APMG International AgileBA (Agile Business Analysis) Foundation (2015) AgileBA-Foundation Exam Questions in PDF

Free APMG International AgileBA-Foundation Dumps Questions (page: 2)

What technique is used to categorise Stakeholders according to their level of involvement in the project?

  1. Organisation Chart
  2. Management Hierarchy
  3. Power/lnterest Grid
  4. Impact Mapping

Answer(s): C

Explanation:

The technique used to categorize stakeholders according to their level of involvement in the project is the Power/Interest Grid. This technique is essential for identifying which stakeholders need to be managed closely and which can be monitored with less effort. The grid categorizes stakeholders based on their power to influence the project and their interest in the project's success. This categorization helps in devising appropriate stakeholder management strategies by assessing their power and interest levels and planning interactions accordingly.


Reference:

Business Analysis.pdf, "Stakeholder analysis...provides a means of categorising stakeholders in order to identify the most appropriate stakeholder management approach".



What does an Agile project environment require of Stakeholders?

  1. Ownership and Control
  2. Trust and Partnership
  3. Command and Control
  4. Responsibility and Authority

Answer(s): B

Explanation:

An Agile project environment requires stakeholders to exhibit trust and partnership. Agile methodologies emphasize collaboration, transparency, and mutual respect between the project team and stakeholders. This collaborative approach ensures that stakeholders are actively involved in the project, contributing their insights and feedback, which is vital for the project's success. Stakeholders are expected to work closely with the project team, share information openly, and trust the team's decisions, fostering a partnership that supports the project's goals.


Reference:

Business Analysis.pdf, "In an Agile software development environment...the business analyst will be involved in supporting the business users".



What is analysed using the Porter's Five Forces Analysis?

  1. What the organisation is trying to achieve
  2. Things that place a project at a disadvantage
  3. Likelihood of Government changes
  4. Competitive position of an organisation

Answer(s): D

Explanation:

Porter's Five Forces Analysis is used to analyze the competitive position of an organization. This framework helps in evaluating the attractiveness and profitability of an industry by examining five key forces: the threat of new entrants, the bargaining power of suppliers, the bargaining power of buyers, the threat of substitute products or services, and the intensity of competitive rivalry. By understanding these forces, an organization can develop strategies to enhance its competitive position and profitability within its industry.


Reference:

Business Analysis.pdf, "An analysis tool that helps to evaluate an industry's profitability and hence its attractiveness is Michael Porter's Five Forces model".



What statement about the Agile BA role is true?
1. Represents the business view
2. Represents the solution/technical view

  1. Only 1 is true
  2. Only 2 is true
  3. Both 1 and 2 are true
  4. Neither 1 or 2 is true

Answer(s): A

Explanation:

The Agile Business Analyst (BA) role is primarily focused on representing the business view. Agile BAs work closely with stakeholders to understand their needs, clarify requirements, and ensure that the development team delivers solutions that align with business objectives.
While technical knowledge is beneficial, the BA's core responsibility is to bridge the gap between business stakeholders and the development team, ensuring that the final product meets the business requirements and adds value.


Reference:

Business Analysis.pdf, "The role of the business analyst in an Agile environment is explored further in Chapters 10 and 13".



What technique is used to analyse the External Business Environment?

  1. Porter's Five Forces Analysis
  2. Resource Audit
  3. Value Chain and Value Stream
  4. Lean Thinking

Answer(s): A

Explanation:

Porter's Five Forces Analysis is a technique used to analyze the industry or business domain within which an organization operates. It helps to identify the competitive forces that influence the profitability and attractiveness of a market. These forces include the threat of new entrants, the bargaining power of suppliers, the bargaining power of buyers, the threat of substitute products or services, and the intensity of competitive rivalry. This analysis is essential for understanding the external business environment and for strategic planning.


Reference:

Business Analysis.pdf, Chapter 3, Strategy Analysis



Share your comments for APMG International AgileBA-Foundation exam with other users:

D
Damien
9/23/2023 8:37:00 AM

i need this exam pls

N
Nani
9/10/2023 12:02:00 PM

its required for me, please make it enable to access. thanks

E
ethiopia
8/2/2023 2:18:00 AM

seems good..

W
whoAreWeReally
12/19/2023 8:29:00 PM

took the test last week, i did have about 15 - 20 word for word from this site on the test. (only was able to cram 600 of the questions from this site so maybe more were there i didnt review) had 4 labs, bgp, lacp, vrf with tunnels and actually had to skip a lab due to time. lots of automation syntax questions.

V
vs
9/2/2023 12:19:00 PM

no comments

J
john adenu
11/14/2023 11:02:00 AM

nice questions bring out the best in you.

O
Osman
11/21/2023 2:27:00 PM

really helpful

E
Edward
9/13/2023 5:27:00 PM

question #50 and question #81 are exactly the same questions, azure site recovery provides________for virtual machines. the first says that it is fault tolerance is the answer and second says disater recovery. from my research, it says it should be disaster recovery. can anybody explain to me why? thank you

M
Monti
5/24/2023 11:14:00 PM

iam thankful for these exam dumps questions, i would not have passed without this exam dumps.

A
Anon
10/25/2023 10:48:00 PM

some of the answers seem to be inaccurate. q10 for example shouldnt it be an m custom column?

P
PeterPan
10/18/2023 10:22:00 AM

are the question real or fake?

C
CW
7/11/2023 3:19:00 PM

thank you for providing such assistance.

M
Mn8300
11/9/2023 8:53:00 AM

nice questions

N
Nico
4/23/2023 11:41:00 PM

my 3rd purcahse from this site. these exam dumps are helpful. very helpful.

C
Chere
9/15/2023 4:21:00 AM

found it good

T
Thembelani
5/30/2023 2:47:00 AM

excellent material

V
vinesh phale
9/11/2023 2:51:00 AM

very helpfull

B
Bhagiii
11/4/2023 7:04:00 AM

well explained.

R
Rahul
8/8/2023 9:40:00 PM

i need the pdf, please.

C
CW
7/11/2023 2:51:00 PM

a good source for exam preparation

A
Anchal
10/23/2023 4:01:00 PM

nice questions

J
J Nunes
9/29/2023 8:19:00 AM

i need ielts general training audio guide questions

A
Ananya
9/14/2023 5:16:00 AM

please make this content available

S
Swathi
6/4/2023 2:18:00 PM

content is good

L
Leo
7/29/2023 8:45:00 AM

latest dumps please

L
Laolu
2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.

Z
Zaynik
9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer

M
Massam
6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump

A
Anonymous
12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.

J
Japles
5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.

F
Faritha
8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures

A
Anonymous
9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i

P
p das
12/7/2023 11:41:00 PM

very good questions

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

AI Tutor 👋 I’m here to help!