New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCPM Exam - Topic 6 Question 8 Discussion

Actual exam question for GIAC's GCPM exam
Question #: 8
Topic #: 6
[All GCPM Questions]

You work as a project manager for company Inc. You want to include a budget contingency to accommodate the risk of incurring unidentifiable but normally occurring costs within the defined scope. Which of the following processes will help you to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Marge
4 months ago
Cost baselining is also important, but budgeting is key for contingencies.
upvoted 0 times
...
Margo
4 months ago
Wait, can you really budget for unidentifiable costs? Sounds tricky!
upvoted 0 times
...
Beckie
4 months ago
Totally agree, cost budgeting covers those unexpected costs.
upvoted 0 times
...
Page
4 months ago
I think cost estimation is more relevant here.
upvoted 0 times
...
Johnna
5 months ago
Cost budgeting is definitely the way to go for contingencies!
upvoted 0 times
...
Raylene
5 months ago
I practiced a similar question, and I think cost budgeting was the focus for including contingencies.
upvoted 0 times
...
Bo
5 months ago
Cost controlling seems like it could apply, but I feel like it’s more about managing costs rather than setting aside a contingency.
upvoted 0 times
...
Irma
5 months ago
I'm not entirely sure, but I remember something about cost estimation being related to identifying potential costs.
upvoted 0 times
...
Glory
5 months ago
I think cost budgeting might be the right answer since it involves allocating funds for unexpected costs.
upvoted 0 times
...
Geoffrey
5 months ago
Okay, the data shows that Product-Detail has the highest total time and maximum time, so that seems like the best place to start investigating further.
upvoted 0 times
...
Felton
5 months ago
Okay, let me think this through. Blowfish, 3DES, and MD5 are all well-known encryption algorithms, so the answer must be KILL. I'm feeling good about this one.
upvoted 0 times
...
Candida
5 months ago
Hmm, I'm not sure about that. Exporting to a spreadsheet and creating separate tabs for each combination of criteria seems like it could get really unwieldy, especially with 50,000 installations. I'm leaning more towards the database and custom app approach in option D.
upvoted 0 times
...
Catalina
5 months ago
Okay, I've got this. CRL and OCSP responses need to be signed so their origin can be verified, and then verified to ensure the responses haven't been tampered with. That way, you can trust that the information is coming from a legitimate certificate authority and not a malicious actor. Signing and verification are key.
upvoted 0 times
...

Save Cancel