Free PMI RMP Exam Sample Questions

In this blog post, I’m going to provide you with 100 free PMI-RMP exam sample questions.

Most of these questions are definition-based and well suited for you to try during your studies to check your progress. The questions are comparatively easier than the real PMI-RMP exam questions.

All these questions are based on the fifth edition of the PMBOK Guide and aligned with the latest exam format.

I have also included a PMBOK reference for most of the questions. Please refer to the PMBOK Guide every time when you see the reference, it will help you understand the PMBOK Guide better.

It is my hope that these questions will help you identify and fill your knowledge gaps.


Question: 1

Which of the following is not a part of the risk register?
(a) Identified Risks
(b) List of Stakeholders
(c) Low Value Risks
(d) All of the above

Go to the Answer

Question: 2

Which of the following is not one of the three estimates used in PERT?
(a) Optimistic Estimate
(b) Pessimistic Estimate
(c) Probabilistic Estimate
(d) Most Likely Estimate

Go to the Answer

Question: 3

Which of the following is an output of the Identify Risks process?
(a) Watch List
(b) High Impact Risks
(c) Low Impact Lists
(d) Risk Register

Go to the Answer

Question: 4

You are collecting risks using various techniques. Which of the following techniques will you not use in this process?
(a) Checklist Analysis
(b) Earned Value Management
(c) SWOT Technique
(d) Assumption Analysis

Go to the Answer

Question: 5

In resource smoothing:
(a) Start and finish dates are adjusted based on resource constraints
(b) Critical path changes
(c) The critical path does not change
(d) Project completion date changes

Go to the Answer

Question: 6

Which of the following is an example of force majeure?
(a) A very high impact risk
(b) Unidentified risk
(c) Natural calamity
(d) Non-important risks

Go to the Answer

Question: 7

In which process do you create the plan to manage risks?
(a) Plan Risk Management
(b) Control Risks
(c) Plan Risk Responses
(d) Identify Risks

Go to the Answer

Question: 8

Which of the following is a correct statement?
(a) Crashing increases risks
(b) Fast-tracking increases risks
(c) Crashing reduces risks
(d) Fast-tracking increases cost

Go to the Answer

Question: 9

In which contract does the seller bear the risk?
(a) Time and Material
(b) Cost Plus Award Fee
(c) Firm Fixed Price
(d) Cost Plus Fixed Fee

Go to the Answer

Question: 10

Which of the following is not a knowledge area in the PMBOK Guide?
(a) Time
(b) Budget
(c) Quality
(d) Risk

Go to the Answer

Question: 11

During which phase is risk highest?
(a) Closing
(b) Planning
(c) Executing
(d) Initiating

Go to the Answer

Question: 12

You want to review lessons learned for past projects. Where will you look for them?
(a) Enterprise Environment Factor
(b) Old Contract Document
(c) Project Plan
(d) Organizational Process Assets

Go to the Answer

Question: 13

Which of the following is not true about the risk register?
(a) No changes are allowed in the risk register once it is approved
(b) It is developed during the Identify Risks process
(c) It contains a list of identified risks
(d) All of the above

Go to the Answer

Question: 14

A risk that is an outcome of a response of a previously identified risk is known as a:
(a) Primary Risk
(b) Secondary Risk
(c) Residual Risk
(d) Unidentified Risk

Go to the Answer

Question: 15

Which is the correct PERT formula?
(a) (Optimistic + Most likely + Pessimist)/6
(b) (Optimistic + Most likely + Pessimist)/3
(c) (Optimistic + 4*Most likely + Pessimist)/3
(d) (Optimistic + 4*Most likely + Pessimist)/6

Go to the Answer

Question: 16

Which strategy can’t be used with positive risks?
(a) Enhance
(b) Exploit
(c) Accept
(d) Mitigate

Go to the Answer

Question: 17

Which statement is true about the issue log?
(a) It monitors the resolution of the issues
(b) It contains a list of risks
(c) It has a list of problematic stakeholders
(d) All of the above

Go to the Answer

Question: 18

Which one is the least source of conflict in projects?
(a) Schedule Priority
(b) Low Salary
(c) Personal Work Style
(d) Scarce Resource

Go to the Answer

Question: 19

A risk that remains after the applying the response is known as a:
(a) Secondary Risk
(b) Primary Risk
(c) Residual Risk
(d) Unidentified Risk

Go to the Answer

Question: 20

A Pareto diagram:
(a) Is used to identify risks
(b) Is used in sensitivity analysis
(c) Explains the 80-20 principle
(d) Identifies the cause of the risk

Go to the Answer

Question: 21

A network diagram has more than one critical path. This means:
(a) More risks
(b) Fewer risks
(c) Budget may increase
(d) Time may increase

Go to the Answer

Question: 22

What is the risk breakdown structure?
(a) A classification of risks
(b) Types of risks
(c) A hierarchical representation of threats
(d) A hierarchical representation of risks

Go to the Answer

Question: 23

The contingency reserve is used to manage:
(a) Primary risks
(b) Secondary risks
(c) Residual risks
(d) All of the above

Go to the Answer

Question: 24

When is a project manager required to get permission to use the management reserve?
(a) It is up to the project manager
(b) Never
(c) Sometimes
(d) Always

