Professional in Business Analysis (PMI-PBA) Sample Questions

  1. Home
  2. Professional in Business Analysis (PMI-PBA) Sample Questions
Professional in Business Analysis (PMI-PBA) Sample Questions

The skill of business analysis has become increasingly important to project management. While opportunities for BAs are expanding, earning accreditation as a business analysis (BA) expert might help the candidate’s career take a new turn. The PMI Professional In Business Analysis (PMI-PBA)® Certification recognises a person’s proficiency in business analysis, including the use of these tools and approaches to advance projects more swiftly overall. A high level of professional credibility is also associated with the PMI Professional in Business Analysis (PMI-PBA) certification. It requires a combination of business analysis education, practical project experience, and research into the theories, methods, and instruments of business analysis. The article provides a list of Professional in Business Analysis (PMI-PBA) Sample Questions that cover core exam topics including –

  • Domain 1. Needs Assessment 18%
  • Domain 2. Planning 22%
  • Domain 3. Analysis 35%
  • Domain 4. Traceability and Monitoring 15%
  • Domain 5. Evaluation 10%

Advanced Sample Questions

An organization is planning to launch a new product in the market. The business analyst is responsible for conducting market research to determine the feasibility of the product. What is the most appropriate method the business analyst can use to conduct the market research?

  • A) Focus groups
  • B) Surveys
  • C) Interviews
  • D) Observation

Answer: B) Surveys

Explanation: Surveys are a common method for gathering information about a large group of people. In this case, the business analyst can use surveys to gather information from potential customers about their interest in the new product and their perceived need for it. This information can then be used to make informed decisions about the feasibility of the product launch.

A business analyst is working on a project to automate a manual process within an organization. The business analyst has identified several potential solutions, but needs to determine the best one. What technique can the business analyst use to make this determination?

  • A) Root cause analysis
  • B) Cost-benefit analysis
  • C) SWOT analysis
  • D) Stakeholder analysis

Answer: B) Cost-benefit analysis

Explanation: Cost-benefit analysis is a method used to evaluate the potential costs and benefits of a project or solution. In this case, the business analyst can use this technique to compare the potential costs and benefits of each of the identified solutions and determine which one provides the best return on investment for the organization.

A business analyst is working on a project to implement a new software system within an organization. The business analyst has gathered requirements from stakeholders and has documented them in a requirements document. What is the next step the business analyst should take?

  • A) Develop a project plan
  • B) Create a prototypes
  • C) Conduct a feasibility study
  • D) Obtain approval from stakeholders

Answer: A) Develop a project plan

Explanation: Once the requirements have been gathered and documented, the next step for the business analyst is to develop a project plan. This plan should outline the steps needed to implement the new software system, including tasks, schedules, and resources. The project plan will help ensure that the implementation is completed on time, within budget, and to the satisfaction of stakeholders.

A business analyst is working on a project to improve customer satisfaction within an organization. The business analyst has identified several potential solutions to improve customer satisfaction. What is the most appropriate technique for the business analyst to use to prioritize these solutions?

  • A) Cost-benefit analysis
  • B) Decision matrix
  • C) Root cause analysis
  • D) PERT analysis

Answer: B) Decision matrix

Explanation: A decision matrix is a tool used to evaluate and prioritize options by considering a set of criteria. In this case, the business analyst can use a decision matrix to evaluate and prioritize the potential solutions for improving customer satisfaction based on factors such as feasibility, impact, and cost.

A business analyst is working on a project to improve the efficiency of a process within an organization. The business analyst has completed a process mapping to identify areas for improvement. What is the next step the business analyst should take after completing the process mapping?

  • A) Develop a project plan
  • B) Conduct a root cause analysis
  • C) Conduct a gap analysis
  • D) Obtain approval from stakeholders

Answer: C) Conduct a gap analysis

Explanation: A gap analysis is a technique used to identify the difference between the current state and the desired state of a process. In this case, the business analyst can use a gap analysis to identify the differences between the current process and the desired, more efficient process, and determine the necessary steps to close that gap.

A business analyst is working on a project to implement a new system within an organization. The business analyst has gathered requirements from stakeholders and has documented them in a requirements document. What is the most appropriate technique for the business analyst to use to validate the requirements?

  • A) Focus groups
  • B) User acceptance testing
  • C) Surveys
  • D) Interviews

Answer: B) User acceptance testing

Explanation: User acceptance testing is a technique used to determine if the requirements gathered from stakeholders are complete and accurate. In this case, the business analyst can use user acceptance testing to validate that the new system meets the needs and expectations of the stakeholders. This testing typically involves a representative group of stakeholders who will use the system in a controlled environment to ensure that it meets their needs.

An organization is undergoing a change and the business analyst is responsible for managing the impact of this change on employees. What technique should the business analyst use to manage this impact?

  • A) Root cause analysis
  • B) Change management
  • C) Cost-benefit analysis
  • D) Stakeholder analysis

Answer: B) Change management

Explanation: Change management is a process used to manage the impact of change on individuals and organizations. In this case, the business analyst can use change management techniques to manage the impact of the change on employees. This may include communicating the change, addressing concerns, and providing training and support to help employees transition to the new way of working.

A business analyst is working on a project to improve the accuracy of financial reporting within an organization. The business analyst has identified several potential solutions, but needs to determine the best one. What technique can the business analyst use to make this determination?

  • A) Root cause analysis
  • B) Cost-benefit analysis
  • C) SWOT analysis
  • D) Stakeholder analysis

Answer: B) Cost-benefit analysis

Explanation: Cost-benefit analysis is a method used to evaluate the potential costs and benefits of a project or solution. In this case, the business analyst can use this technique to compare the potential costs and benefits of each of the identified solutions and determine which one provides the best return on investment for the organization, while improving the accuracy of financial reporting.

An organization is undergoing a process improvement initiative and the business analyst is responsible for identifying opportunities for improvement. What technique should the business analyst use to identify these opportunities?

  • A) Root cause analysis
  • B) Cost-benefit analysis
  • C) SWOT analysis
  • D) Process mapping

Answer: D) Process mapping

Explanation: Process mapping is a technique used to visually represent a process and identify opportunities for improvement. In this case, the business analyst can use process mapping to visualize the current process and identify areas where improvements can be made. This includes identifying bottlenecks, inefficiencies, and areas where errors are likely to occur, which can then be addressed as part of the process improvement initiative.

Basic Sample Questions

Q1)A business analyst has been requested to look at an issue. The results of this inquiry will help create a business case. The business analyst first seeks to comprehend the current business procedures of the company. Which approach ought the business analyst to take?

  • A. MoSCoW
  • B. RACI matrix
  • C. Observation
  • D. User stories

Correct Answer: C

Q2)The creation of a solution scope is a joint effort between the client and the business analyst. It is crucial that the client in Professional in Business Analysis (PMI-PBA):

  • A. take the time necessary to specify, elaborate, and provide needs.
  • B. Only convey modifications to requirements once they have been fully specified.
  • C. analyse potential alternatives for implementing the requirements.
  • D. contest analyses of requirements’ costs and viability.

Correct Answer: A

Q3)At a nearby pizza joint, automated order entry software is being implemented under the direction of a business analyst. The ordering process takes too long and frequently results in inaccurate orders, thus the business analyst has very little knowledge about the project. What action needs to be taken by the business analyst next?

  • A. Locate testing tools to assist with implementation.
  • B. Inquire about the present ordering procedure and compare it to that of comparable businesses.
  • C. Decide which programme to use and begin utilising the technological resources.
  • D. Arrange a requirements gathering meeting with the ordering department manager.

Correct Answer: D

Q4)The business analyst discovers a project objective with no corresponding requirement after the project has been completed. What could have been done to identify this problem prior to delivery?

  • A. Context diagram
  • B. Use cases
  • C. Tracing requirements
  • D. Process flow

Correct Answer: C

Q5)Performance degradation is occurring during regular business hours on five out of four S servers running a certain corporate storage solution. The workload characteristics are similar across all 48 servers. Your business storage is made up of various disc groups. What needs to be tracked in order to identify the root cause?

  • A. IOPS per RAID array
  • B. Cache read hit ratio
  • C. Traffic levels on the SAN switches
  • D. Clone sessions

Correct Answer: A

Q6)Instead of LUN 0, a new server must begin from LUN 1. Which HBA configuration needs to be set up?

  • A. Selectable Boot
  • B. Persistent Binding
  • C. Enable Target Reset
  • D. LUNs per Target

Correct Answer: A

Q7)You are informed by a line of business (LOB) executive that a new application must experience 99.999% (five 9s) of uptime from both scheduled and unplanned outages in order to avoid breaching a service level objective (SLO). How much downtown can you visit each week?

  • A. 20.16 minutes
  • B. .605 seconds
  • C. 5.04 minutes
  • D. 6.06 seconds

Correct Answer: D

Q8)Within a corporate SAN, just one server out of several has subpar performance. High disc timeout values have been discovered by the server administrator without a reduction in throughput. There are several ways for the server to access the storage system, but only one is open at the moment. To aid in troubleshooting, what should the storage administrator keep an eye on?

  • A. Errors on the active storage port in number
  • B. The active storage port’s IOPS
  • C. MBps on the active storage port, category
  • D. The amount of buffers used by the current storage port

Correct Answer: A

Q9)As a consultant, you have been retained to assist in resolving boot-from-SAN server reboots. In the same zones are the company’s hosts, storage units, and tape drives. RSCNs are produced in abundance during the backup window. What is the issue’s root cause?

  • A. Compared to hosts or disc storage devices, tape drives are more vulnerable to RSCNs.
  • B. Tape drives and storage devices are set up in the same zone.
  • C. Compared to hosts or tape storage devices, storage devices are more vulnerable to RSCNs.
  • D. The majority of SAN switches do not support simultaneous transit of disc and tape frames across the same switch ports.

Correct Answer: B

Q10)A subsystems for storage Web browser management interface remotely opens a service request with the vendor and states that the subsystem has deteriorated. Your storage subsystem’s level three storage support engineer from your vendor requests remote access to troubleshoot. A SNIA Storage Security Best Current Practices solution: what exactly is it?

  • A. Allow the vendor’s support engineer access to the Web browser management interface by opening firewall ports.
  • B. Provide a temporary user ID with sudo access to the storage subsystem to the vendor’s support engineer; this assures an audit trail for all remote support actions.
  • C. Set up a shared remote control session with the vendor’s support engineer so you can observe what they are doing while troubleshooting the subsystem without having to exchange credentials.
  • D. Give the vendor’s support engineer a temporary user ID so they can connect remotely over HTTP/TLS to the Web browser management interface.

Correct Answer: C

Q11)Which standard would be implemented to improve compatibility between the products of various cloud storage providers?

  • A. SES
  • B. CDMI
  • C. CWDM
  • D. DWDM

Correct Answer: B

Q12)You provided a LUN to another server connected to the same FC fabric, and then you find out while debugging a problem on that host that the existing file system partition has been corrupted. What led to this issue in the first place?

  • A. Incorrect zoning
  • B. Incorrect LUN masking
  • C. Incorrect multipathing policy
  • D. Incorrect LUN size

Correct Answer: B

Q13)Which two aspects of high availability can be attained with remote storage replication? (Select two.)

  • A. Recoverability
  • B. Fault tolerance
  • C. Robustness
  • D. Redundancy
  • E. Serviceability

Correct Answer: A and D

Q14)With one enterprise SAN-attached storage system, some business-critical database applications have been experiencing slowly worsening performance difficulties. The applications in particular exhibit longer than usual read response times. To identify the underlying problem, what should the storage administrator keep an eye on?

  • A. Storage utilization
  • B. Available free space
  • C. Write response time
  • D. Cache hit rate

Correct Answer: D

Q15)Tapes are encrypted by your firm using a cryptographic key system. An IT audit uncovers that encryption keys have unintentionally been kept as ciphertext on file shares to which everyone in the firm has read permission after years of use and thousands of tapes being transferred to off-site locations. Which answer complies with industry best practises?

  • A. All information encrypted using the keys made public in ciphertext should be regarded as secure.
  • B. All material that has not yet been transmitted off-site as an encrypted cassette but has been encrypted with the keys exposed as ciphertext should be re-keyed (decrypted and re-encrypted using a new key).
  • C. The encryption keys for all data that has been encrypted with them should be re-keyed (decrypted and re-encrypted using a new key).
  • D. Given how difficult it is to decipher ciphertext, all data encrypted using keys that have been made public should be regarded as secure.

Correct Answer: C

Q16)You get a ticket from a database group complaining about one specific server’s storage access being slower than other servers in an active-active cluster. You confirm that zoning and LUN masking are working properly. You check the link speed, faults, and throughput for the FC switch ports that this server uses on the FC switch. The ports are clear of faults and have the same link speed as switch ports utilised by other servers in the cluster. You observe that there is zero throughput on one port of the FC switch being used by this server. What is the root of the issue in Professional in Business Analysis (PMI-PBA)?

  • A. The switch’s firmware is outdated.
  • B. The FC switch’s ports are being used excessively.
  • C. Load-balancing was not set up for multipathing.
  • D. There is a switch over-subscription.

Correct Answer: C

Q17)On a storage array made up of 7,200 rpm SATA discs, you are requested to construct a LUN. Each drive has a 100 IOPS rating. The LUN must deliver at least 1100 IOPS and be able to handle numerous drive failures with the fewest possible discs. Which RAID level and how many drives should you use to build this LUN?

  • A. 11 drives and RAID 0
  • B. 12 drives and RAID 5
  • C. 13 drives and RAID 6
  • D. 22 drives and RAID 1

Correct Answer: C

Q18)What protocol is frequently applied to CNA devices?

  • A. FCIP
  • B. iFCP
  • C. FCoE
  • D. FCR

Correct Answer: C

Q19)During switch SFP replacement, a server with a dual-ported HBA is unable to access the storage. Future occurrences of this need to be avoided. Which move should you make?

  • A. Use zoning
  • B. Enable trunking.
  • C. Use LUN masking
  • D. Configure multipathing

Correct Answer: D

Q20)A security audit identifies issues with the FC zoning procedures used by your company. Your management requests your opinion on how to adopt the safest FC zoning strategy. Switches are being used by your business from a single provider. What do you suggest?

  • A. For all setups, all zones should only use frame-based hardware enforcement with pWWN identification.
  • B. For all setups, all zones should only use software-based enforcement using pWWN identification.
  • C. For all setups, all zones should only use frame-based hardware enforcement with destination port identification.
  • D. For all setups, all zones should only use software-based enforcement that uses destination port identification.

Correct Answer: A

Professional in Business Analysis (PMI-PBA) Free practice test

Menu