well defined scope of work. Please note that if the work is not clearly defined, the buyer may have to bear the burden.
Reference: The PMBOK Guide 5th Edition, Page: 363
***
Answer-10: b
Explanation: Budget is included in the Cost Management Knowledge area; the budget itself is not a knowledge area.
***
Answer-11: d
Explanation: During the initiation phase risk is higher because there is less clarity on everything. However, as the project progresses, the risk goes down gradually.
***
Answer-12: d
Explanation: Lessons learned are a part of the organizational process assets.
Reference: The PMBOK Guide 5th Edition, Page: 27
***
Answer-13: a
Explanation: The risk register is developed during the Identify Risks process and then it is updated continuously throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 319
***
Answer-14: b
Explanation: Secondary risks are risks that may come up as a result of implementing the response of any identified risk.
Reference: The PMBOK Guide 5th Edition, Page: 343
***
Answer-15: d
Explanation: The correct PERT formula is:
PERT= (Optimistic + 4*Most-likely + Pessimist)/6
Reference: The PMBOK Guide 5th Edition, Page: 171
***
Answer-16: d
Explanation: Mitigate is a negative risk response strategy that cannot be used with positive risks. Exploit, Accept, and Enhance are positive risk response strategies.
Reference: The PMBOK Guide 5th Edition, Page: 344
***
Answer-17: a
Explanation: An issue log is used to monitor the resolution of issues.
Reference: The PMBOK Guide 5th Edition, Page: 305
***
Answer-18: b
Explanation: Schedule priority, scarce resource, and personal work style are the main reasons for conflicts in projects. A low salary is not a source of conflict.
Reference: The PMBOK Guide 5th Edition, Page: 282
***
Answer-19: c
Explanation: Residual risk is a risk that remains after implementing the response plan.
Reference: The PMBOK Guide 5th Edition, Page: 558
***
Answer-20: c
Explanation: A Pareto diagram is also known as an 80-20 principle. According to Pareto, 80% of problems are caused by 20% of sources.
***
Answer-21: a
Explanation: If a network diagram has more than one critical path, this means you will have to manage two paths, i.e. more risks.
***
Answer-22: d
Explanation: In the risk breakdown structure you can breakdown the risks according to their category; it is a hierarchical representation of risks.
Reference: The PMBOK Guide 5th Edition, Page: 560
***
Answer-23: d
Explanation: The contingency reserve is used to manage the identified risks. All risks given in the questions are identified risks.
Reference: The PMBOK Guide 5th Edition, Page: 310
***
Answer-24: d
Explanation: The project manager cannot use the management reserve without permission from the management; he always needs permission to use the management reserve.
***
Answer-25: c
Explanation: In the insurance risk response strategy you transfer the risk to a third party. Please note that transferring does not mean that the risk has been eliminated. By transferring a risk, you are transferring responsibility to a third party to manage this risk if it occurs.
Reference: The PMBOK Guide 5th Edition, Page: 344
***
Answer-26: b
Explanation: In gold plating, team members add functions to make the client happy, although it is not included in the scope. Scope creep refers to the uncontrolled changes to the scope. Please note that in scope creep team members do not add anything to the scope willingly. Crashing and fast-tracking are schedule compression techniques.
***
Answer-27: a
Explanation: Scope, time, and cost are collectively known as the triple constraints.
***
Answer-28: b
Explanation: Physiological needs are the lowest on Maslow’s Hierarchy of Needs. One must fulfill his physiological needs before going for higher needs.
***
Answer-29: b
Explanation: RACI matrix is a kind of responsibility assignment matrix where you can see the relation of activity with the team members.
Reference: The PMBOK Guide 5th Edition, Page: 262
***
Answer-30: b
Explanation: Risk ranking is performed under the Perform Qualitative Risk Analysis process.
Reference: The PMBOK Guide 5th Edition, Page: 328
***
Answer-31: d
Explanation: In the exploit risk response strategy, you make sure that the risk is realized. However, in enhance you only try to realize the opportunity.
Reference: The PMBOK Guide 5th Edition, Page: 345
***
Answer-32: d
Explanation: The cost baseline curve is also known as an S-Curve because initially the cost is low and it gradually increases, and as the project ends, the cost again goes down.
Reference: The PMBOK Guide 5th Edition, Page: 214
***
Answer-33: b
Explanation: The contingency reserve is used to manage identified risks.
Reference: The PMBOK Guide 5th Edition, Page: 310
***
Answer-34: c
Explanation: Probability and impact matrix is a tool and technique of the Perform Qualitative Risk analysis process; it helps you in ranking the identified risks.
Reference: The PMBOK Guide 5th Edition, Page: 331
***
Answer-35: d
Explanation: The RACI chart is a kind of responsibility assignment matrix (RAM) where you can see the resources assigned to work package or activity. The RACI chart means: Responsible, Accountable, Consult, and Inform. On the RACI chart, you can see the accountability of the person for any activity.
Reference: The PMBOK Guide 5th Edition, Page: 262
***
Answer-36: d
Explanation: CPM stands for the Critical Path Method, which is a network analysis technique.
***
Answer-37: a
Explanation: If any unidentified risk occurs, you will manage it through the workaround.
Reference: The PMBOK Guide 5th Edition, Page: 353
***
Answer-38: c
Explanation: In 5 Sigma 99.977% accuracy is desired.
***
Answer-39: b
Explanation: You go for the teaming agreement with another company when you see a big opportunity, and you alone are not capable of realizing it. In sharing the risk response strategy, you team up with another company or go for a joint venture to realize the opportunity.
Reference: The PMBOK Guide 5th Edition, Page: 346
***
Answer-40: b
Explanation: In risk qualification, you review each risk for its probability and impact on the project objectives.
Reference: The PMBOK Guide 5th Edition, Page: 328
***
Answer-41: b
Explanation: In a decision tree diagram, a circle represents events, and a rectangle or square represents a decision.
***
Answer-42: c
Explanation: Risk triggers, which are sometimes known as risk symptoms, are a warning sign that a risk is about to occur.
***
Answer-43: a
Explanation: Risk identification is an ongoing process, so you will identify risks throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 321
***
Answer-44: d
Explanation: Aggressive communication is a made-up word; the rest are types of communication methods.
Reference: The PMBOK Guide 5th Edition, Page: 295
***
Answer-45: a
Explanation: Create WBS is a Scope Management process. WBS stands for work breakdown structure, which is a hierarchical decomposition of the project work.
Reference: The PMBOK Guide 5th Edition, Page: 125
***
Answer-46: c
Explanation: Make or Buy is a decision which you have to make during the procurement management plan. Here you will decide whether you should procure a particular task or if you should do it on your own.
Reference: The PMBOK Guide 5th Edition, Page: 363, 364, 365
***
Answer-47: a
Explanation: In risk mitigation, you try to reduce the probability of happening the risk or its impact. In risk transfer, you transfer the responsibility to a third party. Exploit and enhance are positive risk response strategies.
Reference: The PMBOK Guide 5th Edition, Page: 345
***
Answer-48: b
Explanation: A risk-averse person or organization is not comfortable with digesting risks. They are not very creative or supportive towards risks. They usually try to avoid risks unless the reward to take on the risks is high enough to outweigh the aversion of the risk.
***
Answer-49: b
Explanation: In this case you will use the Delphi Technique, because this technique collects responses anonymously.
Reference: The PMBOK Guide 5th Edition, Page: 324
***
Answer-50: d
Explanation: With the use of the internet, you can communicate with several people simultaneously located in different geographic locations. You cannot use a live meeting or war room because team members are located in different places. Telephone communication will be a mess if you make a conference call with all team members.
***
Answer-51: c
Explanation: Decision tree analysis helps you in all mentioned options except identifying risks.
Reference: The PMBOK Guide 5th Edition, Page: 339
***
Answer-52: b
Explanation: The size of the management reserve is determined by the management. Usually it lies between 5% and 10%.
***
Answer-53: c
Explanation: Risk responses are determined in the Plan Risk Responses process, and then they are updated in the risk register.
Reference: The PMBOK Guide 5th Edition, Page: 342
***
Answer-54: c
Explanation: In enhance, exploit and share risk response strategies, no reserve is needed because they are positive risk response strategies which do not require the use of any reserve. However, the mitigation technique requires the use of the contingency reserve because here you are managing negative risks.
***
Answer-55: c
Explanation: In the execution phase you will carry out the work-related activities, and therefore, most of the identified risk will be faced in this phase.
***
Answer-56: c
Explanation: Performance reports will be sent to the stakeholders you have decided on during the Plan Communication Management process.
Reference: The PMBOK Guide 5th Edition, Page: 296
***
Answer-57: a
Explanation: Sending information from one place to another is known as transmit message.
Reference: The PMBOK Guide 5th Edition, Page: 293
***
Answer-58: c
Explanation: Change requests must always be formally written.
***
Answer-59: b
Explanation: First of all you analyze the risk. It is also possible that the probability of this risk happening is too low. Once you qualify the risk, you will proceed with the next action based on your risk analysis.
***
Answer-60: b
Explanation: In exploit risk response strategies, you do everything to ensure that the opportunity is realized. Please note that in enhance you also try to realize the opportunity but you do not ensure that opportunity is realized.
Reference: The PMBOK Guide 5th Edition, Page: 345
***
Answer-61: a
Explanation: Communication Channel = n*(n-1)/2, (where n is the number of members)
=15(15-1)/2 = 105
Reference: The PMBOK Guide 5th Edition, Page: 292
***
Answer-62: b
Explanation: Communication channel= 6(6-1)/2= 15
New communication channel = 9(9-1)/2=36
New communication channel = 36-15=21
Reference: The PMBOK Guide 5th Edition, Page: 292
***
Answer-63: a
Explanation: Making eye contact and repeating the sentence are examples of active listening.
***
Answer-64: b
Explanation: This is an example of accept risk response strategy where you simply accept the risk and do nothing except note it down.
Reference: The PMBOK Guide 5th Edition, Page: 345
***
Answer-65: a
Explanation: Fishikawa diagram is also known as a Fishbone diagram, Ishikawa diagram, and root cause analysis diagram.
Reference: The PMBOK Guide 5th Edition, Page: 236
***
Answer-66: c
Explanation: In interview you approach individual stakeholders and ask questions to get their output.
***
Answer-67: a
Explanation: Expected Monetary Value = Probability * Impact
EMV = 0.3*500
= 150
***
Answer-68: b
Explanation: The risk register includes all risks regardless of whether they positive or negative, and it is continuously updated throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 327
***
Answer-69: b
Explanation: In the Conduct Procurements process, you select the seller.
Reference: The PMBOK Guide 5th Edition, Page: 371
***
Answer-70: b
Explanation: If you have a stakeholder who requests many changes, involve him from the start of the project so that he can agree with and be aware of everything going on in the project.
***
Answer-71: c
Explanation: Of course you will analyze the suggestion before reaching any conclusion. You cannot take action on any advice unless you review the request and analyze its impact on any other project objective or parameters.
***
Answer-72: b
Explanation: This is an official formal request which must be sent in a formal written form of communication. Change request is always a formal written communication.
***
Answer-73: c
Explanation: Low-priority risks are kept on the watch list for future monitoring. You cannot ignore any low-rated risk because you never know when it may become a high-ranking risk.
Reference: The PMBOK Guide 5th Edition, Page: 330
***
Answer-74: d
Explanation: Salary, working conditions, and a good relationship with the boss are important but they are not a motivating factor. They don’t motivate you to work harder. Career growth is a motivating factor which encourages you to perform better and prove yourself.
***
Answer-75: a
Explanation: Accept risk response strategy can be used with both types of risks.
Reference: The PMBOK Guide 5th Edition, Page: 344
***
Answer-76: d
Explanation: Risk identification is an iterative process; therefore, risks will be identified throughout the project.
Reference: The PMBOK Guide 5th Edition, Page: 321
***
Answer-77: b
Explanation: The Perform Quantitative Risk Analysis is a complex and time-consuming process, usually performed on large and complex projects, and ignored on low-cost non-important projects.
***
Answer-78: c
Explanation: Since you are giving this task to another party, it is a transfer risk response strategy.
***
Answer-79: d
Explanation: Exploit is a positive risk response strategy where you ensure that the risk is realized.
***
Answer-80: a
Explanation: The three strategies for negative risks are: avoid, transfer, and mitigate. The three strategies for positive risks are: exploit, enhance, and share. The last strategy is “accept,” which can be used with both types of risks.
***
Answer-81: b
Explanation: In a joint venture, you team with another company to share the opportunity. This is an example of a share risk response strategy.
Reference: The PMBOK Guide 5th Edition, Page: 346
***
Answer-82: a
Explanation: Risk identification is an ongoing process; you will identify them throughout the project. However, as you identify a new risk, you will note it down in the risk register and analyze it for the next action.
***
Answer-83: a
Explanation: In a decision tree diagram, a rectangle or square represents a decision and a circle represents events.
