Certified Business Analyst Foundation (CBAF) CBAF-001 Exam Dumps

Are you preparing for CBAF-001 Certified Business Analyst Foundation (CBAF) exam. As the key liaison between business and information technology departments, the business analyst is responsible for gathering and documenting business requirements and translating them into functional system design specifications that can be successfully executed by IT development teams. We offer Certified Business Analyst Foundation (CBAF) CBAF-001 Exam Dumps, which can be the best guide for clearing Certified Business Analyst Foundation (CBAF) Certification.

Read Free CBAF-001 Dumps Questions Online Below

1. Given the cashflows below, which of the following is correct?

 
 
 
 

2. The required competencies of a business analyst are classified into three categories.

Which of the following is one of these three categories?

 
 
 
 

3. When should benefits realization be carried out?

 
 
 
 

4. Which of the following statement is TRUE about the process view of an organization?

 
 
 
 

5. As part of an investigation a Business Analyst has devised a form for users of an existing system to use to keep track of the tasks they undertake during their working day.

Which of the following describes this investigation technique?

 
 
 
 

6. On a class diagram, what do the multiplicities represent?

 
 
 
 

7. A well-formed requirement is said to comply with which of the following acronyms?

 
 
 
 

8. Which stage in the waterfall model is considered as several separate stages in the V model?

 
 
 
 

9. Which of the following terms may be used to describe the attitude of a stakeholder who is NOT in favour of the project but is probably not actively opposed to it?

 
 
 
 

10. It has been suggested that five clerical posts can be abolished when a new computer system is implemented. Under which category of costs or benefits will this be recorded?

 
 
 
 

11. During which stage of the Business Analysis Process Model would a gap analysis be carried out?

 
 
 
 

12. A stakeholder has been classified as ‘some’ on both the power/influence and interest axes of a power/ interest grid.

Which of the following would be an appropriate way of managing this stakeholder?

 
 
 
 

13. What is the first stage of the waterfall systems development lifecycle?

 
 
 
 

14. Different reactions may be observed when a change to working methods is proposed.

These reactions include:

a. Enthusiasm for the change.

b. Fear of the change.

c. Reduced performance on the job.

d. Reluctant acceptance of the change.

Which of the following represents the typical sequence of these four reactions?

 
 
 
 

15. Business rules define how actions are to be performed.

Under which of the following headings are business rules considered?

 
 
 
 

16. What does the 0′ stand for in the CATVVOE analysis?

 
 
 
 

17. In a particular organization it is common practice to call all managers by their first name. It is part of the culture of the organization. Newcomers are quickly corrected if they do not follow this informal approach.

What would knowing about this convention be classified as in Requirements Engineering?

 
 
 
 

18. In which of the following business analysis areas does the traditional systems analyst role primarily operate?

 
 
 
 

19. A batch program runs every night to raise invoices. The next day these invoices are posted out to customers by a clerk. Customers pay the invoices with cheques.

The cheques are then banked by a clerk. In this scenario, which of the following represents a business event?

 
 
 
 

20. Which of the following investigation techniques involves following a user for one or two days in order to find out what a particular job entails?

 
 
 
 

21. A system holds information about an employee; Mike Berry.

Which of the following is Mike Berry an example of?

 
 
 
 

22. An analyst is defining the requirements for an online booking system and wishes to show the business managers the look and feel of the system in order to elicit usability requirements.

What investigation technique should the analyst use?

 
 
 
 

23. A business analyst has identified that one of the use cases on a use case diagram contains a large amount of optional processing. This optional processing is so large that he has decided to remove it to a separate use case which can be called by the original use case if required.

How should the original use case be linked to the new use case?

 
 
 
 

24. An organization called Quality Signs’ makes display signs for commercial customers.

Which of the following are MOST likely to be the Actors in a CATWOE analysis?

 
 
 
 

25. Which of the following models shows the driving and resisting forces of change?

 
 
 
 

26. Which of the following statements is TRUE?

 
 
 
 

27. Which of the following techniques can be used to pull together the results of an analysis of the external and internal business environment of an organization?

 
 
 
 

28. The following requirement has been identified; The system must be able to record customer payments.

What type of requirement is this?

