New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PMI-RMP Exam - Topic 7 Question 27 Discussion

Actual exam question for PMI's PMI-RMP exam
Question #: 27
Topic #: 7
[All PMI-RMP Questions]

Mary is a project manager in her organization. On her current project she is working with her project team and other key stakeholders to identify the risks within the project. She is currently aiming to create a comprehensive list of project risks so she is using a facilitator to help generate ideas about project risks. What risk identification method is Mary likely using?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Ceola
4 months ago
Wait, is she really using a facilitator? That seems a bit extra!
upvoted 0 times
...
Fletcher
4 months ago
I agree, brainstorming is super effective for risk identification.
upvoted 0 times
...
Freeman
4 months ago
Really? I thought Delphi Techniques would be more effective for this.
upvoted 0 times
...
Ruth
4 months ago
Definitely brainstorming, it's the best way to get ideas flowing.
upvoted 0 times
...
Gene
4 months ago
Sounds like she's using brainstorming!
upvoted 0 times
...
Katina
5 months ago
I practiced a question similar to this, and I think brainstorming was the answer. It just fits the scenario of generating a comprehensive list with a team.
upvoted 0 times
...
Vashti
5 months ago
I feel like checklist analysis is more structured, and it doesn't really involve a facilitator. So, I lean towards brainstorming for this one.
upvoted 0 times
...
Emmett
5 months ago
I'm not entirely sure, but I remember something about the Delphi Technique being used for gathering insights from experts. Maybe that's what she's doing?
upvoted 0 times
...
Luisa
5 months ago
I think Mary is probably using brainstorming since she has a facilitator to help generate ideas. That sounds like a classic approach for risk identification.
upvoted 0 times
...
Haley
5 months ago
I'm pretty sure the answer is B, fundamental breach. That's the type of breach that goes to the heart of the contract and allows the non-breaching party to terminate.
upvoted 0 times
...
Annabelle
5 months ago
I vaguely recall that for total labour mix variance, $66,000 F was a key figure in the material we reviewed, maybe it's the same here?
upvoted 0 times
...
Sabra
5 months ago
This looks like a straightforward networking question. I'll start by reviewing the virtual network and subnets to see if I can identify any potential issues or requirements for the Application Gateway.
upvoted 0 times
...

Save Cancel