Which of the following is the process of defining and analyzing the dangers to individuals, businesses, and government agencies posed by potential natural and human-caused adverse events?
While defining what necessary conditions are required to achieve the business need for a highly regulated government client, a business analyst (BA) discovers that some legacy policies will either constrain or are insufficient to achieve value desired by the future state.
How should the BA proceed?
A new project has to implement a cyber security release in China, Italy, Germany, the United States, and Canada. The project is a $5 million initiative and must 'go live' in production in all countries on the same day and time to be effective.
Which of the approaches mentioned is suitable for this project based on the size and complexity?
Which one of the following diagrams visualize the result of the root cause analysis study?
An innovative pizza restaurant announces a new pizza topping each week. Once advertised, the new topping on the regular dough constitutes the sole pizza type offered during the week. No other pizza toppings are offered.
Which of the following processes is a strong candidate to be addressed while planning for requirements reuse?
A business analyst (BA) plans to hold a workshop next week to elicit requirements for a project. In an informal conversation, another employee mentioned that one of the attendees is likely to be unhappy about the project's impact on their work.
Which of the following techniques will the BA use to avoid disrupting the workshop?