New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PRINCE2-Foundation Exam - Topic 5 Question 12 Discussion

Actual exam question for PRINCE2's PRINCE2-Foundation exam
Question #: 12
Topic #: 5
[All PRINCE2-Foundation Questions]

Which process covers the work done by external suppliers who may NOT be using PRINCE2?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Marguerita
4 months ago
Not convinced, I thought external suppliers were more involved in A.
upvoted 0 times
...
Avery
4 months ago
Totally agree with C! It fits perfectly.
upvoted 0 times
...
Rolande
5 months ago
Wait, are we sure about that? Seems a bit off.
upvoted 0 times
...
Nikita
5 months ago
I thought it was B at first, but C makes more sense.
upvoted 0 times
...
Geraldo
5 months ago
It's definitely C, Managing Product Delivery.
upvoted 0 times
...
Tracey
5 months ago
Closing a Project seems too final for external suppliers, but I guess it could involve them in some way.
upvoted 0 times
...
Devorah
5 months ago
I feel like Directing a Project could involve external suppliers too, but I can't recall the specifics.
upvoted 0 times
...
Hollis
5 months ago
I remember a practice question about project boundaries, so maybe it's Managing a Stage Boundary?
upvoted 0 times
...
Ethan
5 months ago
I think it might be Managing Product Delivery, but I'm not entirely sure if that covers external suppliers.
upvoted 0 times
...
Kris
5 months ago
Hmm, I'm not totally sure about this one. I think B or C could also be examples of Falcon threat hunting leads, but I'm not 100% confident.
upvoted 0 times
...
Leonor
5 months ago
Okay, let me think this through. The company is using personal data to send targeted communications, so I believe the right to object to profiling would be the relevant data subject right in this case.
upvoted 0 times
...
Ezekiel
5 months ago
Okay, I've got this. A corrective control is something that responds to and fixes an issue that has already happened. Based on that, I think the answer is B - logging unsuccessful access attempts for investigation. That's a way to address a security breach after the fact.
upvoted 0 times
...
Luis
6 months ago
I'm a bit unclear about the bandwidth requirements. Was it that the link should be much higher than 10 GB for optimal performance, or was it mainly the latency we were concerned about?
upvoted 0 times
...

Save Cancel