• support@dumpspool.com

SPECIAL LIMITED TIME DISCOUNT OFFER. USE DISCOUNT CODE TO GET 20% OFF DP2021

PDF Only

$35.00 Free Updates Upto 90 Days

  • CGEIT Dumps PDF
  • 573 Questions
  • Updated On July 20, 2024

PDF + Test Engine

$60.00 Free Updates Upto 90 Days

  • CGEIT Question Answers
  • 573 Questions
  • Updated On July 20, 2024

Test Engine

$50.00 Free Updates Upto 90 Days

  • CGEIT Practice Questions
  • 573 Questions
  • Updated On July 20, 2024
Check Our Free Isaca CGEIT Online Test Engine Demo.

How to pass Isaca CGEIT exam with the help of dumps?

DumpsPool provides you the finest quality resources you’ve been looking for to no avail. So, it's due time you stop stressing and get ready for the exam. Our Online Test Engine provides you with the guidance you need to pass the certification exam. We guarantee top-grade results because we know we’ve covered each topic in a precise and understandable manner. Our expert team prepared the latest Isaca CGEIT Dumps to satisfy your need for training. Plus, they are in two different formats: Dumps PDF and Online Test Engine.

How Do I Know Isaca CGEIT Dumps are Worth it?

Did we mention our latest CGEIT Dumps PDF is also available as Online Test Engine? And that’s just the point where things start to take root. Of all the amazing features you are offered here at DumpsPool, the money-back guarantee has to be the best one. Now that you know you don’t have to worry about the payments. Let us explore all other reasons you would want to buy from us. Other than affordable Real Exam Dumps, you are offered three-month free updates.

You can easily scroll through our large catalog of certification exams. And, pick any exam to start your training. That’s right, DumpsPool isn’t limited to just Isaca Exams. We trust our customers need the support of an authentic and reliable resource. So, we made sure there is never any outdated content in our study resources. Our expert team makes sure everything is up to the mark by keeping an eye on every single update. Our main concern and focus are that you understand the real exam format. So, you can pass the exam in an easier way!

IT Students Are Using our Certified in the Governance of Enterprise IT Exam Dumps Worldwide!

It is a well-established fact that certification exams can’t be conquered without some help from experts. The point of using Certified in the Governance of Enterprise IT Exam Practice Question Answers is exactly that. You are constantly surrounded by IT experts who’ve been through you are about to and know better. The 24/7 customer service of DumpsPool ensures you are in touch with these experts whenever needed. Our 100% success rate and validity around the world, make us the most trusted resource candidates use. The updated Dumps PDF helps you pass the exam on the first attempt. And, with the money-back guarantee, you feel safe buying from us. You can claim your return on not passing the exam.

How to Get CGEIT Real Exam Dumps?

Getting access to the real exam dumps is as easy as pressing a button, literally! There are various resources available online, but the majority of them sell scams or copied content. So, if you are going to attempt the CGEIT exam, you need to be sure you are buying the right kind of Dumps. All the Dumps PDF available on DumpsPool are as unique and the latest as they can be. Plus, our Practice Question Answers are tested and approved by professionals. Making it the top authentic resource available on the internet. Our expert has made sure the Online Test Engine is free from outdated & fake content, repeated questions, and false plus indefinite information, etc. We make every penny count, and you leave our platform fully satisfied!

Frequently Asked Questions

Isaca CGEIT Sample Question Answers

Question # 1

Which of the following strategic issues in the IFAC report highlight the underlying success and failure of enterprises? Each correct answer represents a complete solution. Choose all that apply.

A. Ability to provide service feedback to providers
B. Strategy execution
C. Ability to undertake successful mergers and acquisitions
D. Clarity of strategy

Question # 2

Which of the following is a family of ISO standards for Total Quality Management (TQM)?

A. ISO 20000
B. ISO 9000
C. ISO 38500
D. ISO 27001

Question # 3

Which of the following objectives are used by the system to decrease costs or revenues?

A. Increasing production rates
B. Decreasing production and operating costs
C. Improving product quality
D. Creating new distribution channels 

Question # 4

In which of the following editions of COBIT was "Management Guidelines" added?

A. The third edition
B. The first edition
C. The fourth edition
D. The second edition 

Question # 5

In which of the following components of the COSO ERM are the policies and procedures established and implemented to help ensure that the risk responses are effectively carried out?

A. Control activity
B. Risk assessment
C. Risk response
D. Event identification

Question # 6

Which of the following processes contained in the Portfolio Management domain of Val IT establishes an investment threshold?

A. PM4
B. PM7
C. PM6
D. PM5

Question # 7

Which of the following quadrant analysis identifies the key issues of working well with other functions, IT value realization over time rather than-just cost, and being business processfocused but solution driven?

A. Low level role (tactical/utility) and business market leader (risk-taker/high growth)
B. High level role (strategic/transformational) and business market leader (risktaker/high growth)
C. High level role (strategic/transformational) and business market followers (riskaverse/mature)
D. Low level role (tactical/utility) and business market followers (risk-averse/mature)

Question # 8

Which of the following service delivery processes has the goal to produce, agreed on, timely, reliable, and accurate reports for the effective communication?

A. Service level management
B. Service reporting
C. Information security management
D. Capacity management

Question # 9

Which of the following components of COSO ERM framework encompasses the nature of an enterprise, and sets the basis for how risk is viewed and addressed by an organization people, including risk management philosophy and risk appetite, integrity and ethical values, and the environment in which it operates?

A. Risk response
B. Risk assessment
C. Control activity
D. Internal environment

Question # 10

Which of the following functions of HR department is liable for policy creation, policy communication, record creation, and HR information systems?

A. Compensation and benefit
B. Personnel policy
C. Analysis and design for work
D. Support for strategy

Question # 11

Which of the following phases of IT lifecycle is governed by a series of stages and gates for managing the lifecycle of projects?

A. IT project phase
B. IT process phase
C. IT asset phase
D. IT discovery phase

Question # 12

Which of the following risk functions ensures the product/service alignment with the customer requirements?

A. Accounting
B. Marketing
C. Strategic planning
D. Credit 

Question # 13

Which of the following is concerned with fairness and transparency?

A. Continual Service Improvement
B. Service Support
C. Service Strategy
D. Governance

Question # 14

Which of the following examples are included in the general controls embedded in IT processes and services? Each correct answer represents a complete solution. Choose all that apply.

A. Completeness
B. Change management
C. Systems development
D. Accuracy

Question # 15

Which of the following individuals provides the funding, and want to see the return on their investment and strategic alignment with their strategic objectives?

A. Compliance officers
B. Internal auditors
C. Business partners
D. Product suppliers 

Question # 16

Which of the following categories describes the value added by the process divided by the value of the labor and capital consumed?

A. Quality
B. Timeliness
C. Quantity
D. Productivity

Question # 17

Which of the following activity loops describes improvement of the existing processes?

A. Loop 3
B. Loop 4
C. Loop 1
D. Loop 2 

Question # 18

Which of the following has the tendency or inclination of outlook that is a troublesome source of error in human sensing?

A. Defect
B. Bias (of measurement)
C. Vulnerability
D. Risk

Question # 19

Which of the following phases of IT lifecycle occurs during the concept and idea stages of basic research?

A. IT asset phase
B. IT discovery phase
C. IT process phase
D. IT project phase

Question # 20

Which of the following factors influence the operating environment of an enterprise? Each correct answer represents a complete solution. Choose all that apply.

A. Mission, vision and values of an enterprise
B. Outcome measures
C. Stakeholders values
D. Industry practices 

Question # 21

Which of the following attributes are the COBIT's generic maturity model attributes? Each correct answer represents a complete solution. Choose all that apply.

A. Policies, plans and procedures
B. Tools and automation
C. Awareness and communication
D. Availability and accessibility

Question # 22

Which of the following processes contained in the Value Governance domain of Val IT establishes the organizational structures?

A. VG7
B. VG9
C. VG6
D. VG8

Question # 23

You are using the IT BSC management tool to apply the practices of IT BSC to the IT function. You want to perform the following functions:  -Deliver value -Manage cost -Manage risks -Achieve intercompany synergies  Which process of the IT BSC Measurement tool will you use?

A. Future Orientation
B. Operational excellence
C. Corporate contribution
D. Customer Orientation

Question # 24

Which of the following activity loops emphasizes on monitoring and deciding processes?

A. Loop 2
B. Loop 4
C. Loop 3
D. Loop 1

Question # 25

Which of the following phases in SDLC provides the basis for acquiring the resources needed to achieve a solution?

A. Design
B. Planning
C. Development
D. Initiation

Question # 26

Which of the following processes uses statistical evidence to determine progress toward specific defined organizational objectives?

A. Resource management
B. Risk management
C. Value delivery
D. Performance measurement 

Question # 27

Which of the following is the process of identifying and assessing factors that may jeopardize the success of a project or the achievement of a goal?

A. Risk-retention
B. Risk identification
C. Risk communication
D. Risk analysis

Question # 28

Which of the following resource categories includes costs, productivity, availability, and change and configuration management?

A. Products
B. Processes
C. People
D. Partners

Question # 29

Which of the following project management plans defines the risk identification, analysis, response, and monitoring strategies?

A. Communications Management Plan
B. Resource Management Plan
C. Risk Management Plan
D. Stakeholder management strategy

Question # 30

Which of the following activity loops describes the creation of new processes?

A. Loop 3
B. Loop 2
C. Loop 4
D. Loop 1

Question # 31

Which of the following functions of HR department is liable for attitude surveys, labor relation, employee handbook, and labor law compliance?

A. Personnel policy
B. Employee relation
C. Compensation and benefit
D. Analysis and design for work

Question # 32

Which of the following is used as a tool that assists in risk identification?

A. Performance report
B. Status report
C. Variance analysis
D. Issue log

Question # 33

What is the major goal of risk management in the decision-making process?

A. To manage the clients
B. To manage the time
C. To manage the resources
D. To manage the uncertainty

Question # 34

Which of the following resource categories includes skill sets, certifications, productivity, and morale?

A. Partners
B. Processes
C. People
D. Products

Question # 35

Which of the following processes contained in the Value Governance domain of Val IT defines information requirements?

A. VG6
B. VG4
C. VG5
D. VG3

Question # 36

Which of the following steps of IT governance program decides on the highest priority projects that will help to improve the management and governance of the significant gap areas?

A. Define target areas
B. Develop improvement strategies
C. Measure results
D. Understand and define the risks

Question # 37

Which of the following types of risks includes currency risk, liquidity risk, and technology obsolescence?

A. Asset risk
B. Operational risk
C. Hazard risk
D. Strategic risk

Question # 38

Which of the following components of the COSO ERM identifies the required information, captures it, and communicates it in a form and time frame that enable people to carry out their responsibilities?

A. Information and communication
B. Internal environment
C. Monitoring
D. Objectives setting

Question # 39

Which of the following statements explains the difference between the IT strategy committee and the IT steering committee?

A. The IT strategy committee assists the executive in the delivery of the IT strategy, whereas the IT steering committee advises the board and management on IT strategy.
B. The IT strategy committee focuses on implementation, whereas the IT steering committee focuses on the current and future strategic IT issues.
C. The IT strategy committee aligns and approves the IT architecture, whereas the IT steering committee monitors the resource and priority conflicts.
D. The IT strategy committee provides direction to management relative to IT strategy, whereas the IT steering committee monitors the resource and priority conflicts.

Question # 40

Which of the following areas addresses the safeguarding of IT assets, disaster recovery and continuity of operations?

A. Performance measurement
B. Risk management
C. Value delivery
D. Strategic alignment

Question # 41

Which of the following techniques seeks to identify the similarities and differences between the groups of customers or users?

A. Market Segmentation
B. PEST Analysis
C. SWOT Analysis
D. Scenario Planning

Question # 42

Which of the following guides provides risk and value statements to help identify and validate the need to execute each control objective?

A. IT assurance guide
B. IT control objectives for Basel II guide
C. COBIT control practices guide
D. IT control for Sarbanes Oxley guide

Question # 43

Which of the following IT processes contained in the Deliver and Support domain of COBIT manages the operations?

A. DS10
B. DS13
C. DS9
D. DS8

Question # 44

Which of the following is the amount of risk an enterprise is willing to except in pursuit of its mission?

A. Threats
B. Vulnerability
C. Risk Appetite
D. Inherent Risk

Question # 45

Which of the following individuals ensures that IT complies with policy, laws and regulations?

A. Project sponsor
B. Compliance officer
C. Supplier
D. Business partner

Question # 46

Which of the following risk functions directs the Sarbanes-Oxley Section 302 and 404 assessments?

A. Operations management
B. Accounting / Financial compliance
C. Operational Quality Assurance
D. Compliance & Ethics

Question # 47

Which of the following are the process control objectives for the process controls embedment? Each correct answer represents a complete solution. Choose all that apply.

A. Process ownership
B. Process goals and objectives
C. Process repeatability
D. Process availability

Question # 48

Which of the following quadrant analysis identifies the key issues of cost containment, predictability or reliability, continual unit cost improvement, and benchmarking for justification?

A. Low level role (tactical/utility) and business market leader (risk-taker/high growth)
B. High level role (strategic/transformational) and business market leader (risktaker/high growth)
C. Low level role (tactical/utility) and business market followers (risk-averse/mature)
D. High level role (strategic/transformational) and business market followers (riskaverse/mature)

Question # 49

Which of the following is the process of defining the way work is performed and the tasks that a given job requires?

A. Selection
B. Recruitment
C. Job design
D. Job analysis

Question # 50

What is the formula for measuring the "usage gap"?

A. Usage gap = market potential - existing usage
B. Usage gap = market potential * existing usage
C. Usage gap = market potential / existing usage
D. Usage gap = market potential + existing usage

Question # 51

Which of the following is a non-repetitive set of tasks that lead to the achievement of a new objective?

A. Plan
B. Strategy
C. Techniques
D. Tactics

Question # 52

Which of the following systems come under the category of linking systems to connect an enterprise with its customers and supplier? Each correct answer represents a complete solution. Choose all that apply.

A. Website and portal
B. Electronic data interchange (EDI)/extensible markup language (XML) data transfer systems
C. Office productivity
D. E-mail, smartphone, instant messaging

Question # 53

Which of the following quadrant analysis identifies the key issues of anticipation of business needs, service levels over cost, and business enablement and facilitation (removal of obstacles)?

A. High level role (strategic/transformational) and business market followers (riskaverse/mature)
B. Low-level role (tactical/utility) and business market leader (risk-taker/high growth)
C. Low-level role (tactical/utility) and business market followers (risk-averse/mature)
D. High-level role (strategic/transformational) and business market leader (risktaker/high growth)

Question # 54

Which of the following phases in SDLC transforms the detailed requirements into complete, detailed system design document?

A. Planning
B. Design
C. Development
D. Initiation

Question # 55

Which of the following guides provides guidance on how COBIT is useful in supporting a variety of assurance tasks, along with the recommended testing steps that are aligned with the control practices?

A. COBIT control practices guide
B. IT control for Sarbanes Oxley guide
C. IT assurance guide
D. IT control objectives for Basel II guide

Question # 56

Which of the following techniques builds various plausible views of possible futures for a business?

A. PEST analysis
B. Scenario Planning
C. SWOT Analysis
D. Market Segmentation

Question # 57

Which of the following service delivery processes includes controls, document and record, as its sub processes?

A. Service level management
B. Service reporting
C. Information security management
D. Capacity management

Question # 58

Which of the following areas concentrates on optimizing expenses, and providing the value of IT?

A. Value delivery
B. Risk management
C. Resource management
D. Strategic alignment

Question # 59

Which of the following individuals provides service feedback to the providers?

A. Compliance officers
B. User representatives
C. Project sponsors
D. Suppliers 

Question # 60

Which of the following individuals/team allocates business resources for effective IT governance?

A. Business Executive
B. CEO
C. CIO
D. IT Strategy Committee

Question # 61

In which of the following types of biases does the data collection itself interfere with the process it is measuring?

A. Interaction
B. Nonresponse
C. Perception
D. Operational

Question # 62

Which of the following are the categories of IT-related spending or investments defined by the META group? Each correct answer represents a complete solution. Choose all that apply.

A. Grow the business
B. Strategic investment
C. Transform the business
D. Run the business

Question # 63

Which of the following guides emphasizes on the fundamental steps for implementing information security within the enterprise, and provides easy to follow guidance for addressing security aspects of IT governance?

A. COBIT security baseline guide
B. COBIT control practices guide
C. IT assurance guide
D. IT control for Sarbanes Oxley guide

Question # 64

Which of the following steps of IT governance program establishes a balanced scorecard mechanism for measuring current performance that are related to the IT governance focus areas?

A. Define target areas
B. Develop improvement strategies
C. Understand and define the risks
D. Measure results

Question # 65

Which of the following areas focuses on aligning with the business and collaborative solutions?

A. Risk management
B. Strategic alignment
C. Resource management
D. Value delivery

Question # 66

Which of the following ISO standards defines the corporate governance of IT?

A. ISO 9000
B. ISO 27001
C. ISO 20000
D. ISO 38500

Question # 67

Which of the following categories measures the health of the organization and the working environment of its employees?

A. Quantity
B. Safety
C. Effectiveness
D. Efficiency

Question # 68

Which of the following risks refers to the risk associated with an event in the absence of specific controls?

A. Financial reporting risk
B. Inherent risk
C. Operational risk
D. Compliance risk

Question # 69

Which of the following is a practice of forecasting possible risks to the organization and taking steps to mitigate their impact on operations?

A. Timekeeping
B. Enterprise risk management
C. Applicant tracking systems
D. HR audit

Question # 70

Which of the following concepts aims to limit errors to 1 per million units produced?

A. TQM
B. BSC
C. Six Sigma
D. TSM

Question # 71

Which of the following functions are performed by the Future Orientation measure of the IT BSC management tool? Each correct answer represents a complete solution. Choose all that apply.

A. It focuses on professional learning and development.
B. It attracts and retains people with key competencies.
C. It manages operational service performance.
D. It measures and rewards individual and team performance.

Question # 72

Which of the following steps of development of business case describes the financial benefits analysis?

A. Step 1
B. Step 3
C. Step 2
D. Step 4

Question # 73

Which of the following individuals/team advises on infrastructure needs and architectural design?

A. Management committee
B. CEO
C. CIO
D. IT Strategy Committee

Question # 74

Which of the following strategies includes marketing strategies, new product development strategies, HR strategies and, financial strategies?

A. Operational strategy
B. Corporate strategy
C. Business strategy
D. Functional strategy

Question # 75

Which of the following types of risks includes liability torts, property damage, natural catastrophe and financial risk?

A. Asset risk
B. Hazard risk
C. Operational risk
D. Strategic risk 

Question # 76

Which of the following processes contained in the Portfolio Management domain of Val IT creates an overall portfolio view?

A. PM8
B. PM7
C. PM9
D. PM10

Question # 77

Which of the following objectives are used by the system to increase costs or revenues? Each correct answer represents a complete solution. Choose all that apply.

A. Erecting barriers to entry by competitors
B. Increasing production rates
C. Improving product quality
D. Creating new distribution channels

Question # 78

Which of the following examples are included in the application controls embedded in business process applications? Each correct answer represents a complete solution. Choose all that apply.

A. Segregation of duties
B. Validity
C. Security
D. Computer operations 

Question # 79

Which of the following types of benefits are provided by the new IT-driven initiative for IT investment program? Each correct answer represents a complete solution. Choose all that apply.

A. Cost avoidance benefit
B. Direct benefit
C. Indirect benefit
D. Incremental benefit

Question # 80

Which of the following areas tracks the project delivery, and monitors the IT services?

A. Risk management
B. Performance measurement
C. Strategic alignment
D. Value delivery

Question # 81

Which of the following individuals supports and contributes to customer's governance approach?

A. User representatives
B. Supplier/Business partners
C. Compliance officers
D. Project sponsors

Question # 82

Which of the following domains of CGEIT aims to guarantee that the IT function remains aligned with the organization's strategic objectives?

A. Strategic Alignment
B. Risk Management
C. Value Delivery
D. IT Governance Framework

Question # 83

You are interviewing members of a project team to test their understanding of the assigned risk responses as risk owners. You and the project manager are working together to evaluate the risk responses to determine their effectiveness in the project. What project management technique are you performing with the project manager in this scenario?

A. Risk identification with the project team
B. Risk audits
C. Risk analysis
D. Stakeholder analysis as the project team is a stakeholder

Question # 84

Which of the following sub-processes of Capacity Management is concerned with the management of the individual components of the IT Infrastructure?

A. Capacity Management Reporting
B. Business Capacity Management
C. Service Capacity Management
D. Resource Capacity Management

Question # 85

Which of the following concepts is used to reduce the errors produced during the manufacturing or service process, increase customer satisfaction, streamline supply chain management, aims for modernization of equipment and ensures workers have the highest level of training?

A. Balanced Scorecard (BSC)
B. Six Sigma
C. Total Quality Management
D. Total Security Management

Question # 86

Fred is the project manager of a large project in his organization. Fred needs to begin planning the risk management plan with the project team and key stakeholders. Which plan risk management process tool and technique should Fred use to plan risk management?

A. Planning meetings and analysis
B. Variance and trend analysis
C. Data gathering and representation techniques
D. Information gathering techniques

Question # 87

The water sanitation project manager has determined that risks associated with handling certain chemicals are too high. He has therefore decided to allow someone else to complete this portion of the project by outsourcing the handling and installation of the chemicals and filter equipment to an experienced contractor. This is an example of which of the following?

A. Transference
B. Acceptance
C. Mitigation
D. Avoidance

Question # 88

Stephen is the project manager of the GBB project. He has worked with two subject matter experts and his project team to complete the risk assessment technique. There are approximately 47 risks that have a low probability and a low impact on the project.Which of the following answers best describes what Stephen should do with these risk events?

A. The low probability and low impact risks should be added to the risk register.
B. Because they are low probability and low impact, the risks can be dismissed.
C. Because they are low probability and low impact, Stephen should accept the risks.
D. The low probability and low impact risks should be added to a watch list for future monitoring.

Question # 89

Enterprise analysis provides many things for an organization. All of the following are tasks included in enterprise analysis except for which one?

A. Solution performance assessment
B. Define business need
C. Determine solution approach
D. Assess capability gaps

Question # 90

Which of the following processes is responsible for controlling, recording and reporting on versions, attributes, and relationships relating to components of the Information Technology (IT) infrastructure?

A. Service Catalogue Management
B. Service Level Management
C. ICT Operations Management
D. Service Asset and Configuration Management

Question # 91

You are the project manager for ABC project. You are planning for when and how human resource requirements will be met. You are working on ____.

A. Scope management plan
B. Project organization chart
C. Staffing management plan
D. Resource calendar

Question # 92

Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time? Each correct answer represents a part of the solution. Choose all that apply.

A. Reliability
B. Security
C. Recoverability
D. Serviceability
E. Resilience
F. Maintainability
G. Error control

Question # 93

Which of the following frameworks is for enterprise architecture, and provides a comprehensive approach to the design, planning, implementation, and governance of an enterprise information architecture?

A. TOGAF
B. Val IT
C. BISL
D. COBIT

Question # 94

During qualitative risk analysis, you want to define the risk urgency assessment. All of the following are indicators of risk priority except for which one?

A. Risk rating
B. Warning signs
C. Cost of the project
D. Symptoms

Question # 95

What is the key output handed over to Service Transition within Service Design?

A. Business Perspective
B. Service Portfolio Management
C. ITIL Small-Scale Implementation
D. Service Design Package

Question # 96

You work as a project manager for BlueWell Inc. You have to communicate the causes of risk events to the stakeholders. Which risk diagramming technique you will use to communicate the causes of risk events to project stakeholders?

A. Project network diagrams
B. Ishikawa diagrams
C. Process flow charts
D. Influence diagrams

Question # 97

Which of the following terms includes performance objectives and criteria (POCs), performance indicators, and any other means that evaluate the success in achieving a specified goal?

A. Precision
B. Performance Measurement System
C. Performance Measure
D. Performance Measurement Category

Question # 98

Which of the following techniques is used for understanding the "environment" in which a business operates?

A. Critical success factor analysis
B. PEST analysis
C. SWOT analysis
D. Market segmentation

Question # 99

Which of the following is a way of delivering value to customers by facilitating outcome that customers wish to get without the control of specific costs and risks?

A. Processes
B. Service Desk
C. Functions
D. Service

Question # 100

You are working with your project stakeholders to identify risks within the JKP Project. You want to use an approach to engage the stakeholders to increase the breadth of the identified risks by including internally generated risk. Which risk identification approach is most suited for this goal?

A. Brainstorming
B. Assumptions analysis
C. SWOT analysis
D. Delphi Technique

Question # 101

Which of the following frameworks describes an enterprise view of all project management activities and how these activities contribute to the success of the organization?

A. Casualty Actuarial Society framework
B. COSO ERM
C. Enterprise project management (EPM)
D. COBIT

Question # 102

What does the T in SWOT analysis mean?

A. Time
B. Trial
C. Threats
D. Test

Question # 103

Which of the following processes contained in the Portfolio Management domain of Val IT identifies resource requirements?

A. PM5
B. PM3
C. PM2
D. PM4

Question # 104

Which of the following process groups is the most efficient at providing resources to the development of the procurement process?

A. Acquisition process
B. Contract management
C. Process management
D. Resource management

Question # 105

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

A. The Service Level Manager
B. The Configuration Manager
C. The IT Security Manager
D. The Change Manager

Question # 106

Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?

A. Service-oriented modeling and architecture (SOMA)
B. Service-oriented architecture (SOA)
C. Sherwood Applied Business Security Architecture (SABSA)
D. Service-oriented modeling framework (SOMF)

Question # 107

A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

A. Add the identified risk to a quality control management control chart.
B. Add the identified risk to the low-level risk watchlist.
C. Add the identified risk to the risk register.
D. Add the identified risk to the issues log.

Question # 108

Management wants you to create a visual diagram of what resources will be utilized in the project deliverables. What type of a chart is management asking you to create?

A. RACI chart
B. Roles and responsibility matrix
C. Work breakdown structure
D. Resource breakdown structure

Question # 109

Which of the following steps are performed in the Scoping phase of IT Assurance methodology? Each correct answer represents a complete solution. Choose all that apply.

A. Customize control objectives.
B. Scope and plan assurance initiatives.
C. Select the control objectives for critical processes.
D. Assess process maturity.

Question # 110

Which of the following are the objectives of Service Level Management (SLM)?  1. To negotiate SLAs with the customers and to design services in accordance with the agreed service level targets. 2. Defining, documenting, and agreeing the level of IT Services to be provided. 3. Identifying possible future markets that the Service Provider could operate in. 4. Monitoring, measuring, and reporting the actual level of services provided. 5. Monitoring and improving customer satisfaction.

A. 1, 2, and 3 only
B. 1, 2, 4, and 5 only
C. 1, 2, 3, 4, and 5
D. 1, 2, 3, and 5 only
E. 1 and 2 only

Question # 111

You are the project manager of the GHG project for your company. You have identified the project risks, completed qualitative and quantitative analysis, and created risk responses. You also need to document how and when risk audits will be performed in the project. Where will you define the frequency of risk audits?

A. Schedule management plan
B. Risk management plan
C. Quality management plan
D. Risk response plan

Question # 112

Which of the following outsourcing defines the performance objectives reached by negotiation between the user and the provider of a service, or between an outsourcer and an organization?

A. Service level Agreement (SLA)
B. Proposal
C. Contract
D. Outsource

Question # 113

You are the project manager of the NKJ Project for your company. The project's success or failure will have a significant impact on your organization's profitability for the coming year. Management has asked you to identify the risk events and communicate the event's probability and impact as early as possible in the project. Management wants to avoid risk events and needs to analyze the cost-benefits of each risk event in this project. What term is assigned to the low-level of stakeholder tolerance in this project?

A. Risk utility function
B. Mitigation-ready project management
C. Risk-reward mentality
D. Risk avoidance

Question # 114

You are the project manager of the GHY Project and would like to perform a review of your project from several different characteristics. You would like to review what worked in the project and what needed improvement. What type of analysis would be most appropriate for the end of project review?

A. Feasibility study
B. Product breakdown
C. Business case study
D. SWOT analysis

Question # 115

You are the project manager of the NHQ Project for your company. You have completed qualitative and quantitative analysis of your identified project risks and you would now like to find an approach to increase project opportunities and to reduce threats within the project. What project management process would best help you?

A. Plan risk responses
B. Create a risk governance approach
C. Create the project risk register
D. Monitor and control project risks

What our clients say about CGEIT Certification Prep Material

Leave a comment

Your email address will not be published. Required fields are marked *

Rating / Feedback About This Exam