Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IIBA ECBA Exam - Topic 4 Question 69 Discussion

Actual exam question for IIBA's ECBA exam
Question #: 69
Topic #: 4
[All ECBA Questions]

When planning elicitation activities, which technique could be used to determine the possible participants and their roles?

Show Suggested Answer Hide Answer
Suggested Answer: B

BABOK v.3.0 -- IIBA (31)

Contribute your Thoughts:

0/2000 characters
Reid
4 months ago
Data mining? Really? That seems off for this context.
upvoted 0 times
...
Kirk
4 months ago
A is the best choice, no doubt about it!
upvoted 0 times
...
Latanya
4 months ago
Wait, can you really use personas for this? Sounds odd.
upvoted 0 times
...
Precious
5 months ago
I think C could work too, roles are key.
upvoted 0 times
...
Lemuel
5 months ago
Definitely A, stakeholder maps are super helpful!
upvoted 0 times
...
Gilberto
5 months ago
Risk analysis and management seems off-topic for this. I recall similar questions where stakeholder mapping was emphasized as key for elicitation activities.
upvoted 0 times
...
Kayleigh
5 months ago
I feel like data mining is more about analyzing existing data rather than identifying participants. It doesn't seem like the best fit for this question.
upvoted 0 times
...
Keva
5 months ago
I'm not entirely sure, but I remember something about a roles and permissions matrix being useful for defining roles. Maybe that's relevant here?
upvoted 0 times
...
Jonell
6 months ago
I think the stakeholder list, map, or personas is the right choice. We talked about it in class as a way to identify participants.
upvoted 0 times
...
Clarence
6 months ago
This is a tricky one. I'm not entirely sure which options will maximize CPU performance consistency. I'll need to review my notes on resource controls and think through how each one impacts the CPU before making my selections.
upvoted 0 times
...
Victor
6 months ago
I'm not entirely sure, but it seems like there could be a compilation error due to the use of `this?>a`. Should it be `this->a` instead?
upvoted 0 times
...
Becky
6 months ago
I'm leaning towards B, the month prior to expiration. That's when the time value of the option is highest, and the holder can potentially benefit the most from any price movements in the underlying stock.
upvoted 0 times
...
Fabiola
6 months ago
Seccomp is the key here. It allows you to define a whitelist of system calls that a container is allowed to make, effectively limiting its access to the host. A is the correct answer.
upvoted 0 times
...
Stephaine
6 months ago
I think the boot loader is located in the MBR, right? That sounds familiar.
upvoted 0 times
...
Leah
11 months ago
I'm just hoping the exam question isn't as confusing as a stakeholder matrix. Talk about a tangled web!
upvoted 0 times
Reyes
9 months ago
A) Stakeholder list, map, or personas
upvoted 0 times
...
Hershel
9 months ago
C) Roles and permissions matrix
upvoted 0 times
...
Cordelia
10 months ago
A) Stakeholder list, map, or personas
upvoted 0 times
...
...
Deeanna
11 months ago
I'm not sure, but I think C) Roles and permissions matrix could also be used to determine participants.
upvoted 0 times
...
Monte
11 months ago
I agree with Christoper, because stakeholders are key participants in elicitation activities.
upvoted 0 times
...
Tyra
11 months ago
D) Risk analysis and management? Nah, that's more about identifying and mitigating issues, not figuring out who's who.
upvoted 0 times
Cherry
10 months ago
C) Roles and permissions matrix could also help in identifying who should be involved in the elicitation activities.
upvoted 0 times
...
Keva
11 months ago
A) Stakeholder list, map, or personas would be the best choice to determine possible participants and their roles.
upvoted 0 times
...
...
Christoper
11 months ago
I think the answer is A) Stakeholder list, map, or personas.
upvoted 0 times
...
Madalyn
11 months ago
I prefer C) Roles and permissions matrix, it helps clarify the roles and responsibilities of each participant.
upvoted 0 times
...
Ozell
11 months ago
B) Data mining? Really? I thought this was about planning, not sifting through data. Not my pick.
upvoted 0 times
...
Nickolas
11 months ago
I agree with Marta, having a stakeholder list helps identify who should be involved.
upvoted 0 times
...
Marta
11 months ago
I think A) Stakeholder list, map, or personas would be the best technique.
upvoted 0 times
...
Jackie
11 months ago
C) Roles and permissions matrix? That's for managing access, not determining participants. Hmm, tough one.
upvoted 0 times
Sherly
11 months ago
D) Risk analysis and management is important but not for determining participants.
upvoted 0 times
...
Sylvia
11 months ago
C) Roles and permissions matrix is more about access control.
upvoted 0 times
...
Louvenia
11 months ago
B) Data mining might provide insights into potential participants.
upvoted 0 times
...
Karan
11 months ago
A) Stakeholder list, map, or personas could help identify possible participants.
upvoted 0 times
...
...
Karol
11 months ago
A) Stakeholder list, map, or personas seems the obvious choice here. Gotta know who's involved, right?
upvoted 0 times
...

Save Cancel