لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What are the responsibilities of the CRO? Each correct answer represents a complete solution. Choose three.
A. Managing the supporting risk management function
B. Managing the risk assessment process
C. Advising Board of Directors
D. Implement corrective actions
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Henry is the project manager of the QBG Project for his company. This project has a budget of $4,576,900 and is expected to last 18 months to complete. The CIO, a stakeholder in the project, has introduced a scope change request for additional deliverables as part of the project work. What component of the change control system would review the proposed changes' impact on the features and functions of the project's product?
A. Cost change control system
B. Configuration management system
C. Scope change control system
D. Integrated change control
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following is true for Cost Performance Index (CPI)?
A. If the CPI > 1, it indicates better than expected performance of project
B. CPI = Earned Value (EV) * Actual Cost (AC)
C. It is used to measure performance of schedule
D. If the CPI = 1, it indicates poor performance of project
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following assets are the examples of intangible assets of an enterprise? Each correct answer represents a complete solution. Choose two.
A. Customer trust
B. Information
C. People
D. Infrastructure
عرض الإجابة
اجابة صحيحة: C
السؤال #5
You are the project manager for the NHH project. You are working with your project team to examine the project from four different defined perspectives to increase the breadth of identified risks by including internally generated risks. What risk identification approach are you using in this example?
A. Root cause analysis
B. Influence diagramming techniques
C. SWOT analysis
D. Assumptions analysis
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which among the following acts as a trigger for risk response process?
A. Risk level increases above risk appetite
B. Risk level increase above risk tolerance
C. Risk level equates risk appetite
D. Risk level equates the risk tolerance
عرض الإجابة
اجابة صحيحة: ACD
السؤال #7
You have been assigned as the Project Manager for a new project that involves development of a new interface for your existing time management system. You have completed identifying all possible risks along with the stakeholders and team and have calculated the probability and impact of these risks. Which of the following would you need next to help you prioritize the risks?
A. Affinity Diagram
B. Risk rating rules
C. Project Network Diagram
D. Risk categories
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which of the following are risk components of the COSO ERM framework? Each correct answer represents a complete solution. Choose three.
A. Risk response
B. Internal environment
C. Business continuity
D. Control activities
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Assessing the probability and consequences of identified risks to the project objectives, assigning a risk score to each risk, and creating a list of prioritized risks describes which of the following processes?
A. Qualitative Risk Analysis
B. Plan Risk Management
C. Identify Risks
D. Quantitative Risk Analysis
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which of the following control is used to ensure that users have the rights and permissions they need to perform their jobs, and no more?
A. System and Communications protection control
B. Audit and Accountability control
C. Access control
D. Identification and Authentication control
عرض الإجابة
اجابة صحيحة: D
السؤال #11
You are the project manager of HFD project. You have identified several project risks. You have adopted alternatives to deal with these risks which do not attempt to reduce the probability of a risk event or its impacts. Which of the following response have you implemented?
A. Acceptance
B. Mitigation
C. Avoidance
D. Contingent response
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following is the MOST effective inhibitor of relevant and efficient communication?
A. A false sense of confidence at the top on the degree of actual exposure related to IT and lack of a well-understood direction for risk management from the top down
B. The perception that the enterprise is trying to cover up known risk from stakeholders
C. Existence of a blame culture
D. Misalignment between real risk appetite and translation into policies
عرض الإجابة
اجابة صحيحة: C
السؤال #13
For which of the following risk management capability maturity levels do the statement given below is true? "Real-time monitoring of risk events and control exceptions exists, as does automation of policy management"
A. Level 3
B. Level 0C
D. Level 2
عرض الإجابة
اجابة صحيحة: C
السؤال #14
You are the project manager of the AFD project for your company. You are working with the project team to reassess existing risk events and to identify risk events that have not happened and whose relevancy to the project has passed. What should you do with these events that have not happened and would not happen now in the project?
A. Add the risk to the issues log
B. Close the outdated risks
C. Add the risks to the risk register
D. Add the risks to a low-priority watch-list
عرض الإجابة
اجابة صحيحة: C
السؤال #15
You are the project manager of the GHY Project for your company. You need to complete a project management process that will be on the lookout for new risks, changing risks, and risks that are now outdated. Which project management process is responsible for these actions?