***
Answer-84: d
Explanation: Stakeholder identification is an iterative process, and hence it will be performed throughout the project.
***
Answer-85: b
Explanation: Risk categories, definitions of risk probability and impact, methodologies, etc. are determined in the Plan Risk Management Process.
Reference: The PMBOK Guide 5th Edition, Page: 317
***
Answer-86: a
Explanation: The project budget consists of the cost baseline and management reserve. The cost baseline consists of the work package cost estimate plus contingency reserve.
Reference: The PMBOK Guide 5th Edition, Page: 213
***
Answer-87: a
Explanation: As the risk tolerance is low for your stakeholders, they are risk-averse and in this case, you will have fewer risks on the watch list.
***
Answer-88: c
Explanation: This is a property of a uniform distribution where you have two values: maximum and minimum.
***
Answer-89: b
Explanation: If your stakeholders are risk seekers, this means they will want to manage even a small risk to avoid issues with the project. In this case, the number of risks will be higher.
***
Answer-90: a
Explanation: Risk attitude, probability, and impact definitions are determined in the plan risk management process.
***
Answer-91: c
Explanation: Bowtie method helps you analyze and demonstrate causal relationships in high-risk scenarios.
***
Answer-92: d
Explanation: If any unidentified risk occurs, you will manage it through a workaround.
***
Answer-93: b
Explanation: As this is an unidentified risk, you will manage it with the management reserve. To use the management reserve, you need the management’s approval.
***
Answer-94: c
Explanation: When the project starts there is the greatest potential for risks. This goes down as the project progresses.
***
Answer-95: a
Explanation: This is an example of an active accept risk response strategy where you are keeping a contingency reserve to manage the risk if it occurs.
***
Answer-96: c
Explanation: This is an example of a passive accept risk response strategy where you are doing nothing except acknowledging the risk.
***
Answer-97: d
Explanation: A risk that remains after even applying the risk response strategy is known as a residual risk.
***
Answer-98: b
Explanation: Monte Carlo and Latin Hypercube techniques let you know if the overall project risk has been reduced or not after developing the risk response strategies.
***
Answer-99: c
Explanation: In the nominal group technique, after a discussion, you vote to rank the ideas for further discussion. In Delphi, you send a questionnaire to stakeholders anonymously so they can give their input without any fear.
***
Answer-100: d
Explanation: In an affinity diagram you categorize risks while brainstorming is used to rank the ideas through group discussion.
***
This concludes the 100 free PMI-RMP exam sample questions. If you have any doubt about any questions you can post them through the comments section, and I’ll reply to all concerns regarding the questions.
If you have any suggestions or want to add any good quality questions, post them in the comment section or mail me at [email protected], I will review them and add them here if appropriate.
To check your readiness for the real PMI-RMP exam, be sure to attempt my PMI-RMP Question Bank and PMI-RMP Mock Test, available at the following given links:
I am Mohammad Fahad Usmani, B.E. PMP, PMI-RMP. I have been blogging on project management topics since 2011. To date, thousands of professionals have passed the PMP exam using my resources.
i have to write RMP exam next month . Please suggest best question bank for preparation.
Thanks alot
You are welcome, William.
Great explanations that train you to think the PMP way!
Thank you, Albert.
Thank you for sharing! This is extremely useful. It has helped me to understand better the concepts and realize my mistakes.
You are welcome Andrea.
Very appreciated efforts dear Fahad. In fact I did not use them yet but I will definitely benefit a lot of these sample questions.
Hi
this bank helped me a lot. I m preparing for RMP
do you have some exercises relating to P20,P50 on monte carlo simulation graph. Also latin hypercube
thanks in advance
You can find some similar question in my PMI-RMP Question Bank.
Excellent check on my knowledge and learning for the RMP exam. I appreciate your reference back to the PMBOK v5
Thanks Sheryl for you comment.
Thanks you very much! It helps me a lot.
Regards
You are welcome Guillermo.
do you have question bank for CAPM ?
No, I don’t have any question bank on CAPM.
Very nice effort
Thanks Asad.
I wish to point out that question no. 87 should be posed differently: answer is correct, only if you refer to stakeholders LOW risk tolerance. Low tolerance stakeholders are risk averse, not viceversa.
Anyway, thank you very much for this valuable resource.
Stefano
Corrected.
This is so helpful and I am so greatful for your blog. It really helps me in studying for the exam.
Thanks Hanna for you comment and I am glad that I could be of some help to you.