Go to the Answer

Question: 25

In what kind of risk response strategy do you transfer the risk?
(a) Avoid
(b) Mitigate
(c) Insurance
(d) Share

Go to the Answer

Question: 26

Which of the following denotes unauthorized addition to the project scope to make the client happy?
(a) Scope Creep
(b) Gold Plating
(c) Crashing
(d) Fast Tracking

Go to the Answer

Question: 27

What are the triple constraints?
(a) Scope, Time, Cost
(b) Risk, Scope, Time
(c) Quality, Cost, Time
(d) Human Resource, Scope, Cost

Go to the Answer

Question: 28

Which need is on the lowest level of Maslow’s Hierarchy of Needs?
(a) Security
(b) Physiological
(c) Self Esteem
(d) Self Actualization

Go to the Answer

Question: 29

Which statement is true about the RACI chart?
(a) RACI stands for: Responsible, Accountant, Consult, and Inform
(b) RACI is an example of responsibility assignment matrix
(c) RACI charts connect risks to risk owner
(d) None of the above

Go to the Answer

Question: 30

In the Control Risks process, you do all except:
(a) Monitoring Triggers
(b) Ranking Risks
(c) Updating Risk Register
(d) All of the above

Go to the Answer

Question: 31

In which risk response strategy do you make sure that the risk is realized?
(a) Mitigate
(b) Enhance
(c) Accept
(d) Exploit

Go to the Answer

Question: 32

Which diagram has an S-curve shape?
(a) Bar Chart
(b) Ishikawa Diagram
(c) Scatter Diagram
(d) Cost Baseline

Go to the Answer

Question: 33

Which statement is true about the contingency reserve?
(a) It is a percentage of the cost of the project
(b) It is used for identified risks
(c) It is used for unidentified risks
(d) None of the above

Go to the Answer

Question: 34

Probability and impact matrix helps you in which of the following?
(a) Identifying Risks
(b) Analyzing Risks
(c) Ranking Risks
(d) Quantifying Risks

Go to the Answer

Question: 35

You want to see a particular responsibility assigned to each person. Where will you look for it?
(a) GANTT Chart
(b) Probability Impact Matrix
(c) Pareto Diagram
(d) RACI Chart

Go to the Answer

Question: 36

Which of the following is a network analysis technique?
(a) EVM
(b) EMV
(c) Delphi Technique
(d) CPM

Go to the Answer

Question: 37

During the project execution, an unidentified risk came up which may affect your project outcome. What will you do now?
(a) Create a workaround
(b) Develop a Risk Response Plan
(c) Inform management
(d) Inform the client

Go to the Answer

Question: 38

What accuracy is required in 5 Sigma?
(a) 69%
(b) 93.3%
(c) 99.977%
(d) 99.38%

Go to the Answer

Question: 39

In which risk response strategy do you go for the teaming agreement?
(a) Exploit
(b) Share
(c) Enhance
(d) Transfer

Go to the Answer

Question: 40

The goal of qualifying risks is:
(a) Identify risks
(b) Evaluate individual risk
(c) Determine the EMV
(d) All of the above

Go to the Answer

Question: 41

In a decision tree diagram, a circle represents:
(a) Decision
(b) Events
(c) Probability
(d) Impact

Go to the Answer

Question: 42

The indication that any risk is about to occur is known as:
(a) Risk Threshold
(b) Tolerance
(c) Risk Trigger
(d) None of the above

Go to the Answer

Question: 43

When do you perform the risk identification process?
(a) Throughout the project
(b) At the beginning of the project
(c) At the end of the project
(d) Before signing the project charter

Go to the Answer

Question: 44

Which is not a communication methods type?
(a) Interactive Communication
(b) Pull Communication
(c) Push Communication
(d) Aggressive Communication

Go to the Answer

Question: 45

Risk management includes all, except?
(a) Create WBS
(b) Identify risks
(c) Qualify risks
(d) Sensitivity Analysis

Go to the Answer

Question: 46

Which of the following is not a contract type?
(a) T&M
(b) CPIF
(c) Make or Buy
(d) FFP

Go to the Answer

Question: 47

Reducing the probability of a negative risk happening is known as:
(a) Risk Mitigation
(b) Risk Transfer
(c) Exploit
(d) Enhance

Go to the Answer

Question: 48

A person who prefers to avoid risk is known as:
(a) Risk Tolerant
(b) Risk Averse
(c) Risk Hater
(d) Risk Seeker

Go to the Answer

Question: 49

Some of your stakeholders are hesitating in helping you identify risks. Which technique will you use to get their output?
(a) Monte Carlo
(b) Delphi Technique
(c) Facilitated Workshop
(d) Interview

Go to the Answer

Question: 50

Your team is located in different geographic locations and you want to discuss some issues with all team members. Which communication tool will you use?
(a) Live Meeting
(b) Telephone
(c) War Room
(d) Internet

Go to the Answer

Question: 51

Which statement is not true about the decision tree method?
(a) It is a tool and technique of the Quantitative Risk Analysis process
(b) It helps choose the best option
(c) It helps in identifying risks
(d) It is an EMV technique

Go to the Answer

Question: 52

Who determines the size of the management reserve?
(a) The Project Manager
(b) Management
(c) Team Members
(d) Client

