Sunday, February 16, 2020

CRISC Certified in Risk and Information Systems Control Exam

ISACA’s Certified in Risk and Information Systems Control (CRISC) certification indicates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. Gain instant recognition and credibility with CRISC and boost your career!

THE CRISC DIFFERENCE
Whether you are seeking a new career opportunity or striving to grow within your current organization, a CRISC certification proves your expertise in these work-related domains

PREPARE FOR THE EXAM
Set yourself up to succeed on exam day. Whether you prefer to prep on your own time or want the additional guidance and interaction that comes with live instruction, we have the right CRISC test prep solutions for you.

Course Description
The CRISC Online Review Course is an online preparation course that prepares learners to pass the CRISC certification exam using proven instructional design techniques and interactive activities.The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice.

The course incorporates video, interactive eLearning modules, downloadable, interactive workbooks, downloadable job aids, case study activities, and pre-and post-course assessments. Learners will be able to navigate the course at their own pace, following a recommended structure, or target preferred job practice areas. Learners may also start and stop the course based on their study schedule, picking up exactly where they left off the next time they access the course.

Learning Objectives:

At the completion of this course you will be able to:
Identify the IT risk management strategy in support of business objectives and alignment with the Enterprise Risk Management (ERM) strategy.
Analyze and evaluate IT risk to determine the likelihood and impact on business objectives to enable risk-based decision making.
Determine risk response options and evaluate their efficiency and effectiveness to manage risk in alignment with business objectives.
Continuously monitor and report on IT risk and controls to relevant stakeholders to ensure the continued efficiency and effectiveness of the IT risk management strategy and its alignment with business objectives.

Included Materials:
Video
Interactive Content
Downloadable workbooks and job aids
Case study activities
Practice exam

Ideal For:
Professionals preparing to become CRISC certified
Risk practitioners
Students or recent graduates

Cancellation/Refund Policy
All purchases of online learning courses are final. Access to the online learning courses and materials is immediate upon purchasing; therefore no refunds or exchanges will be provided. Prices subject to change without notice.

Enterprise Training
Online review courses are also available for purchase through our enterprise sales team for larger organizations. Visit the Enterprise Training page and reach out to an associate for more information.

QUESTION 1
Which of the following is the MOST important reason to maintain key risk indicators (KRIs)?

A. In order to avoid risk
B. Complex metrics require fine-tuning
C. Risk reports need to be timely
D. Threats and vulnerabilities change over time

Correct Answer: D

Explanation:
Threats and vulnerabilities change over time and KRI maintenance ensures that KRIs continue to effectively
capture these changes.
The risk environment is highly dynamic as the enterprise's internal and external environments are constantly
changing. Therefore, the set of KRIs needs to be changed over time, so that they can capture the changes in
threat and vulnerability.
Incorrect Answers:
A: Risk avoidance is one possible risk response. Risk responses are based on KRI reporting, but is not the
reason for maintenance of KRIs.
B: While most key risk indicator (KRI) metrics need to be optimized in respect to their sensitivity, the most
important objective of KRI maintenance is to ensure that KRIs continue to effectively capture the changes in
threats and vulnerabilities over time. Hence the most important reason is that because of change of threat and
vulnerability overtime.
C: Risk reporting timeliness is a business requirement, but is not a reason for KRI maintenance.

QUESTION 2
You are the project manager of a HGT project that has recently finished the final compilation process. The
project customer has signed off on the project completion and you have to do few administrative closure
activities. In the project, there were several large risks that could have wrecked the project but you and your
project team found some new methods to resolve the risks without affecting the project costs or project
completion date. What should you do with the risk responses that you have identified during the project's
monitoring and controlling process?

A. Include the responses in the project management plan.
B. Include the risk responses in the risk management plan.
C. Include the risk responses in the organization's lessons learned database.
D. Nothing. The risk responses are included in the project's risk register already.

Correct Answer: C

Explanation:
The risk responses that do not exist up till then, should be included in the organization's lessons learned
database so other project managers can use these responses in their project if relevant.

Incorrect Answers:
A: The responses are not in the project management plan, but in the risk response plan during the project and
they'll be entered into the organization's lessons learned database.
B: The risk responses are included in the risk response plan, but after completing the project, they should be
entered into the organization's lessons learned database.
D: If the new responses that were identified is only included in the project's risk register then it may not be
shared with project managers working on some other project.

QUESTION 3
You are the project manager of GHT project. You have identified a risk event on your project that could save
$100,000 in project costs if it occurs. Which of the following statements BEST describes this risk event?

A. This risk event should be mitigated to take advantage of the savings.
B. This is a risk event that should be accepted because the rewards outweigh the threat to the project.
C. This risk event should be avoided to take full advantage of the potential savings.
D. This risk event is an opportunity to the project and should be exploited.

Correct Answer: D

Explanation:
This risk event has the potential to save money on project costs, so it is an opportunity, and the appropriate
strategy to use in this case is the exploit strategy. The exploit response is one of the strategies to negate risks
or threats appear in a project. This strategy may be selected for risks with positive impacts where the
organization wishes to ensure that the opportunity is realized. Exploiting a risk event provides opportunities for
positive impact on a project. Assigning more talented resources to the project to reduce the time to completion
is an example of exploit response.

Incorrect Answers:
A, C: Mitigation and avoidance risk response is used in case of negative risk events, and not in positive risk
events. Here in this scenario, as it is stated that the event could save $100,000, hence it is a positive risk
event. Therefore should not be mitigated or avoided.
B: To accept risk means that no action is taken relative to a particular risk; loss is accepted if it occurs. But as
this risk event bring an opportunity, it should me exploited and not accepted.

QUESTION 4
You are the project manager of a large construction project. This project will last for 18 months and will cost
$750,000 to complete. You are working with your project team, experts, and stakeholders to identify risks
within the project before the project work begins. Management wants to know why you have scheduled so
many risk identification meetings throughout the project rather than just initially during the project planning.
What is the best reason for the duplicate risk identification sessions?

A. The iterative meetings allow all stakeholders to participate in the risk identification processes throughout the project phases.
B. The iterative meetings allow the project manager to discuss the risk events which have passed the project and which did not happen.
C. The iterative meetings allow the project manager and the risk identification participants to identify newly discovered risk events throughout the project.
D. The iterative meetings allow the project manager to communicate pending risks events during project execution.

Correct Answer: C

Explanation:
Risk identification is an iterative process because new risks may evolve or become known as the project progresses through its life cycle.

Incorrect Answers:
A: Stakeholders are encouraged to participate in the risk identification process, but this is not the best choice.
B: Risk identification focuses on discovering new risk events, not the events which did not happen.
D: The primary reason for iterations of risk identification is to identify new risk events.

QUESTION 5
You are the risk official in Bluewell Inc. You are supposed to prioritize several risks. A risk has a rating for
occurrence, severity, and detection as 4, 5, and 6, respectively. What Risk Priority Number (RPN) you would give to it?

A. 120
B. 100
C. 15
D. 30

Correct Answer: A

Explanation:
Steps involving in calculating risk priority number are as follows:
Identify potential failure effects
Identify potential causes
Establish links between each identified potential cause
Identify potential failure modes
Assess severity, occurrence and detection
Perform score assessments by using a scale of 1 -10 (low to high rating) to score these assessments.
Compute the RPN for a particular failure mode as Severity multiplied by occurrence and detection.
RPN = Severity * Occurrence * Detection
Hence,
RPN = 4 * 5 * 6
= 120
Incorrect Answers:
B, C, D: These are not RPN for given values of severity, occurrence, and detection.
QUESTION 6
Which of the following is the MOST important use of KRIs?
A. Providing a backward-looking view on risk events that have occurred
B. Providing an early warning signal
C. Providing an indication of the enterprise's risk appetite and tolerance
D. Enabling the documentation and analysis of trends

Correct Answer: B

Explanation:
Key Risk Indicators are the prime monitoring indicators of the enterprise. KRIs are highly relevant and possess
a high probability of predicting or indicating important risk. KRIs help in avoiding excessively large number of
risk indicators to manage and report that a large enterprise may have.
As KRIs are the indicators of risk, hence its most important function is to effectively give an early warning
signal that a high risk is emerging to enable management to take proactive action before the risk actually
becomes a loss.
Incorrect Answers:
A: This is one of the important functions of KRIs which can help management to improve but is not as
important as giving early warning.
C: KRIs provide an indication of the enterprise's risk appetite and tolerance through metric setting, but this is
not as important as giving early warning.
D: This is not as important as giving early warning.
Click here to view complete Q&A of Isaca CRISC exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best Isaca CRISC Certification, Isaca CRISC Training at certkingdom.com

Thursday, February 6, 2020

PSM-I Professional Scrum Master I Exam

Prove Your Scrum Knowledge and Get Certified
The Professional Scrum MasterTM level I (PSM I) assessment is available to anyone who wishes to validate his or her depth of knowledge of the PictureScrum framework and its application. Those who pass the assessment will receive the industry recognized PSM I Certification to demonstrate their fundamental level of Scrum mastery.

Taking a course is not required and if you feel that you already possess a high level of Scrum knowledge, understanding of the Scrum Guide and how to apply Scrum within Scrum Teams, you have the option to take the PSM I assessment directly. However, there are courses available to help you prepare for the assessment and gain a stronger understanding of Scrum. Depending on your role, either the 2-day Professional Scrum Foundations or Professional Scrum Master course is highly recommended.

Prepare for the Assessment
The assessment is difficult; preparation is required to achieve a passing score. Reading the Scrum Guide and taking the Open Assessments alone isn't typically enough preparation and we recommend reviewing the content below:

The assessment covers topics from multiple Focus Areas defined by the Professional Scrum Competencies.
Many questions ask you to think about or interpret the meaning from the Scrum Guide and how you would apply Scrum within a Scrum Team.
The PSM I Suggested Reading lists the Focus Areas from which questions may be selected during the assessment.
The Scrum Master Learning Path contains many additional resources to help you prepare to take the PSM I Assessment.

Search the list of existing Professional Scrum certification holders here or see a breakdown on how many people hold certifications.

To protect the integrity of the certification process, Scrum.org does not share information about the specific questions that were answered correctly or incorrectly. Learn More

The cost of PSM I is $150 USD. Assessment passwords are valid for one attempt, do not expire and remain valid until used. See below for more details.

Details
Fee: $150 USD per attempt
Passing score: 85%
Time limit: 60 minutes
Number of Questions: 80
Format: Multiple Choice, Multiple Answer and True/False
Difficulty: Intermediate
Language: English only
Scrum Resources
Required course: None
Recommended courses: Professional Scrum Foundations or Professional Scrum Master
PSM Subject Areas
Practice Assessment: Scrum Open
Ways to Learn More to help you prepare
Passwords have no expiration date, but are valid for one attempt only

When you purchase a password, it is set up in our system and emailed to you within one business day. All Students in a PSM or PSF course are emailed a password upon completion of the course (typically within 3-5 business days).**

Certification
If you pass the PSM I assessment you will receive the industry-recognized "PSM I" certification, along with a PSM I logo that you can use to identify your achievement. In addition, your name will be posted publicly for colleagues, managers, and potential employers to see.

Unlike other Scrum certifications that require only class attendance, Scrum.org certification requires a minimum score on an online assessment. Attending a course is neither required nor sufficient for certification. This gives Scrum.org certification teeth and ensures that it has true value in the marketplace.

Search the list of Professional Scrum Certificate Holders


QUESTION 1
When many Scrum Teams are working on the same product, should all of their increments be integrated every Sprint?

A. Yes, but only for Scrum Teams whose work has dependencies.
B. Yes, otherwise the Product Owners (and stakeholders) may not be able to accurately inspect what is done.
C. No, each Scrum Team stands alone.
D. No, that is far too hard and must be done in a hardening Sprint.

Correct Answer: B

QUESTION 2
When can a Development Team cancel a Sprint?

A. It can’t. Only Product Owners can cancel Sprints.
B. When functional expectations are not well understood.
C. When the Product Owner is absent too often.
D. When the selected Product Backlog items for the Sprint become unachievable.
E. When a technical dependency cannot be resolved.

Correct Answer: A

QUESTION 3
Which output from Sprint Planning provides the Development Team with a target and overarching direction for the Sprint?

A. The Sprint Backlog.
B. The Sprint Goal
C. The release plan.
D. Sprint Review minutes.

Correct Answer: B

QUESTION 4
How should a Development Team deal with non-functional requirements?

A. Ensure every Increment meets them.
B. Make sure the release department understands these requirements, but it is not the Development Team’s responsibility.
C. Handle them during the Integration Sprint preceding the Release Sprint.
D. Assign them to the lead developers on the team.

Correct Answer: A

QUESTION 5
When is a Sprint over?

A. When the Product Owner says it is done.
B. When all Product Backlog items meet their definition of “Done”.
C. When all the tasks are completed.
D. When the time-box expires.

Correct Answer: D


Click here to view complete Q&A of PSM-I exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best Scrum Master PSM-I Certification, Scrum Master Certification PSM-I Training at certkingdom.com

ACP-600 Project Administration in Jira Server Exam

Certification | Jira Project Admins / Jira Admins | JIRA / JIRA Software

Capable Project Administrators are essential to the optimal functioning of Jira in large organizations.
Certified Jira Project Administrators are the power users who know how to configure projects and boards, customize workflows and manage project permissions in their organization's Jira Server or Data Center instance. They live in Jira day-to-day, and can help scale their instance to meet the demand of their business, so their Jira Administrator and teams can get more work done.

Six months' exposure to Jira is recommended before taking the training course.

Exam Number ACP-600
LANGUAGES English, Japanese, Korean
TIME WINDOW You must complete the exam within 60 days of your purchase of the course.
Location Proctored online at your own location
Products Jira Software Server Enterprise Releases
Registration Availability
Price USD $100 for course + exam voucher bundle
Exam Time 180 minutes
Passing Score 63% (effective 15 March 2019)
Questions Up to 75

Important Concepts to Master
Which configurations (schemes, versions, components, etc) are shared versus unique
when new projects are (1) created from template or (2) with a shared configuration?
Who can change a Project Key, and what are the effects on issues in the project?
Which project details can be added and changed by Project Administrators?
What are the uses of Project Category in Jira?
What features are available for Jira Software projects, and to users who have Jira
Software application access (as compared to just Jira Core)?
What is the importance of the Browse Projects permission?

How do combinations of permissions work together to enable specific actions? For example:
• What permissions are needed to Move Issues?
• What permissions are needed to Edit or Delete All Worklogs?
• What permissions are needed to rank issues in the backlog?
• What permissions are needed to assign issues to yourself?
• What requirements must a user meet in order to use a particular workflow transition?
What is an Issue Collector and what permissions are needed to configure it?
Where are all the places you need to look to fully identify what permissions a particular user has?
What are the use cases where it is best to use Project Roles rather than Groups?
Which business requirements necessitate the use of separate issue types in a project (e.g. different screens, workflows, etc.)?
What is the relationship between screens, screen schemes and issue type screen schemes?
• How are they related to field configurations?
• How do you determine the maximum number of screens possibly used in a
project (for issue operations and workflow transitions)?
• Who can make changes to screens, screen schemes and issue type screen schemes?
What are all the various factors that influence whether a field is visible on a screen?
When is it best to use components, and when is it best to use a custom field instead?
What are the features, uses, limitations/restrictions of workflow changes, especially the Simplified Workflow?
1. Who can change the Simplified Workflow? What are the limitations on changes to the Simplified Workflow?
2. What changes can be performed on statuses and transitions?
3. What things may need to be updated as a result of workflow changes of any kind?
4. What workflow changes can be done through the board by board administrators?
5. What types of workflow changes can Project Administrators make if Extended
Project Administration is enabled?
How do these settings affect notifications?
• AutoWatch setting
• My Changes setting
• Share This Issue
• @Mentions
• Filter Subscriptions
What are the configuration options for all the out-of-box reports and gadgets (except Agile reports and gadgets)? What is their behavior and expected results?
How are valid JQL queries written? What operators and arguments are valid for various JQL functions (e.g. membersOf(), StartOfDay(), WAS, CHANGED, etc.)
Which export options are available are available from the Issue Navigator?

Exam Topics
Roles, Permissions and Issue Level Security
􀀀 Given business requirements, determine appropriate permissions for project team members
􀀀 Determine if and how issue-level security should be configured in a project
􀀀 Manage project role membership
􀀀 Troubleshoot issues with roles, permissions and issue security and escalate if required Project Configuration
􀀀 Describe how versions are managed in Jira
􀀀 Given requirements, determine how to create and configure project components and auto assignment
􀀀 Describe how to manage general project configurations (e.g., project details, project sidebar)
􀀀 Describe the use of schemes and the implications of using project templates Issue Types, Workflows, Fields, Screens and Notifications
􀀀 Given business requirements, determine the appropriate issue types
􀀀 Given business requirements, determine the appropriate Jira workflow configuration
􀀀 Given a scenario, determine the appropriate method to edit project workflows to meet business needs
􀀀 Given business requirements, determine appropriate screen configuration
􀀀 Given business requirements, determine appropriate field configuration
􀀀 Given business requirements, determine if and how to add fields to project screens
􀀀 Given business requirements, recommend the appropriate project notifications
􀀀 Troubleshoot issues with notifications, workflows, fields and screens Reports, Dashboards and JQL
􀀀 Determine an appropriate dashboard configuration
􀀀 Identify the appropriate project reports
􀀀 Translate business requirements into appropriate JQL queries Global Configuration
􀀀 Given a scenario, select changes to issue links, time tracking, priorities and resolutions

QUESTION 1
For the DEV project, Max has these requirements relating to time logging:
I need to be able to edit time logs.
I need to be able to delete time logs.
Which three project permissions does Max need in order to meet these requirements? (Choose three.)

A. Schedule Issues
B. Edit All Worklogs
C. Move Issues
D. Delete All Worklogs
E. Work On Issues
F. Edit All Comments

Correct Answer: B,D,E

QUESTION 2
Indicate which two use cases require the use of issue-level security within a project. (Choose two.)

A. Only managers should be able to see Critical issues in the project.
B. Only managers should be able to choose who sees certain issues in the project.
C. Only managers should be able to see the project.
D. Only managers should be able to set the Due Date on issues in the project.
E. Only managers should be able to Close issues in the project.

Correct Answer: B,C

QUESTION 3
Which two can project administrators associate with project roles? (Choose two.)

A. Security levels
B. Application access
C. Global permissions
D. Groups
E. Individual users
F. Project permissions

Correct Answer: A,D

QUESTION 4
Martina is unable to perform the following actions in the App project:
Create and manage versions
Create and manage components
Rank issues in the backlog
The App project does not use a shared permission scheme.
Which two permissions will allow her to perform those actions? (Choose two.)

A. Transition Issues
B. Move Issues
C. Administer Projects
D. Bulk Change
E. Schedule Issues

Correct Answer: C,E

QUESTION 5
All projects use a shared permission scheme.
The Browse Projects permission needs to be updated. Project administrators need to be able to manage access to their own projects.
What entry should be added to the Browse Projects permission?

A. Group
B. Project lead
C. Project Role
D. Single user
E. Application access

Correct Answer: B
Click here to view complete Q&A of ACP-600 exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig

Wednesday, February 5, 2020

A00-240 SAS Certified Statistical Business Analyst Using SAS 9: Regression and Modeling Credential Exam

Regression and Modeling
Designed for SAS professionals who use SAS/STAT® software to conduct and interpret complex statistical data analysis
Successful candidates should have experience in:
Analysis of variance.
Linear and logistic regression.
Preparing inputs for predictive models.
Measuring model performance.

ANOVA - 10%
Verify the assumptions of ANOVA
Analyze differences between population means using the GLM and TTEST procedures
Perform ANOVA post hoc test to evaluate treatment effect
Detect and analyze interactions between factors

Linear Regression - 20%
Fit a multiple linear regression model using the REG and GLM procedures
Analyze the output of the REG, PLM, and GLM procedures for multiple linear regression models
Use the REG or GLMSELECT procedure to perform model selection
Assess the validity of a given regression model through the use of diagnostic and residual analysis

Logistic Regression - 25%
Perform logistic regression with the LOGISTIC procedure
Optimize model performance through input selection
Interpret the output of the LOGISTIC procedure
Score new data sets using the LOGISTIC and PLM procedures

Prepare Inputs for Predictive Model Performance - 20%
Identify the potential challenges when preparing input data for a model
Use the DATA step to manipulate data with loops, arrays, conditional statements and functions
Improve the predictive power of categorical inputs
Screen variables for irrelevance and non-linear association using the CORR procedure
Screen variables for non-linearity using empirical logit plots

Measure Model Performance - 25%
Apply the principles of honest assessment to model performance measurement
Assess classifier performance using the confusion matrix
Model selection and validation using training and validation data
Create and interpret graphs (ROC, lift, and gains charts) for model comparison and selection
Establish effective decision cut-off values for scoring

ANOVA - 10%
Verify the assumptions of ANOVA
 Explain the central limit theorem and when it must be applied
 Examine the distribution of continuous variables (histogram, box-whisker, Q-Q plots)
 Describe the effect of skewness on the normal distribution
 Define H0, H1, Type I/II error, statistical power, p-value
 Describe the effect of sample size on p-value and power
 Interpret the results of hypothesis testing
 Interpret histograms and normal probability charts
 Draw conclusions about your data from histogram, box-whisker, and Q-Q plots
 Identify the kinds of problems may be present in the data: (biased sample, outliers, extreme values)
 For a given experiment, verify that the observations are independent
 For a given experiment, verify the errors are normally distributed
 Use the UNIVARIATE procedure to examine residuals
 For a given experiment, verify all groups have equal response variance
 Use the HOVTEST option of MEANS statement in PROC GLM to asses response variance

Analyze differences between population means using the GLM and TTEST procedures
 Use the GLM Procedure to perform ANOVA
o CLASS statement
o MODEL statement
o MEANS statement
o OUTPUT statement

 Evaluate the null hypothesis using the output of the GLM procedure
 Interpret the statistical output of the GLM procedure (variance derived from MSE, F value, p-value R**2, Levene's test)
 Interpret the graphical output of the GLM procedure
 Use the TTEST Procedure to compare means

Perform ANOVA post hoc test to evaluate treatment effect
 Use the LSMEANS statement in the GLM or PLM procedure to perform pairwise comparisons
 Use PDIFF option of LSMEANS statement
 Use ADJUST option of the LSMEANS statement (TUKEY and DUNNETT)
 Interpret diffograms to evaluate pairwise comparisons
 Interpret control plots to evaluate pairwise comparisons
 Compare/Contrast use of pairwise T-Tests, Tukey and Dunnett comparison methods

Detect and analyze interactions between factors
 Use the GLM procedure to produce reports that will help determine the significance of the interaction between factors. MODEL statement
 LSMEANS with SLICE=option (Also using PROC PLM)
 ODS SELECT
 Interpret the output of the GLM procedure to identify interaction between factors: p-value
 F Value
 R Squared
 TYPE I SS
 TYPE III SS

Linear Regression - 20%

Fit a multiple linear regression model using the REG and GLM procedures
 Use the REG procedure to fit a multiple linear regression model
 Use the GLM procedure to fit a multiple linear regression model

Analyze the output of the REG, PLM, and GLM procedures for multiple linear regression models
 Interpret REG or GLM procedure output for a multiple linear regression model: convert models to algebraic expressions
 Convert models to algebraic expressions
 Identify missing degrees of freedom
 Identify variance due to model/error, and total variance
 Calculate a missing F value
 Identify variable with largest impact to model
 For output from two models, identify which model is better
 Identify how much of the variation in the dependent variable is explained by the model
 Conclusions that can be drawn from REG, GLM, or PLM output: (about H0, model quality, graphics)

Use the REG or GLMSELECT procedure to perform model selection
 Use the SELECTION option of the model statement in the GLMSELECT procedure
 Compare the different model selection methods (STEPWISE, FORWARD, BACKWARD)
 Enable ODS graphics to display graphs from the REG or GLMSELECT procedure
 Identify best models by examining the graphical output (fit criterion from the REG or GLMSELECT procedure)
 Assign names to models in the REG procedure (multiple model statements)

Assess the validity of a given regression model through the use of diagnostic and residual analysis
 Explain the assumptions for linear regression
 From a set of residuals plots, asses which assumption about the error terms has been violated
 Use REG procedure MODEL statement options to identify influential observations (Student Residuals, Cook's D, DFFITS, DFBETAS)
 Explain options for handling influential observations
 Identify collinearity problems by examining REG procedure output
 Use MODEL statement options to diagnose collinearity problems (VIF, COLLIN, COLLINOINT)

Logistic Regression - 25%
Perform logistic regression with the LOGISTIC procedure
 Identify experiments that require analysis via logistic regression
 Identify logistic regression assumptions
 logistic regression concepts (log odds, logit transformation, sigmoidal relationship between p and X)
 Use the LOGISTIC procedure to fit a binary logistic regression model (MODEL and CLASS statements)

Optimize model performance through input selection
 Use the LOGISTIC procedure to fit a multiple logistic regression model
 LOGISTIC procedure SELECTION=SCORE option
 Perform Model Selection (STEPWISE, FORWARD, BACKWARD) within the LOGISTIC procedure

Interpret the output of the LOGISTIC procedure
 Interpret the output from the LOGISTIC procedure for binary logistic regression models: Model Convergence section
 Testing Global Null Hypothesis table
 Type 3 Analysis of Effects table
 Analysis of Maximum Likelihood Estimates table
 Association of Predicted Probabilities and Observed Responses

Score new data sets using the LOGISTIC and PLM procedures
 Use the SCORE statement in the PLM procedure to score new cases
 Use the CODE statement in PROC LOGISTIC to score new data
 Describe when you would use the SCORE statement vs the CODE statement in PROC LOGISTIC
 Use the INMODEL/OUTMODEL options in PROC LOGISTIC
 Explain how to score new data when you have developed a model from a biased sample

Prepare Inputs for Predictive Model Performance - 20%

Identify the potential challenges when preparing input data for a model
 Identify problems that missing values can cause in creating predictive models and scoring new data sets
 Identify limitations of Complete Case Analysis
 Explain problems caused by categorical variables with numerous levels
 Discuss the problem of redundant variables
 Discuss the problem of irrelevant and redundant variables
 Discuss the non-linearities and the problems they create in predictive models
 Discuss outliers and the problems they create in predictive models
 Describe quasi-complete separation
 Discuss the effect of interactions
 Determine when it is necessary to oversample data

Use the DATA step to manipulate data with loops, arrays, conditional statements and functions
 Use ARRAYs to create missing indicators
 Use ARRAYS, LOOP, IF, and explicit OUTPUT statements

Improve the predictive power of categorical inputs
 Reduce the number of levels of a categorical variable
 Explain thresholding
 Explain Greenacre's method
 Cluster the levels of a categorical variable via Greenacre's method using the CLUSTER procedure

o METHOD=WARD option
o FREQ, VAR, ID statement
o Use of ODS output to create an output data set

 Convert categorical variables to continuous using smooth weight of evidence

Screen variables for irrelevance and non-linear association using the CORR procedure
 Explain how Hoeffding's D and Spearman statistics can be used to find irrelevant variables and non-linear associations
 Produce Spearman and Hoeffding's D statistic using the CORR procedure (VAR, WITH statement)
 Interpret a scatter plot of Hoeffding's D and Spearman statistic to identify irrelevant variables and non-linear associations

Screen variables for non-linearity using empirical logit plots
 Use the RANK procedure to bin continuous input variables (GROUPS=, OUT= option; VAR, RANK statements)
 Interpret RANK procedure output
 Use the MEANS procedure to calculate the sum and means for the target cases and total events (NWAY option; CLASS, VAR, OUTPUT statements)
 Create empirical logit plots with the SGPLOT procedure
 Interpret empirical logit plots

Measure Model Performance - 25%
Apply the principles of honest assessment to model performance measurement
 Explain techniques to honestly assess classifier performance
 Explain overfitting
 Explain differences between validation and test data
 Identify the impact of performing data preparation before data is split

Assess classifier performance using the confusion matrix
 Explain the confusion matrix
 Define: Accuracy, Error Rate, Sensitivity, Specificity, PV+, PV-
 Explain the effect of oversampling on the confusion matrix
 Adjust the confusion matrix for oversampling

Model selection and validation using training and validation data
 Divide data into training and validation data sets using the SURVEYSELECT procedure
 Discuss the subset selection methods available in PROC LOGISTIC
 Discuss methods to determine interactions (forward selection, with bar and @ notation)
 Create interaction plot with the results from PROC LOGISTIC
 Select the model with fit statistics (BIC, AIC, KS, Brier score)

Create and interpret graphs (ROC, lift, and gains charts) for model comparison and selection
 Explain and interpret charts (ROC, Lift, Gains)
 Create a ROC curve (OUTROC option of the SCORE statement in the LOGISTIC procedure)
 Use the ROC and ROCCONTRAST statements to create an overlay plot of ROC curves for two or more models
 Explain the concept of depth as it relates to the gains chart

Establish effective decision cut-off values for scoring
 Illustrate a decision rule that maximizes the expected profit
 Explain the profit matrix and how to use it to estimate the profit per scored customer
 Calculate decision cutoffs using Bayes rule, given a profit matrix
 Determine optimum cutoff values from profit plots
 Given a profit matrix, and model results, determine the model with the highest average profit

Note: All 22 main objectives will be tested on every exam. The 126 expanded objectives are provided for additional explanation and define the entire domain that could be tested.

QUESTION 1
When mean imputation is performed on data after the data is partitioned for honest assessment, what is the most appropriate method for handling the mean imputation?

A. The sample means from the validation data set are applied to the training and test data sets.
B. The sample means from the training data set are applied to the validation and test data sets.
C. The sample means from the test data set are applied to the training and validation data sets.
D. The sample means from each partition of the data are applied to their own partition.

Correct Answer: B

QUESTION 2
An analyst generates a model using the LOGISTIC procedure. They are now interested in getting the
sensitivity and specificity statistics on a validation data set for a variety of cutoff values.
Which statement and option combination will generate these statistics?

A. Score data=valid1 out=roc;
B. Score data=valid1 outroc=roc;
C. mode1 resp(event= '1') = gender region/outroc=roc;
D. mode1 resp(event"1") = gender region/ out=roc;

Correct Answer: B

QUESTION 3
In partitioning data for model assessment, which sampling methods are acceptable? (Choose two.)
A. Simple random sampling without replacement
B. Simple random sampling with replacement
C. Stratified random sampling without replacement
D. Sequential random sampling with replacement
Correct Answer: AC

QUESTION 4
An analyst has a sufficient volume of data to perform a 3-way partition of the data into training, validation, and test sets to perform honest assessment during the model building process.
What is the purpose of the training data set?

A. To provide an unbiased measure of assessment for the final model.
B. To compare models and select and fine-tune the final model.
C. To reduce total sample size to make computations more efficient.
D. To build the predictive models.

Correct Answer: A

QUESTION 5
The total modeling data has been split into training, validation, and test data. What is the best data to use for model assessment?

A. Training data
B. Total data
C. Test data
D. Validation data

Correct Answer: D
Click here to view complete Q&A of A00-240 exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best SAS Institute A00-240 Certification, SAS Institute Certification A00-240 Training at certkingdom.com