 
 
 
 

29. Which of the following BEST describes an ethnographic study?

 
 
 
 

30. Which stage of the Requirements Engineering process is concerned with tracking requirements from inception to implementation?

 
 
 
 

31. A process model has been produced which includes diamond-shaped symbols.

What does this diamond-shaped symbol represent in the model?

 
 
 
 

32. An analyst has discovered that a company wishes to hold information about departments and employees. A department may have many employees in it, but each employee can, at any one time, only work in one department. There is no requirement to store historical information.

However, there are currently eight departments and over one hundred employees.

How would this relationship be shown on an Entity Relationship diagram?

 
 
 
 

33. When running workshops, it is useful to have someone with a role that includes specific responsibility for keeping attendees focused on achieving the objective of the workshop.

Which of the following terms describes this role?

 
 
 
 

34. In which of the following circumstances do buyers have high bargaining power?

 
 
 
 

35. An analyst investigating a finance system wishes to build rapport with individual stakeholders and investigate in detail each stakeholder’s views.

Which of the following techniques should the analyst use?

 
 
 
 

36. It is unclear to a project sponsor why a particular requirement has been included in a recently released version of a system.

Which of the following will allow him to identify who originally asked for the requirement?

 
 
 
 

37. In a business activity model, which of the following type of activities respond to deviations between actual and planned performance?

 
 
 
 

38. A convenience food manufacturer has undertaken a strategic analysis study and has identified a threat from groups lobbying against the use of packaging for food products.

Which of the PESTLE categories would have helped highlight this threat?

 
 
 
 

39. One of the stages of the Business Activity Process Model is ‘Consider the perspectives’.

Which of the following would be particularly relevant in this stage?

 
 
 
 

40. Which of the following is a primary activity in the value chain?

 
 
 
 

41. A system must hold the price of every product sold by the company.

Which of the following is the price likely to be?

 
 
 
 

42. What is stage 0 (zero) of the concerns-based adoption model?

 
 
 
 

43. The Boston Box may be used to analyse the portfolio of businesses owned by an organization.

Which of the following animals does it use in its term for businesses that have low market share in a market with low growth?

 
 
 
 

44. Which of the following describes a ‘rich picture’?

 
 
 
 

45. Which of the following may be used to document the outcomes of a workshop?

 
 
 
 

46. The V model is an example of which of the following?

 
 
 
 

47. Which of the following is a primary activity in the value chain?

 
 
 
 

48. The term ‘happy day’ is often used in the context of which of the following investigation techniques?

 
 
 
 

49. What is the MoSCoW principle used for?

 
 
 
 

50. A software house is developing a software package specifically for hotel management. A business analyst has been employed because of her familiarity with the hotel industry.

Which of the following competencies has she been employed to bring to the project?

 
 
 
 

51. Every night at midnight a batch process is invoked to invoice all orders received that day.

How will the time midnight be represented on a use case diagram?

 
 
 
 

52. Which of the following types of activity help identify the KPI’s of an organization?

 
 
 
 

53. Which of the following requirements elicitation techniques is ineffective at defining the future requirements of a system?

 
 
 
 

54. Which of the following statements about outsourcing of systems development is correct?

 
 
 
 

55. Which of the following is a perceived advantage of using workshops to investigate requirements?

 
 
 
 

56. Style guides, manuals and job descriptions are examples of what type of knowledge?

 
 
 
 

57. What do the arrow headed lines between activities represent on a business activity model?

 
 
 
 

58. Which of the following stages is immediately after problem-finding in lsaksen and Treffinger’s creative problem-solving model?

 
 
 
 

59. Which of the following models might include the documentation of scenarios?

 
 
 
 

60. Which of the following describes the objectives in a MOST analysis?

 
 
 
 

61. A stakeholder in a project has been classified as having no interest but high power/influence on the power/ interest grid.

Which of the following would be an appropriate way of managing this stakeholder?

 
 
 
 

62. Which of the following is likely to be shown as a process in a swim-lane diagram of a library book borrowing system?

 
 
 
 

63. The Business Activity Model shows the doing activities of a business system.

Which element of CATWOE do these activities relate to?

 
 
 
 

64. Which of the following statements about change and change management is correct?

 
 
 
 

Certified Professional Ethical Hacker (CPEH) CPEH-001 Dumps

Add a Comment

Your email address will not be published. Required fields are marked *