Go to the Answer

Question: 53

The risk register is created in the Identifying Risks process, and then it is continuously updated. Which of the following is not updated during the Qualitative Risk Analysis process?
(a) Risk prioritization
(b) New risks
(c) Response plan for risks
(d) None of the above

Go to the Answer

Question: 54

Which risk response strategy will utilize the contingency reserve?
(a) Enhance
(b) Exploit
(c) Mitigate
(d) Share

Go to the Answer

Question: 55

In which phase will the project experience most of the identified risks?
(a) Initiation
(b) Planning
(c) Execution
(d) Closing

Go to the Answer

Question: 56

To whom should you send the Performance Reports?
(a) Everyone
(b) Client
(c) As mentioned in the communication plan
(d) Team members

Go to the Answer

Question: 57

Sending information from one place to another place is known as:
(a) Transmit Message
(b) Noise
(c) Feedback
(d) Medium

Go to the Answer

Question: 58

In which format will you ask your client to submit change requests?
(a) Verbal
(b) Written
(c) Formal Written
(d) On Phone

Go to the Answer

Question: 59

You discover a risk that a team member may suffer an accident if you allow the project to continue. What would be your next step?
(a) Remove the team member
(b) Analyze the risk
(c) Stop the concerning activity
(d) Inform management

Go to the Answer

Question: 60

Your management told you that if you complete the project before two months, you can bid for a new project. You do everything you are capable of completing the project ahead of time so that you can get the new project. What kind of response strategy are you using here?
(a) Enhance
(b) Exploit
(c) Accept
(d) Mitigate

Go to the Answer

Question: 61

In your team, there are 15 members including you. How many lines of communications are there?
(a) 105
(b) 120
(c) 60
(d) 210

Go to the Answer

Question: 62

In your team, five members report to you. Later on, three more members are added. What is the increase in communication lines?
(a) 42
(b) 21
(c) 18
(d) 36

Go to the Answer

Question: 63

Which is an example of active listening?
(a) Making eye contact
(b) Rubbing your nose
(c) Reading an SMS
(d) Feeling sleepy

Go to the Answer

Question: 64

Your team member informs you that a particular piece of equipment may malfunction during the peak of its usage. You told him to do nothing, and you decide to manage it once the equipment fails. What kind of strategy is this?
(a) Avoid
(b) Accept
(c) Exploit
(d) Mitigate

Go to the Answer

Question: 65

Which one is a root cause analysis tool?
(a) Fishikawa Diagram
(b) Monte Carlo Simulation
(c) Bar Chart
(d) Pareto Diagram

Go to the Answer

Question: 66

To get risks from a few important stakeholders, you approach them individually and ask questions. Which technique are you using here?
(a) Brainstorming
(b) Facilitated Workshop
(c) Interview
(d) Delphi

Go to the Answer

Question: 67

There is a 30% chance that a certain piece of equipment may fail, which may cost you 500 USD. Find the expected monetary value for this event.
(a) 150
(b) 500
(c) 1500
(d) 60

Go to the Answer

Question: 68

Which statement is not true about the risk register?
(a) It should include both positive and negative risks
(b) It should not include positive risks
(c) It should include low impact risks
(d) It should always be updated

Go to the Answer

Question: 69

In which process do you select the seller?
(a) Plan Procurement Management
(b) Conduct Procurements
(c) Control Procurements
(d) Close Procurements

Go to the Answer

Question: 70

A stakeholder has a bad reputation for requesting many changes. How will you manage this stakeholder?
(a) Ignore him
(b) Involve him from the beginning of the project
(c) Flatly deny all of his requests
(d) Speak with management

Go to the Answer

Question: 71

Your team member told you that if you rent some equipment a little earlier than planned, you will save some money. What will be your next step?
(a) You will follow his advice
(b) You will reject the suggestion
(c) You will review it further
(d) You’ll inform management

Go to the Answer

Question: 72

You raise a change request to approve changes in the schedule baseline. Which form of communication is it?
(a) Informal Written
(b) Formal Written
(c) Written
(d) Para-lingual

Go to the Answer

Question: 73

During risk analysis, you come to the conclusion that a particular risk has a remote chance of occurring. Even if it occurs, there will be very little impact on any project parameter. What will you do with this risk?
(a) You will ignore it
(b) You will further analyze it
(c) You will keep it on the watch list
(d) None of the above

Go to the Answer

Question: 74

According to Herzberg’s Hygiene theory, which is a motivating factor?
(a) Salary
(b) Good working condition
(c) Relationship with Boss
(d) Career growth

Go to the Answer

Question: 75

Which of the following risk response strategies can be used for negative and positive risks?
(a) Accept
(b) Mitigate
(c) Enhance
(d) Exploit

Go to the Answer

Question: 76

In which project process do you identify the project risks?
(a) Initiating and Planning
(b) Initiating, Planning, and Executing
(c) Initiating, Planning, and Monitoring & Controlling
(d) All phases

Go to the Answer

Question: 77

Usually, which risk management process is avoided for low cost and non-important projects?
(a) Perform Qualitative Risk Analysis
(b) Perform Quantitative Risk Analysis
(c) Control Risks
(d) Plan Risk Responses

Go to the Answer

Question: 78

While reviewing the project scope, you notice that a part of the project is beyond your capability. Then your team suggests you assign this work to any contractor who is a specialist in it. What kind of risk response strategy is it?
(a) Share
(b) Enhance
(c) Transfer
(d) Avoid

Go to the Answer

Question: 79

Which of the following strategies cannot be used with negative risks?
(a) Transfer
(b) Avoid
(c) Mitigate
(d) Exploit

Go to the Answer

Question: 80

According to the PMBOK Guide 5th Edition, how many risk response strategies are available to manage risks?
(a) 7
(b) 5
(c) 4
(d) 3

Go to the Answer

Question: 81

A joint venture is an example of which kind of risk response strategy?
(a) Exploit
(b) Share
(c) Transfer
(d) Enhance

Go to the Answer

Question: 82

During the execution phase of the project, you discover a risk that was not previously identified. What will your next step be?
(a) Note it to the risk register and analyze it
(b) Ignore it
(c) Create a workaround
(d) Create a response plan

Go to the Answer

Question: 83

In a decision tree diagram, a square or rectangle represents:
(a) Decisions
(b) Events
(c) Probability
(d) Impact

Go to the Answer

Question: 84

In which project process do you identify the project stakeholders?
(a) Initiating and Planning
(b) Initiating, Planning, and Executing
(c) Initiating, Planning, and Monitoring & Controlling
(d) All phases

Go to the Answer

Question: 85

In which process do you define the risk categories?
(a) Identify Risks
(b) Plan Risk Management
(c) Perform Qualitative Risk Analysis
(d) Plan Risk Responses

Go to the Answer

Question: 86

The project budget consists of:
(a)  Cost baseline plus management reserve
(b)  Cost baseline plus contingency reserve
(c)  Cost baseline plus activity contingency reserve
(d)  Control account plus contingency reserve

Go to the Answer

Question: 87

You are in the risk qualifying process and qualifying risks. Considering the low-risk tolerance level of your stakeholders, which of the following statements is true?
(a)  As the risk tolerance is high, you will have fewer risks on the watch list
(b)  As the risk tolerance is high, you will have more risks on the watchlist
(c)  As tolerance is high, there will be no watchlist
(d)  There is no impact on the watchlist

Go to the Answer

Question: 88

What kind of probability distribution curve has an only minimum and maximum values?
(a)  Beta
(b)  Triangular
(c)  Uniform
(d)  Traditional

Go to the Answer

Question: 89

In which of the following cases will you have the largest number of risks?
(a)  If your stakeholders are risk-averse
(b)  If your stakeholders are risk seekers
(c)  If your stakeholders are risk-neutral
(d)  If the risk attitude of stakeholders is high

Go to the Answer

Question: 90

In which of the following process do you analyze stakeholders’ risk attitude?
(a)  Plan risk management
(b)  Plan risk response
(c)  Perform qualitative risk analysis
(d)  Perform quantitative risk analysis

Go to the Answer

Question: 91

Which of the following risk evaluation techniques can be used to analyze and demonstrate causal relationships in high-risk scenarios?
(a)  Tornado Analysis
(b)  Monte Carlo
(c)  Bowtie
(d)  AHP

Go to the Answer

Question: 92

While implementing a risk response plan, a secondary risk comes up which you did not identify earlier. How will you manage it?
(a)  Using an accept risk response strategy
(b)  Using a mitigation risk response strategy
(c)  Using an avoid risk response strategy
(d)  Through a workaround

Go to the Answer

Question: 93

An identified risk occurred and you successfully managed it. However due to this response, another risk was generated and you have to manage it immediately, otherwise, it will impact your project objective severely. What will your next step be?
(a)  Develop a response plan and implement it
(b)  Develop a response plan, get permission to use the management reserve, and implement the response
(c)  Develop a contingency response plan and implement it
(d)  As the risk can severely impact your project objective, try to avoid it

Go to the Answer

Question: 94

Which of the following statements is true about risks?
(a)  Risks are highest during the execution phase
(b)  Risks are highest when the project nears the end
(c)  Risks are highest when the project starts
(d)  Risks remain constant during the whole project life cycle

Go to the Answer

Question: 95

You are in an African country and identifying risks for your project. Your team members identify a risk that during a particular time there is a 3% probability of rain. As the probability of this risk is low, you only ask team members to set a contingency reserve for this risk. What risk response strategy is this?
(a)  Accept
(b)  Mitigate
(c)  Avoid
(d)  Enhance

Go to the Answer

Question: 96

You are in an African country and identifying risks for your project. Your team members identify a risk that during a particular time there is a 3% probability of rain. As the probability of this risk is low, you ask team members to note down this risk and do nothing. What risk response strategy is this?
(a)  Avoid
(b)  Mitigate
(c)  Accept
(d)  Enhance

Go to the Answer

Question: 97

There is a risk of equipment failure and you have identified another piece of equipment to replace it if it fails. However, there is a chance that this equipment may not perform as well as the original equipment. What kind of risk is this?
(a)  Known risk
(b)  Secondary risk
(c)  Unknown risk
(d)  Residual risk

Go to the Answer

Question: 98

After analyzing the risks and developing the risk response plan, which technique helps you see if the overall project risks have decreased?
(a)  EMV
(b)  Latin Hypercube
(c)  Tornado Analysis
(d)  EVM

Go to the Answer

Question: 99

How is the nominal group technique different from the Delphi technique?
(a)  An open discussion is conducted in the nominal group technique, while in Delphi you ask questions anonymously
(b)  An open discussion is conducted in the Delphi technique, while in the nominal group technique you ask questions anonymously
(c)  In the nominal group technique, after a discussion voting takes place to rank opinions, while in Delphi a moderator collects opinions anonymously and compiles them
(d)  Both are the same except Delphi is anonymous

Go to the Answer

Question: 100

How is an affinity diagram different from the brainstorming technique?
(a)  Both categorize risks, however, an affinity diagram uses a diagram and brainstorming uses slips
(b)  Brainstorming categorizes risks while an affinity diagram prioritizes them
(c)  Both prioritize risks but brainstorming uses a voting system
(d)  Brainstorming prioritizes risks while an affinity diagram categorizes them

Go to the Answer


Answers

Answer-1: b

Explanation: The list of stakeholders is recorded in the stakeholder register, not in the risk register.

Go to the Question

***

Answer-2: c

Explanation: Probabilistic Estimate is not an estimate which is used in the PERT formula.

Reference: The PMBOK Guide 5th Edition, Page: 170

Go to the Question

***

Answer-3: d

Explanation: The risk register is the only output of the Identify Risks Process.

Reference: The PMBOK Guide 5th Edition, Page: 319

Go to the Question

***

Answer-4: b

Explanation: Earned Value Management is a technique of the Control Costs process.

Reference: The PMBOK Guide 5th Edition, Page: 215

Go to the Question

***

Answer-5: c

Explanation: In resource smoothing, activities are allowed to be delayed within their free and total float; therefore the critical path does not change here.

Reference: The PMBOK Guide 5th Edition, Page: 180

Go to the Question

***

Answer-6: c

Explanation: Natural calamity (such as flood or earthquake) is an example of force majeure because you cannot control it.

Go to the Question

***

Answer-7: c

Explanation: In the Plan Risk Responses process you create the plan to manage the identified risks.

Reference: The PMBOK Guide 5th Edition, Page: 342

Go to the Question

***

Answer-8: b

Explanation: Fast-tracking increases the risks and the crashing technique increases the cost. Although the crashing process also increases the risks, it is less risky than fast-tracking.

Reference: The PMBOK Guide 5th Edition, Page: 181

Go to the Question

***

Answer-9: c

Explanation: In a firm-fixed-price contract the price is fixed, and if the cost escalates it has to be borne by the seller. This type of contract should be used when you have a very well defined scope of work. Please note that if the work is not clearly defined, the buyer may have to bear the burden.

Reference: The PMBOK Guide 5th Edition, Page: 363

Go to the Question

***

Answer-10: b

Explanation: Budget is included in the Cost Management Knowledge area; the budget itself is not a knowledge area.

Go to the Question

***

Answer-11: d

Explanation: During the initiation phase risk is higher because there is less clarity on everything. However, as the project progresses, the risk goes down gradually.

Go to the Question

***

Answer-12: d

Explanation: Lessons learned are a part of the organizational process assets.

Reference: The PMBOK Guide 5th Edition, Page: 27

Go to the Question

***

Answer-13: a

Explanation: The risk register is developed during the Identify Risks process and then it is updated continuously throughout the project.

Reference: The PMBOK Guide 5th Edition, Page: 319

Go to the Question

***

Answer-14: b

Explanation: Secondary risks are risks that may come up as a result of implementing the response of any identified risk.

Reference: The PMBOK Guide 5th Edition, Page: 343

Go to the Question

***

Answer-15: d

Explanation: The correct PERT formula is:

PERT= (Optimistic + 4*Most-likely + Pessimist)/6

Reference: The PMBOK Guide 5th Edition, Page: 171

Go to the Question

***

Answer-16: d

Explanation: Mitigate is a negative risk response strategy that cannot be used with positive risks. Exploit, Accept, and Enhance are positive risk response strategies.

Reference: The PMBOK Guide 5th Edition, Page: 344

Go to the Question

***

Answer-17: a

Explanation: An issue log is used to monitor the resolution of issues.

Reference: The PMBOK Guide 5th Edition, Page: 305

Go to the Question

***

Answer-18: b

Explanation: Schedule priority, scarce resource, and personal work style are the main reasons for conflicts in projects. A low salary is not a source of conflict.

Reference: The PMBOK Guide 5th Edition, Page: 282

Go to the Question

***

Answer-19: c

Explanation: Residual risk is a risk that remains after implementing the response plan.

Reference: The PMBOK Guide 5th Edition, Page: 558

Go to the Question

***

Answer-20: c

Explanation: A Pareto diagram is also known as an 80-20 principle. According to Pareto, 80% of problems are caused by 20% of sources.

Go to the Question

***

Answer-21: a

Explanation: If a network diagram has more than one critical path, this means you will have to manage two paths, i.e. more risks.

Go to the Question

***

Answer-22: d

Explanation: In the risk breakdown structure you can breakdown the risks according to their category; it is a hierarchical representation of risks.

Reference: The PMBOK Guide 5th Edition, Page: 560

Go to the Question

***

Answer-23: d

Explanation: The contingency reserve is used to manage the identified risks. All risks given in the questions are identified risks.

Reference: The PMBOK Guide 5th Edition, Page: 310

Go to the Question

***

Answer-24: d

Explanation: The project manager cannot use the management reserve without permission from the management; he always needs permission to use the management reserve.

Go to the Question

***

Answer-25: c

Explanation: In the insurance risk response strategy you transfer the risk to a third party. Please note that transferring does not mean that the risk has been eliminated. By transferring a risk, you are transferring responsibility to a third party to manage this risk if it occurs.

Reference: The PMBOK Guide 5th Edition, Page: 344

Go to the Question

***

Answer-26: b

Explanation: In gold plating, team members add functions to make the client happy, although it is not included in the scope. Scope creep refers to the uncontrolled changes to the scope. Please note that in scope creep team members do not add anything to the scope willingly. Crashing and fast-tracking are schedule compression techniques.

Go to the Question

***

Answer-27: a

Explanation: Scope, time, and cost are collectively known as the triple constraints.

Go to the Question

***

Answer-28: b

Explanation: Physiological needs are the lowest on Maslow’s Hierarchy of Needs. One must fulfill his physiological needs before going for higher needs.

Go to the Question

***

Answer-29: b

Explanation: RACI matrix is a kind of responsibility assignment matrix where you can see the relation of activity with the team members.
Reference: The PMBOK Guide 5th Edition, Page: 262

Go to the Question

***

Answer-30: b

Explanation: Risk ranking is performed under the Perform Qualitative Risk Analysis process.

Reference: The PMBOK Guide 5th Edition, Page: 328

Go to the Question

***

Answer-31: d

Explanation: In the exploit risk response strategy, you make sure that the risk is realized. However, in enhance you only try to realize the opportunity.

Reference: The PMBOK Guide 5th Edition, Page: 345

Go to the Question

***

Answer-32: d

Explanation: The cost baseline curve is also known as an S-Curve because initially the cost is low and it gradually increases, and as the project ends, the cost again goes down.

Reference: The PMBOK Guide 5th Edition, Page: 214

Go to the Question

***

Answer-33: b

Explanation: The contingency reserve is used to manage identified risks.

Reference: The PMBOK Guide 5th Edition, Page: 310

Go to the Question

***

Answer-34: c

Explanation: Probability and impact matrix is a tool and technique of the Perform Qualitative Risk analysis process; it helps you in ranking the identified risks.

Reference: The PMBOK Guide 5th Edition, Page: 331

Go to the Question

***

Answer-35: d

Explanation: The RACI chart is a kind of responsibility assignment matrix (RAM) where you can see the resources assigned to work package or activity. The RACI chart means: Responsible, Accountable, Consult, and Inform. On the RACI chart, you can see the accountability of the person for any activity.

Reference: The PMBOK Guide 5th Edition, Page: 262

Go to the Question

***

Answer-36: d

Explanation: CPM stands for the Critical Path Method, which is a network analysis technique.

Go to the Question

***

Answer-37: a

Explanation: If any unidentified risk occurs, you will manage it through the workaround.

Reference: The PMBOK Guide 5th Edition, Page: 353

Go to the Question

***

Answer-38: c

Explanation: In 5 Sigma 99.977% accuracy is desired.

Go to the Question

***

Answer-39: b

Explanation: You go for the teaming agreement with another company when you see a big opportunity, and you alone are not capable of realizing it. In sharing the risk response strategy, you team up with another company or go for a joint venture to realize the opportunity.

Reference: The PMBOK Guide 5th Edition, Page: 346

Go to the Question

***

Answer-40: b

Explanation: In risk qualification, you review each risk for its probability and impact on the project objectives.

Reference: The PMBOK Guide 5th Edition, Page: 328

Go to the Question

***

Answer-41: b

Explanation: In a decision tree diagram, a circle represents events, and a rectangle or square represents a decision.

Go to the Question

***

Answer-42: c

Explanation: Risk triggers, which are sometimes known as risk symptoms, are a warning sign that a risk is about to occur.

Go to the Question

***

Answer-43: a

Explanation: Risk identification is an ongoing process, so you will identify risks throughout the project.

Reference: The PMBOK Guide 5th Edition, Page: 321

Go to the Question

***

Answer-44: d

Explanation: Aggressive communication is a made-up word; the rest are types of communication methods.

Reference: The PMBOK Guide 5th Edition, Page: 295

Go to the Question

***

Answer-45: a

Explanation: Create WBS is a Scope Management process. WBS stands for work breakdown structure, which is a hierarchical decomposition of the project work.

Reference: The PMBOK Guide 5th Edition, Page: 125

Go to the Question

***

Answer-46: c

Explanation: Make or Buy is a decision which you have to make during the procurement management plan. Here you will decide whether you should procure a particular task or if you should do it on your own.

Reference: The PMBOK Guide 5th Edition, Page: 363, 364, 365

Go to the Question

***

Answer-47: a

Explanation: In risk mitigation, you try to reduce the probability of happening the risk or its impact. In risk transfer, you transfer the responsibility to a third party. Exploit and enhance are positive risk response strategies.

Reference: The PMBOK Guide 5th Edition, Page: 345

Go to the Question

***

Answer-48: b

Explanation: A risk-averse person or organization is not comfortable with digesting risks. They are not very creative or supportive towards risks. They usually try to avoid risks unless the reward to take on the risks is high enough to outweigh the aversion of the risk.

Go to the Question

***

Answer-49: b

Explanation: In this case you will use the Delphi Technique, because this technique collects responses anonymously.

Reference: The PMBOK Guide 5th Edition, Page: 324

Go to the Question

***

Answer-50: d

Explanation: With the use of the internet, you can communicate with several people simultaneously located in different geographic locations. You cannot use a live meeting or war room because team members are located in different places. Telephone communication will be a mess if you make a conference call with all team members.

Go to the Question

***

Answer-51: c

Explanation: Decision tree analysis helps you in all mentioned options except identifying risks.

Reference: The PMBOK Guide 5th Edition, Page: 339

Go to the Question

***

Answer-52: b

Explanation: The size of the management reserve is determined by the management. Usually it lies between 5% and 10%.

Go to the Question

***

Answer-53: c

Explanation: Risk responses are determined in the Plan Risk Responses process, and then they are updated in the risk register.

Reference: The PMBOK Guide 5th Edition, Page: 342

Go to the Question

***

Answer-54: c

Explanation: In enhance, exploit and share risk response strategies, no reserve is needed because they are positive risk response strategies which do not require the use of any reserve. However, the mitigation technique requires the use of the contingency reserve because here you are managing negative risks.

Go to the Question

***

Answer-55: c

Explanation: In the execution phase you will carry out the work-related activities, and therefore, most of the identified risk will be faced in this phase.

Go to the Question

***

Answer-56: c

Explanation: Performance reports will be sent to the stakeholders you have decided on during the Plan Communication Management process.

Reference: The PMBOK Guide 5th Edition, Page: 296

Go to the Question

***

Answer-57: a

Explanation: Sending information from one place to another is known as transmit message.

Reference: The PMBOK Guide 5th Edition, Page: 293

Go to the Question

***

Answer-58: c

Explanation: Change requests must always be formally written.

Go to the Question

***

Answer-59: b

Explanation: First of all you analyze the risk. It is also possible that the probability of this risk happening is too low. Once you qualify the risk, you will proceed with the next action based on your risk analysis.

Go to the Question

***

Answer-60: b

Explanation: In exploit risk response strategies, you do everything to ensure that the opportunity is realized. Please note that in enhance you also try to realize the opportunity but you do not ensure that opportunity is realized.

Reference: The PMBOK Guide 5th Edition, Page: 345

Go to the Question

***

Answer-61: a

Explanation: Communication Channel = n*(n-1)/2, (where n is the number of members)
=15(15-1)/2 = 105

Reference: The PMBOK Guide 5th Edition, Page: 292

Go to the Question

***

Answer-62: b

Explanation: Communication channel= 6(6-1)/2= 15

New communication channel = 9(9-1)/2=36

New communication channel = 36-15=21

Reference: The PMBOK Guide 5th Edition, Page: 292

Go to the Question

***

Answer-63: a

Explanation: Making eye contact and repeating the sentence are examples of active listening.

Go to the Question

***

Answer-64: b

Explanation: This is an example of accept risk response strategy where you simply accept the risk and do nothing except note it down.

Reference: The PMBOK Guide 5th Edition, Page: 345

Go to the Question

***

Answer-65: a

Explanation: Fishikawa diagram is also known as a Fishbone diagram, Ishikawa diagram, and root cause analysis diagram.

Reference: The PMBOK Guide 5th Edition, Page: 236

Go to the Question

***

Answer-66: c

Explanation: In interview you approach individual stakeholders and ask questions to get their output.

Go to the Question

***

Answer-67: a

Explanation: Expected Monetary Value = Probability * Impact
EMV = 0.3*500
= 150

Go to the Question

***

Answer-68: b

Explanation: The risk register includes all risks regardless of whether they positive or negative, and it is continuously updated throughout the project.

Reference: The PMBOK Guide 5th Edition, Page: 327

Go to the Question

***

Answer-69: b

Explanation: In the Conduct Procurements process, you select the seller.

Reference: The PMBOK Guide 5th Edition, Page: 371

Go to the Question

***

Answer-70: b

Explanation: If you have a stakeholder who requests many changes, involve him from the start of the project so that he can agree with and be aware of everything going on in the project.

Go to the Question

***

Answer-71: c

Explanation: Of course you will analyze the suggestion before reaching any conclusion. You cannot take action on any advice unless you review the request and analyze its impact on any other project objective or parameters.

Go to the Question

***

Answer-72: b

Explanation: This is an official formal request which must be sent in a formal written form of communication. Change request is always a formal written communication.

Go to the Question

***

Answer-73: c

Explanation: Low-priority risks are kept on the watch list for future monitoring. You cannot ignore any low-rated risk because you never know when it may become a high-ranking risk.

Reference: The PMBOK Guide 5th Edition, Page: 330

Go to the Question

***

Answer-74: d

Explanation: Salary, working conditions, and a good relationship with the boss are important but they are not a motivating factor. They don’t motivate you to work harder. Career growth is a motivating factor which encourages you to perform better and prove yourself.

Go to the Question

***

Answer-75: a

Explanation: Accept risk response strategy can be used with both types of risks.

Reference: The PMBOK Guide 5th Edition, Page: 344

Go to the Question

***

Answer-76: d

Explanation: Risk identification is an iterative process; therefore, risks will be identified throughout the project.

Reference: The PMBOK Guide 5th Edition, Page: 321

Go to the Question

***

Answer-77: b

Explanation: The Perform Quantitative Risk Analysis is a complex and time-consuming process, usually performed on large and complex projects, and ignored on low-cost non-important projects.

Go to the Question

***

Answer-78: c

Explanation: Since you are giving this task to another party, it is a transfer risk response strategy.

Go to the Question

***

Answer-79: d

Explanation: Exploit is a positive risk response strategy where you ensure that the risk is realized.

Go to the Question

***

Answer-80: a

Explanation: The three strategies for negative risks are: avoid, transfer, and mitigate. The three strategies for positive risks are: exploit, enhance, and share. The last strategy is “accept,” which can be used with both types of risks.

Go to the Question

***

Answer-81: b

Explanation: In a joint venture, you team with another company to share the opportunity. This is an example of a share risk response strategy.

Reference: The PMBOK Guide 5th Edition, Page: 346

Go to the Question

***

Answer-82: a

Explanation: Risk identification is an ongoing process; you will identify them throughout the project. However, as you identify a new risk, you will note it down in the risk register and analyze it for the next action.

Go to the Question

***

Answer-83: a

Explanation: In a decision tree diagram, a rectangle or square represents a decision and a circle represents events.

Go to the Question

***

Answer-84: d

Explanation: Stakeholder identification is an iterative process, and hence it will be performed throughout the project.

Go to the Question

***

Answer-85: b

Explanation: Risk categories, definitions of risk probability and impact, methodologies, etc. are determined in the Plan Risk Management Process.

Reference: The PMBOK Guide 5th Edition, Page: 317

Go to the Question

***

Answer-86: a

Explanation: The project budget consists of the cost baseline and management reserve. The cost baseline consists of the work package cost estimate plus contingency reserve.

Reference: The PMBOK Guide 5th Edition, Page: 213

Go to the Question

***

Answer-87: a

Explanation: As the risk tolerance is low for your stakeholders, they are risk-averse and in this case, you will have fewer risks on the watch list.

Go to the Question

***

Answer-88: c

Explanation: This is a property of a uniform distribution where you have two values: maximum and minimum.

Go to the Question

***

Answer-89: b

Explanation: If your stakeholders are risk seekers, this means they will want to manage even a small risk to avoid issues with the project. In this case, the number of risks will be higher.

Go to the Question

***

Answer-90: a

Explanation: Risk attitude, probability, and impact definitions are determined in the plan risk management process.

Go to the Question

***

Answer-91: c

Explanation: Bowtie method helps you analyze and demonstrate causal relationships in high-risk scenarios.

Go to the Question

***

Answer-92: d

Explanation: If any unidentified risk occurs, you will manage it through a workaround.

Go to the Question

***

Answer-93: b

Explanation: As this is an unidentified risk, you will manage it with the management reserve. To use the management reserve, you need the management’s approval.

Go to the Question

***

Answer-94: c

Explanation: When the project starts there is the greatest potential for risks. This goes down as the project progresses.

Go to the Question

***

Answer-95: a

Explanation: This is an example of an active accept risk response strategy where you are keeping a contingency reserve to manage the risk if it occurs.

Go to the Question

***

Answer-96: c

Explanation: This is an example of a passive accept risk response strategy where you are doing nothing except acknowledging the risk.

Go to the Question

***

Answer-97: d

Explanation: A risk that remains after even applying the risk response strategy is known as a residual risk.

Go to the Question

***

Answer-98: b

Explanation: Monte Carlo and Latin Hypercube techniques let you know if the overall project risk has been reduced or not after developing the risk response strategies.

Go to the Question

***

Answer-99: c

Explanation: In the nominal group technique, after a discussion, you vote to rank the ideas for further discussion. In Delphi, you send a questionnaire to stakeholders anonymously so they can give their input without any fear.

Go to the Question

***

Answer-100: d

Explanation: In an affinity diagram you categorize risks while brainstorming is used to rank the ideas through group discussion.

Go to the Question

***


This concludes the 100 free PMI-RMP exam sample questions. If you have any doubt about any questions you can post them through the comments section, and I’ll reply to all concerns regarding the questions.

If you have any suggestions or want to add any good quality questions, post them in the comment section or mail me at [email protected], I will review them and add them here if appropriate.

To check your readiness for the real PMI-RMP exam, be sure to attempt my PMI-RMP Question Bank and PMI-RMP Mock Test, available at the following given links:

PMI-RMP Question Bank

PMI-RMP Mock Test

Fahad Usmani, PMP

I am Mohammad Fahad Usmani, B.E. PMP, PMI-RMP. I have been blogging on project management topics since 2011. To date, thousands of professionals have passed the PMP exam using my resources.