DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CGEIT Exam Practice Made Easy: Latest Mock Exams, Certified in the Governance of Enterprise IT | SPOTO

Prepare effortlessly for your CGEIT certification with SPOTO's latest mock exams! The Certified in the Governance of Enterprise IT (CGEIT) credential showcases your ability to manage and govern enterprise IT effectively, making you a vital asset in today's technology-driven organizations. Our high-quality practice tests are designed to ensure a 100% pass rate, providing you with the tools and confidence to succeed in the CGEIT exam.Explore our mock exams featuring comprehensive exam questions, sample questions, and exam materials. Our precise exam answers and exam dumps are aligned with the latest industry standards, ensuring you're well-prepared for the challenges ahead. With SPOTO's emphasis on exam practice, exam preparation, and exam simulator, along with access to online exam questions and mock exams, mastering the CGEIT certification has never been easier.
Take other online exams

Question #1
You are the business analyst for your organization and are preparing to conduct stakeholder analysis. As part of this process you realize that you'll need several inputs. Which one of the following is NOT an input you'll use for the conduct stakeholder analysis task?
A. Organizational process assets
B. Enterprise architecture
C. Business need
D. Enterprise environmental factors
View answer
Correct Answer: D
Question #2
Which of the following categories measures the health of the organization and the working environment of its employees?
A. Quantity
B. Safety
C. Effectiveness
D. Efficiency
View answer
Correct Answer: ABC
Question #3
Which of the following concepts is a semi-standard structured report supported by proven design methods and automation tools that can be used by managers to keep track of the execution of activities by staff within their control and monitor the consequences arising from these actions?
A. Total Security Management
B. Balanced Scorecard (BSC)
C. Total Quality Management
D. Six Sigma
View answer
Correct Answer: ABD
Question #4
Which of the following types of risks includes currency risk, liquidity risk, and technology obsolescence?
A. Asset risk
B. Operational risk
C. Hazard risk
D. Strategic risk
View answer
Correct Answer: A
Question #5
In which of the following types of biases does the data collection itself interfere with the process it is measuring?
A. Interaction
B. Nonresponse
C. Perception
D. Operational
View answer
Correct Answer: ABD
Question #6
You are using the IT BSC management tool to apply the practices of IT BSC to the IT function. You want to perform the following functions: Deliver value Manage cost Manage risks Achieve intercompany synergies Which process of the IT BSC Measurement tool will you use?
A. Future Orientation
B. Operational excellence
C. Corporate contribution
D. Customer Orientation
View answer
Correct Answer: D
Question #7
Which of the following architecture domains for TOGAF describes the structure of an organization's logical and physical data assets and the associated data management resources?
A. Applications architecture
B. Technical architecture
C. Data architecture
D. Business architecture
View answer
Correct Answer: BCD
Question #8
Which of the following phases of IT lifecycle is governed by a series of stages and gates for managing the lifecycle of projects?
A. IT project phase
B. IT process phase
C. IT asset phase
D. IT discovery phase
View answer
Correct Answer: A
Question #9
Jenny is the project manager for the NBT projects. She is working with the project team and several subject matter experts to perform the quantitative risk analysis process. During this process she and the project team uncover several risks events that were not previously identified. What should Jenny do with these risk events?
A. The events should be determined if they need to be accepted or responded to
B. The events should be entered into the risk register
C. The events should continue on with quantitative risk analysis
D. The events should be entered into qualitative risk analysis
View answer
Correct Answer: B
Question #10
Service Transition contains detailed descriptions of which of the following processes?
A. Change Management, Capacity Management, Event Management, and Service Request Management
B. Service Level Management, Service Portfolio Management, Service Asset and Configuration Management
C. Service Asset and Configuration Management, Release Management, and Request Fulfillment
D. Change Management, Service Asset and Configuration Management, Release and Deployment Management
View answer
Correct Answer: A
Question #11
Which of the following individuals ensures that IT complies with policy, laws and regulations?
A. Project sponsor
B. Compliance officer
C. Supplier
D. Business partner
View answer
Correct Answer: B
Question #12
Which of the following service delivery processes has the goal to produce, agreed on, timely, reliable, and accurate reports for the effective communication?
A. Service level management
B. Service reporting
C. Information security management
D. Capacity management
View answer
Correct Answer: C
Question #13
Which of the following are the main benefits of using Information Services Procurement Library (ISPL)? Each correct answer represents a complete solution. Choose all that apply.
A. The contract can be used as a control instrument
B. The customer can take advantage of the competitive market
C. The proposals of consumers become comparable
D. The use of a strategy that really fits the situation
View answer
Correct Answer: A
Question #14
You are the project manager for your organization and you are working with Thomas, a project team member. You and Thomas have been working on a specific risk response for a probable risk event in the project. Thomas is empowered with a risk response and will control all aspects of the identified risk response in which a particular risk event will happen within the project. What title, in regard to risk, is bestowed on Thomas?
A. Risk coordinator
B. Risk expeditor
C. Risk owner
D. Risk team leader
View answer
Correct Answer: C
Question #15
You work as a project manager for BlueWell Inc. You are about to complete the quantitative risk analysis process for your project. You can use three available tools and techniques to complete this process. Which one of the following is NOT a tool or technique that is appropriate for the quantitative risk analysis process?
A. Quantitative risk analysis and modeling techniques
B. Organizational process assets
C. Expert judgment
D. Data gathering and representation techniques
View answer
Correct Answer: B
Question #16
Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: ? System and data are validated. ? System meets all user requirements. ? System meets all control requirements.
A. Evaluation and acceptance
B. Programming and training
C. Initiation
D. Definition
View answer
Correct Answer: D
Question #17
Which of the following quadrant analysis identifies the key issues of working well with other functions, IT value realization over time rather than-just cost, and being business process- focused but solutiondriven?
A. Low level role (tactical/utility) and business market leader (risk-taker/high growth)
B. High level role (strategic/transformational) and business market leader (risk-taker/high growth)
C. High level role (strategic/transformational) and business market followers (risk-averse/mature)
D. Low level role (tactical/utility) and business market followers (risk-averse/mature)
View answer
Correct Answer: B
Question #18
Fill in the blank with an appropriate phrase. _____ models address specifications, requirements, design, verification and validation, and maintenance activities.
A. Life cycle
View answer
Correct Answer: A
Question #19
An organization supports both programs and projects for various industries. What is a portfolio?
A. A portfolio describes all of the monies that are invested in the organization
B. A portfolio is the total amount of funds that have been invested in programs, projects, and operations
C. A portfolio describes any project or program within one industry or application area
D. A portfolio describes the organization of related projects, programs, and operations
View answer
Correct Answer: D
Question #20
The IT strategy formulation process consists of four steps to provide guidance to all who are involved. Which of the following steps are performed in the IT strategy formulation process? Each correct answer represents a complete solution. Choose all that apply.
A. Decide how to get from here to there
B. Evaluate changes
C. Assess process maturity
D. Map out the big picture
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: