PMP Domain #3: Executing

The Project Management Professional (PMP) is a registered mark of the Project Management Institute, Inc.


The Project Management Professional®️ (or PMP®️) is a professional credential offered by the Project Management Institute (PMI). PMI’s process assesses the practitioner’s competence based on knowledge and task-driven guidelines and defines the levels of clarity, critical facilities and degree of individual knowledge and competence required to perform in accordance with the industry standards as a project manager.

As the Project Management Body of Knowledge (PMBOK) states: “The Executing Process Group consists of those processes performed to complete the work defined in the project management plan to satisfy the project specifications.” This group integrates and coordinates people and other resources to carry out the project management plan.

AWS Builder Community Hub

In simple language, project execution is about setting a project plan into action. Execution is completely about well-structured deliverables that fulfill the customer needs. In addition, team leaders can make this happen by allocating to competent resources and ensure their focus on assigned tasks. It involves coordination between all members of the team including the team leader.

During the execution phase, the project manager’s role is to oversee all the phases, ensuring that tasks are completed on the timeline and the budget and that he or she acts as an intermediary between the client and the team. The project manager’s responsibility is to execute the project closely, report to the client on the progress and keep them updated about the project in the case of any issues.

Examination Structure

The following table depicts the percentage of total questions, divided per domain. The number of the questions are decided based on the weight given to each domain and comes in multiple-choice format.

Domain Percentage of Items on Test
Initiating 13%
Planning 24%
Executing 31%
Monitoring 25%
Closing 7%
(Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Sumit Bhattacharya. Read the original post at: