The risk register is developed during the initial phases of a virtualized desktop deployment. The register is reviewed by peers, responses are planned, reviewed again, and risks are prioritized. After project completion, the risk register is reviewed as part of the formal lessons learned process. During the review, itis realized that the risk register was not updated, and many responses were not executed during the deployment.

The risk register is developed during the initial phases of a virtualized desktop deployment. The register is reviewed by peers, responses are planned, reviewed again, and risks are prioritized. After project completion, the risk register is reviewed as part of the formal lessons learned process. During the review, itis realized that the risk register was not updated, and many responses were not executed during the deployment.
Which of the following options should have been performed during the execution of the project?
A. Risk monitoring and control process
B. Risk management process
C. Risk identification
D. Response planning

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.