A. Risk planning
B. Risk monitoring and controlling
C. Risk identification
D. Risk analysis
عرض الإجابة
اجابة صحيحة: AD
السؤال #16
Which of the following is described by the definition given below? "It is the expected guaranteed value of taking a risk."
A. Certainty equivalent value
B. Risk premium
C. Risk value guarantee
D. Certain value assurance
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Mary is a project manager in her organization. On her current project she is working with her project team and other key stakeholders to identify the risks within the project. She is currently aiming to create a comprehensive list of project risks so she is using a facilitator to help generate ideas about project risks. What risk identification method is Mary likely using?
A. Delphi Techniques
B. Expert judgment
C. Brainstorming
D. Checklist analysis
عرض الإجابة
اجابة صحيحة: A
السؤال #18
What is the FIRST phase of IS monitoring and maintenance process?
A. Report result
B. Prioritizing risks
C. Implement monitoring
D. Identifying controls
عرض الإجابة
اجابة صحيحة: A
السؤال #19
You are elected as the project manager of GHT project. You have to initiate the project. Your Project request document has been approved, and now you have to start working on the project. What is the FIRST step you should take to initialize the project?
A. Conduct a feasibility study
B. Acquire software
C. Define requirements of project
D. Plan project management
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Which of the following statements are true for enterprise's risk management capability maturity level 3?
A. Workflow tools are used to accelerate risk issues and track decisions
B. The business knows how IT fits in the enterprise risk universe and the risk portfolio view
C. The enterprise formally requires continuous improvement of risk management skills, based on clearly defined personal and enterprise goals
D. Risk management is viewed as a business issue, and both the drawbacks and benefits of risk are recognized
عرض الإجابة
اجابة صحيحة: D
السؤال #21
You are the project manager of GHT project. You and your team have developed risk responses for those risks with the highest threat to or best opportunity for the project objectives. What are the immediate steps you should follow, after planning for risk response process? Each correct answer represents a complete solution. Choose three.
A. Updating Project management plan and Project document
B. Applying controls
C. Updating Risk register
D. Prepare Risk-related contracts
عرض الإجابة
اجابة صحيحة: ABD
السؤال #22
What are the functions of audit and accountability control? Each correct answer represents a complete solution. Choose all that apply.
A. Provides details on how to protect the audit logs
B. Implement effective access control
C. Implement an effective audit program
D. Provides details on how to determine what to audit
عرض الإجابة
اجابة صحيحة: A
السؤال #23
You are the project manager of a project in Bluewell Inc. You and your project team have identified several project risks, completed risk analysis, and are planning to apply most appropriate risk responses. Which of the following tools would you use to choose the appropriate risk response?
A. Project network diagrams
B. Cause-and-effect analysis
C. Decision tree analysis
D. Delphi Technique
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which of the following role carriers is accounted for analyzing risks, maintaining risk profile, and risk-aware decisions?
A. Business management
B. Business process owner
C. Chief information officer (CIO)
D. Chief risk officer (CRO)
عرض الإجابة
اجابة صحيحة: ABD
السؤال #25
Which of the following are parts of SWOT Analysis? Each correct answer represents a complete solution. Choose all that apply.
A. Weaknesses
B. Tools
C. Threats
D. Opportunities
E. Strengths
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which of the following controls do NOT come under technical class of control?
A. Program management control
B. System and Communications Protection control
C. Identification and Authentication control
D. Access Control
عرض الإجابة
اجابة صحيحة: C
السؤال #27
You and your project team have identified a few risk events in the project and recorded the events in the risk register. Part of the recording of the events includes the identification of a risk owner. Who is a risk owner?
A. A risk owner is the party that will monitor the risk events
B. A risk owner is the party that will pay for the cost of the risk event if it becomes an issue
C. A risk owner is the party that has caused the risk event
D. A risk owner is the party authorized to respond to the risk event
عرض الإجابة
اجابة صحيحة: A
السؤال #28
Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?
A. Business Continuity Strategy
B. Index of Disaster-Relevant Information
C. Disaster Invocation Guideline
D. Availability/ ITSCM/ Security Testing Schedule
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Which of the following is the MOST effective method for indicating that the risk level is approaching a high or unacceptable level of risk?
A. Risk register
B. Cause and effect diagram
C. Risk indicator
D. Return on investment
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: