Browse Certification Practice Tests by Exam Family

PfMP: Portfolio Risk Management

Try 10 focused PfMP questions on Portfolio Risk Management, with answers and explanations, then continue with PM Mastery.

On this page

Open the matching PM Mastery practice page for timed mocks, topic drills, progress tracking, explanations, and full practice.

Topic snapshot

FieldDetail
Exam routePfMP
Topic areaPortfolio Risk Management
Blueprint weight15%
Page purposeFocused sample questions before returning to mixed practice

How to use this topic drill

Use this page to isolate Portfolio Risk Management for PfMP. Work through the 10 questions first, then review the explanations and return to mixed practice in PM Mastery.

PassWhat to doWhat to record
First attemptAnswer without checking the explanation first.The fact, rule, calculation, or judgment point that controlled your answer.
ReviewRead the explanation even when you were correct.Why the best answer is stronger than the closest distractor.
RepairRepeat only missed or uncertain items after a short break.The pattern behind misses, not the answer letter.
TransferReturn to mixed practice once the topic feels stable.Whether the same skill holds up when the topic is no longer obvious.

Blueprint context: 15% of the practice outline. A focused topic score can overstate readiness if you recognize the pattern too quickly, so use it as repair work before timed mixed sets.

Sample questions

These questions are original PM Mastery practice items aligned to this topic area. They are designed for self-assessment and are not official exam questions.

Question 1

Topic: Portfolio Risk Management

A portfolio includes a Customer Digital program that depends on an Identity Platform project delivering single sign-on (SSO). The dependency assumption is that the platform vendor’s API will remain supported through the program’s rollout and that security architects will remain available for integration reviews.

Which approach should the portfolio manager NOT use to monitor this dependency risk and detect when the assumptions are no longer valid?

  • A. Track dependency assumptions with owners and trigger events
  • B. Revalidate the assumptions only after a milestone is missed
  • C. Review dependency indicators in the recurring portfolio risk forum
  • D. Require components to log dependency-impacting changes for escalation

Best answer: B

What this tests: Portfolio Risk Management

Explanation: Dependency risk monitoring relies on actively testing assumptions over time using owners, triggers, and leading indicators. Approaches that only react after a failure use lagging signals and reduce the portfolio’s ability to rebalance early. The portfolio manager should avoid practices that delay assumption validation until the dependency has already caused impact.

At the portfolio level, dependency risks are managed by continuously validating the assumptions that make the dependency “safe” (e.g., vendor roadmap stability, shared specialist capacity). Effective monitoring uses leading indicators and explicit triggers so the portfolio can act before schedule/cost impacts occur (resequence work, add capacity, change scope, or select an alternative solution).

A reactive approach that waits for a missed milestone is an anti-pattern because it detects invalid assumptions only after the dependency has already materialized as an issue. Continuous assumption monitoring should be built into portfolio risk reviews and component reporting so changes (vendor deprecations, staffing shifts, policy changes) are surfaced and escalated early.

Waiting for a miss is lagging detection and can allow invalid dependency assumptions to persist unnoticed.


Question 2

Topic: Portfolio Risk Management

During the quarterly portfolio rebalancing cycle, the portfolio manager must recommend the portfolio management reserve for the next fiscal year.

Portfolio budget (total): \$50.0M
Finance constraint: reserve cannot exceed 3% of budget (\$1.5M)
Risk quantification (aggregated): P50 = \$1.2M, P80 = \$2.2M
Risk appetite statement: “Maintain 80% confidence of not exceeding approved funding.”

The quantitative analysis has been validated with component owners. What is the best next step?

  • A. Prepare a reserve recommendation at the P80 level and present options to close the gap with the 3% cap
  • B. Set the reserve at the P50 estimate to comply with the 3% cap
  • C. Allocate the 3% reserve across components now based on annual spend forecasts
  • D. Direct each component to add contingency to its budget and eliminate the portfolio reserve

Best answer: A

What this tests: Portfolio Risk Management

Explanation: The reserve should be recommended at the confidence level defined by the portfolio’s risk appetite (P80). Because the constraint caps the reserve below the P80 exposure, the next step is to package a recommendation that makes the trade-off explicit and provides governance with actionable options (e.g., exception, risk reduction, or rebalancing).

A portfolio management reserve is set to cover aggregated, portfolio-level uncertainty and should reflect the organization’s risk appetite (here, 80% confidence, which corresponds to a P80-type estimate). Since the validated P80 exposure (<=2.2M) exceeds the finance cap (<=1.5M), the correct sequencing is to formulate a reserve recommendation anchored to the appetite and clearly quantify the shortfall so governance can decide how to reconcile appetite vs. constraints.

Practical packaging for the board includes:

  • Recommended reserve basis (P80) and assumptions
  • The constraint-driven gap and resulting residual risk if capped
  • Decision options (e.g., approve exception, fund risk responses, defer/lower-risk components)

Moving straight to allocation or silently lowering confidence prematurely commits the portfolio without the required risk acceptance decision.

It aligns the reserve to the stated 80% confidence appetite while explicitly addressing the funding constraint through governance decision options.


Question 3

Topic: Portfolio Risk Management

You manage an enterprise digital transformation portfolio. The Customer Portal program (strategic priority: increase self-service revenue in Q3) depends on the new Data Platform project for real-time customer data APIs. A key vendor deliverable for the Data Platform is now forecast 8 weeks late.

Constraints:

  • Regulatory Reporting project must go live by September 30 and cannot lose its assigned team.
  • Hiring freeze: no net-new contractors; only reallocation across current teams.
  • Only one integration team is available for either the Portal or Data Platform at a time.
  • You may approve dependency-risk mitigations up to $150,000; above that requires portfolio board approval.

What is the BEST next action to reduce the dependency risk while preserving strategic alignment?

  • A. Reassign the Regulatory Reporting team to accelerate Data Platform integration
  • B. Decouple the Portal MVP using an interim data interface within $150,000
  • C. Request immediate portfolio board approval to add contractors to Data Platform
  • D. Pause the Portal until the Data Platform vendor deliverable is complete

Best answer: B

What this tests: Portfolio Risk Management

Explanation: The portfolio-level dependency risk is driven by the Portal’s reliance on a delayed Data Platform deliverable. The best action is to reduce the dependency by decoupling and resequencing delivery so the Portal can launch with an interim data solution. Keeping the mitigation within existing capacity and within the portfolio manager’s approval authority preserves alignment and governance.

In dependency analysis, the highest-leverage risk response is often to remove or weaken the dependency path (decouple) or change sequence so value can be realized without waiting on the constrained predecessor. Here, the Data Platform delay threatens a strategically committed Q3 Portal outcome, but capacity is fixed (one integration team) and regulatory delivery is non-negotiable.

A sound next action is to implement a time-boxed interim data interface (e.g., batch sync from an existing source, limited API facade, or constrained feature set) and re-sequence the Portal roadmap to an MVP that does not require the delayed real-time APIs. This directly reduces dependency exposure, fits the capacity constraint, and stays within the manager’s decision rights ($150,000), enabling fast execution while maintaining governance discipline.

Board escalation is reserved for mitigations that exceed authority or materially change strategic commitments.

It reduces the critical dependency through decoupling and resequencing while staying within capacity and approval limits.


Question 4

Topic: Portfolio Risk Management

In portfolio risk management, which statement best defines a portfolio management reserve and its usage rules when briefing governance stakeholders?

  • A. A portfolio-level budget/time set aside for unknown-unknowns, released only through governance approval
  • B. A reserve automatically applied to cover any variance whenever a component exceeds its baseline
  • C. A component-level buffer for known risks that component managers can spend within delegated authority
  • D. An unallocated funding pool used to accelerate any high-scoring work without documenting the trigger

Best answer: A

What this tests: Portfolio Risk Management

Explanation: A portfolio management reserve is intentionally held outside component baselines to address emergent, unforeseeable portfolio-level risk exposure. Its rationale and usage rules emphasize controlled release: predefined triggers, decision rights, and governance approval before funds or time are allocated to specific components.

A portfolio management reserve (often called management reserve) is a portfolio-level allowance for uncertainty that cannot be fully planned into individual components—typically “unknown-unknowns” or emergent portfolio-level impacts. Because it sits outside component cost/schedule baselines, it is not spent at a manager’s discretion. Governance stakeholders should understand that using the reserve requires defined release criteria (triggers), documented rationale, and authorization through the portfolio governance process (e.g., portfolio board or delegated approval thresholds). Once approved and allocated, the reserve is typically converted into authorized funding/time for specific components and tracked through portfolio controls. The key distinction is centralized control and governance-approved release, not automatic coverage of routine variances.

Management reserve is held at the portfolio level for unforeseen risk exposure and is accessed via approved governance decision rights.


Question 5

Topic: Portfolio Risk Management

You are preparing the quarterly funding recommendation for a digital transformation portfolio. The governance board requires the portfolio manager to recommend a portfolio management reserve consistent with stated risk appetite and financial constraints.

Exhibit: Portfolio risk funding summary (cost risk, USD)

QRA (aggregate portfolio cost exposure): P50 = \$0.6M; P80 = \$1.1M
Risk appetite: fund portfolio to P80 confidence
Component contingencies already in approved baselines: \$0.7M
Finance constraint: max additional reserve funding available now: \$0.5M
Finance rule: reserve request must be supported by QRA at chosen confidence

What reserve recommendation should you take to the governance board?

  • A. Request a portfolio management reserve of $0.4M
  • B. Request a portfolio management reserve of $1.1M
  • C. Request the maximum available portfolio management reserve of $0.5M
  • D. Request no portfolio management reserve because contingencies are already funded

Best answer: A

What this tests: Portfolio Risk Management

Explanation: The exhibit shows the organization’s risk appetite is to fund to P80, and the QRA indicates P80 exposure of $1.1M. Since $0.7M of contingency is already embedded in component baselines, the portfolio-level reserve should cover only the remaining gap. The remaining $0.4M is both QRA-supported and within the $0.5M funding limit.

A portfolio management reserve should be sized to the organization’s risk appetite (confidence level) and should avoid double-counting contingency already built into component baselines. Here, the appetite is explicitly P80 and the QRA gives P80 = $1.1M for aggregate portfolio cost exposure. Because $0.7M is already approved as component contingencies, the portfolio-level reserve should cover only the incremental amount needed to reach the targeted confidence:

  • Target funding at P80: $1.1M
  • Less baseline contingencies: $0.7M
  • Additional portfolio reserve needed: $0.4M

This aligns with the finance rule that the request be supported by the QRA at the chosen confidence and fits within the $0.5M available now.

A $0.4M reserve bridges the gap between existing $0.7M contingencies and the P80 exposure of $1.1M while staying within the $0.5M funding constraint.


Question 6

Topic: Portfolio Risk Management

A digital transformation portfolio’s risk register shows a “High” residual risk for a shared identity-and-access (IAM) service used by five components. The IAM owner reports that key controls were implemented last month, and component leads want the portfolio board to remove the risk and reallocate contingency reserves.

Which evidence best validates whether the risk information is current and credible before updating the portfolio risk register?

  • A. A count of risks closed this quarter compared to the prior quarter
  • B. An independent assurance report showing test results for the IAM controls and the resulting residual-risk rating
  • C. Meeting minutes from the IAM rollout checkpoint where the owner stated the controls were implemented
  • D. A dashboard showing the percentage of planned risk responses marked “complete” across the portfolio

Best answer: B

What this tests: Portfolio Risk Management

Explanation: To keep a portfolio risk register credible, updates should be based on objective, verifiable evidence that mitigations actually reduced exposure. Independent assurance or control testing directly validates control effectiveness and supports an updated residual-risk rating. This is stronger than progress statements or aggregate activity measures that do not confirm risk reduction.

Maintaining the portfolio risk register requires validating that reported changes (for example, “controls implemented”) translate into measurable reduction in likelihood/impact and therefore a defensible residual-risk rating. The most credible validation is objective evidence tied to the specific risk and mitigation, ideally produced or verified by an independent function (security assurance, internal audit, compliance testing) and traceable to the control objectives.

In this scenario, control test results:

  • Confirm whether the IAM controls operate as designed
  • Provide evidence of effectiveness (and any gaps)
  • Enable an evidence-based residual-risk reassessment before closing or downgrading the risk

Activity completion and status reporting can support monitoring, but they do not validate that the risk has actually been reduced.

Independent control testing provides objective evidence to confirm whether mitigations are effective and the residual risk rating is still accurate.


Question 7

Topic: Portfolio Risk Management

A portfolio steering committee must decide whether to fast-track a cloud migration program that enables multiple products. Fast-tracking improves time-to-market but increases the likelihood of service disruption during peak season and consumes contingency reserves needed by other components. You are preparing the decision briefing.

Which approach should you NOT use to communicate the risk tradeoffs?

  • A. Show 2–3 scenarios with benefits, impacts, and residual risk
  • B. Link key risks to strategic objectives, dependencies, and constraints
  • C. Present only the probability ratings to avoid “overwhelming” executives
  • D. Confirm risk appetite, then document decision owners and triggers

Best answer: C

What this tests: Portfolio Risk Management

Explanation: Effective portfolio risk communication enables informed choices by making tradeoffs explicit across objectives, capacity, and risk appetite. The steering committee needs options, impacts, and residual risk to compare decisions that shift exposure and reserves across components. A probability-only message obscures implications and biases the decision without transparency.

At the portfolio level, communicating risk tradeoffs means translating uncertainty into decision-relevant comparisons: how each option affects strategic outcomes, capacity, dependencies, and exposure relative to risk appetite. Good briefings make impacts explicit (e.g., service disruption consequences during peak season), show how risk changes under each scenario (including residual risk and required reserves), and clarify what is being traded (time-to-market versus resilience and available contingency for other components). Communication that focuses narrowly on risk scores (like probability alone) strips away impact and context, which can mislead executives into underestimating consequence and cross-component effects. The key is transparency: present alternatives and the implications so stakeholders can consciously accept, mitigate, transfer, or avoid risk within governance.

Probability-only framing hides impact, alternatives, and residual risk, preventing informed tradeoff decisions.


Question 8

Topic: Portfolio Risk Management

You are reviewing the portfolio risk register before the quarterly governance meeting. The portfolio steering committee recently questioned the credibility of reported “mitigation progress.”

Exhibit: Portfolio risk register excerpt

R-12 Cyber compliance delay | Status: On track | Last update: 11 weeks ago | Evidence: None
R-27 Data migration defects | Status: Improving | Last update: 6 days ago | Evidence: Defect trend chart v3
R-31 Vendor insolvency      | Status: Low      | Last update: 9 weeks ago | Evidence: “Vendor said OK”
R-44 Skills capacity gap    | Status: Managed  | Last update: 8 weeks ago | Evidence: TBD

What is the best next action to ensure risk information is current and credible?

  • A. Escalate all “On track” risks to the steering committee
  • B. Increase portfolio contingency reserves for high exposure risks
  • C. Run a portfolio risk data validation and refresh cycle
  • D. Reprioritize the roadmap to remove the highest-risk components

Best answer: C

What this tests: Portfolio Risk Management

Explanation: The exhibit shows multiple risks with old update dates and non-evidence-based support, which undermines credibility. The portfolio manager should trigger a structured validation and refresh of risk data with risk owners (e.g., confirm status, attach objective evidence, and document sources) before presenting to governance. This keeps the risk register current, auditable, and decision-ready.

Maintaining a portfolio risk register includes ensuring each risk’s status is recent and supported by objective, verifiable evidence. In the excerpt, several risks were last updated 8–11 weeks ago and cite weak or missing evidence (“None,” “TBD,” or hearsay), which makes the status ratings unreliable for governance decisions.

A best-practice next action is to perform a targeted risk data quality review:

  • Require risk owners to re-confirm probability/impact and response progress
  • Collect/attach evidence (metrics, audit results, vendor financial reports)
  • Record the source/date and note validation performed
  • Update statuses and confidence levels before the committee meeting

Actions like changing reserves or rebalancing may be appropriate later, but only after the underlying risk information is validated and current.

It directly addresses stale updates and weak evidence by requiring current, verifiable support and updating the register before governance review.


Question 9

Topic: Portfolio Risk Management

A digital transformation portfolio includes a CRM program, a data platform project, and a cybersecurity controls workstream. The CRM go-live (and its Q4 revenue uplift) is dependent on the data platform’s API and the new security controls.

A key vendor for the API announced a likely 6-week delay. The portfolio steering committee meets in 2 days, has 10 minutes for this topic, and must decide whether to re-sequence funding/scope or accept a slip.

What is the BEST way to communicate the dependency risk to enable an informed decision?

  • A. Hold a multi-team dependency workshop before briefing the committee
  • B. Provide a decision brief with dependency map and scenario impacts
  • C. Share the full risk register and integrated master schedule
  • D. Ask component managers to manage the dependency within their plans

Best answer: B

What this tests: Portfolio Risk Management

Explanation: Decision makers need a time-boxed, decision-oriented view of the dependency risk, not raw data or additional forums. A short brief that includes a dependency map and a few scenario outcomes (e.g., accept slip vs. re-sequence vs. scope change) makes the risk, exposure, and tradeoffs explicit. This best supports timely governance action under the 10-minute constraint.

The core concept is translating dependency analysis into an executive-ready artifact that supports a portfolio decision. With limited steering committee time, the portfolio manager should synthesize (not dump) information: show the dependency chain, identify the critical dependency at risk, and present a small set of feasible response scenarios with impacts on benefits timing, cost/capacity, and residual risk. A one-page decision brief paired with a simple dependency map (and a clear recommendation aligned to portfolio objectives and risk appetite) is optimized for speed and governance compliance because it is actionable, auditable, and focused on tradeoffs. Raw registers/schedules are too detailed for the forum, and deferring action to component teams ignores the cross-component nature of dependency risk.

A concise decision brief that visualizes the dependency and quantifies scenario impacts enables fast, governance-ready tradeoffs.


Question 10

Topic: Portfolio Risk Management

You manage a digital transformation portfolio targeting a Q4 launch of a new customer portal. Three projects depend on a shared API platform being “production-ready by July 1” (a documented roadmap assumption). The API platform program now reports a critical security defect and says the July date is “at risk,” but has not provided a revised forecast. Portfolio governance requires escalation when a key dependency milestone variance is expected to exceed 4 weeks, and delivery teams have no capacity for major rework.

What is the BEST next action?

  • A. Immediately rebaseline the portfolio roadmap and reprioritize components
  • B. Direct each project to build a temporary API workaround
  • C. Wait for the next quarterly portfolio review for confirmation
  • D. Run a dependency assumption review with the platform owner

Best answer: D

What this tests: Portfolio Risk Management

Explanation: The portfolio is operating on a dependency assumption that is now questionable, and governance sets an escalation trigger tied to expected variance. The best next action is to quickly revalidate the dependency assumption with the dependency owner and capture an updated forecast. This enables timely updates to dependency risks and decision-making before teams commit scarce capacity to rework.

Monitoring dependency risks means continuously checking whether the assumptions underpinning dependency dates, capabilities, and quality remain valid as new information emerges. Here, the “production-ready by July 1” assumption is threatened by a critical defect and an unclear forecast, and the governance model requires escalation when a likely variance exceeds 4 weeks.

A focused dependency assumption review should:

  • Confirm current status, likely resolution window, and confidence level with the platform owner
  • Update the dependency map and portfolio risk register (assumption invalid/at risk, trigger, impacts)
  • Compare the revised outlook to the escalation threshold and initiate escalation if needed

This validates the dependency before triggering disruptive actions like rebaselining or pushing workarounds into constrained teams.

It validates whether the July readiness assumption is still credible and enables timely risk updates and escalation against the governance threshold.

Continue with full practice

Use the PfMP Practice Test page for the full PM Mastery route, mixed-topic practice, timed mock exams, explanations, and web/mobile app access.

Open the matching PM Mastery practice page for timed mocks, topic drills, progress tracking, explanations, and full practice.

Free review resource

Read the PfMP guide on PMExams.com, then return to PM Mastery for timed practice.

Revised on Thursday, May 14, 2026