New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PMI-PBA Exam - Topic 2 Question 51 Discussion

Actual exam question for PMI's PMI-PBA exam
Question #: 51
Topic #: 2
[All PMI-PBA Questions]

A business analyst is working on a project's acceptance criteri

a. In an early collaboration with the company's stakeholders, the business analyst identified several user groups within the company:

"Purchaser," "Shipper." "Customer," and "Agent" These user groups categorize stakeholders with similar needs and create a detailed narrative.

Which technique did the business analyst use for evaluating the solution's acceptance criteria?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Mireya
4 months ago
Really? I’m surprised they didn’t mention risk analysis at all!
upvoted 0 times
...
Celestina
4 months ago
Wait, are we sure it’s not job analysis?
upvoted 0 times
...
Edelmira
4 months ago
I thought it might be persona analysis, but this makes sense too.
upvoted 0 times
...
Anissa
4 months ago
Definitely A, it fits the description perfectly.
upvoted 0 times
...
Elina
4 months ago
Sounds like stakeholder analysis to me!
upvoted 0 times
...
Belen
5 months ago
I practiced a question similar to this, and I think stakeholder analysis was the focus. It makes sense to categorize stakeholders like that.
upvoted 0 times
...
Angella
5 months ago
I'm not entirely sure, but I remember something about persona analysis being related to user needs. Could that be the right answer?
upvoted 0 times
...
Jamal
5 months ago
I think the business analyst is using stakeholder analysis since they identified different user groups. It seems to fit the scenario.
upvoted 0 times
...
Galen
5 months ago
Risk analysis doesn't seem relevant here, but I'm confused about job analysis. I don't recall it being used for acceptance criteria.
upvoted 0 times
...
Peter
5 months ago
This is a good one. The trick is going to be enabling the right scopes and access settings to avoid the user having to see the OAuth page. I'll need to think through each option carefully.
upvoted 0 times
...
Chantell
5 months ago
This seems like a straightforward question about securing a key vault. I'll start by reviewing the options and thinking through the best approach.
upvoted 0 times
...

Save Cancel