DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CGEIT Exam Prep: Study Materials & Mock Tests, Certified in the Governance of Enterprise IT | SPOTO

Prepare with confidence for your CGEIT certification using SPOTO's comprehensive study materials and mock tests! The Certified in the Governance of Enterprise IT (CGEIT) certification signifies your expertise in managing and governing enterprise IT, making you a valuable asset in today's technology-driven business world. With SPOTO's high-quality practice tests guaranteeing a 100% pass rate, you can approach the CGEIT exam with assurance.Access our study materials featuring exam questions, sample questions, and detailed exam materials. Our precise exam answers and exam dumps are aligned with the latest industry standards, ensuring thorough preparation. Utilize our practice tests, exam practice, and exam simulator to simulate real exam scenarios and enhance your readiness. SPOTO's focus on exam preparation, online exam questions, and mock exams ensures a seamless journey to CGEIT certification success.
Take other online exams

Question #1
Billy is the project manager of the HAR Project and is in month six of the project. The project is scheduled to last for 18 months. Management asks Billy how often the project team is participating in risk reassessment in this project. What should Billy tell management if he's following the best practices for risk management?
A. Project risk management happens at every milestone
B. Project risk management has been concluded with the project planning
C. At every status meeting the project team project risk management is an agenda item
D. Project risk management is scheduled for every month in the 18-month project
View answer
Correct Answer: C
Question #2
Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?
A. Risk audit
B. Earned value management
C. Corrective action
D. Technical performance measurement
View answer
Correct Answer: C
Question #3
What is the key output handed over to Service Transition within Service Design?
A. Business Perspective
B. Service Portfolio Management
C. ITIL Small-Scale Implementation
D. Service Design Package
View answer
Correct Answer: D
Question #4
You are the project manager of a large construction project. You are evaluating the strengths, weaknesses, opportunities, and threats involved in a project. In which of the following processes are you on?
A. Define Scope
B. Identify Risks
C. Plan Risk Responses
D. Plan Risk Management
View answer
Correct Answer: B
Question #5
Which of the following steps are performed in the Planning phase of IT Assurance methodology? Each correct answer represents a complete solution. Choose all that apply.
A. Plan the risk-based assurance initiatives
B. Scope and plan assurance initiatives
C. Perform a quick risk assessment
D. Assess process maturity
View answer
Correct Answer: ACD
Question #6
Which of the following is a continuous process of comparing performance with desired objectives to identify opportunities for improvement, and is conducted by individuals, groups, or organizations relating to their own work?
A. Management Assessment
B. Continuous improvement
C. Self Assessment
D. Control
View answer
Correct Answer: C
Question #7
A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?
A. Add the identified risk to a quality control management control chart
B. Add the identified risk to the low-level risk watchlist
C. Add the identified risk to the risk register
D. Add the identified risk to the issues log
View answer
Correct Answer: C
Question #8
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?
A. Service-oriented modeling and architecture (SOMA)
B. Service-oriented architecture (SOA)
C. Sherwood Applied Business Security Architecture (SABSA)
D. Service-oriented modeling framework (SOMF)
View answer
Correct Answer: D
Question #9
Elizabeth is a project manager for her organization and she finds risk management to be very difficult for her to manage. She asks you, a lead project manager, at what stage in the project will risk management become easier. What answer best resolves the difficulty of risk management practices and the effort required?
A. Risk management only becomes easier the more often it is practiced
B. Risk management only becomes easier when the project is closed
C. Risk management is an iterative process and never becomes easier
D. Risk management only becomes easier when the project moves into project execution
View answer
Correct Answer: A
Question #10
Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?
A. Repeatable level
B. Managed level
C. Defined level
D. Fundamental level
View answer
Correct Answer: D
Question #11
Which of the following problems occur with performance measurement systems that limit their usefulness? Each correct answer represents a complete solution. Choose all that apply.
A. It is dependent on gross aggregates, which tend to understate or ignore distributional contributions and consequences
B. It is dependent on the timely occurrence of corrective action which is required for effective management control
C. It is dependent on historical patterns and reluctant to accept new structural changes that are capable of generating different outcomes
D. It is dependent on summary data, which emphasizes averages and discounts outliers
View answer
Correct Answer: ACD
Question #12
You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?
A. A qualitative risk analysis requires fast and simple data to complete the analysis
B. A qualitative risk analysis required unbiased stakeholders with biased risk tolerances
C. A qualitative risk analysis encourages biased data to reveal risk tolerances
D. A qualitative risk analysis requires accurate and unbiased data if it is to be credible
View answer
Correct Answer: D
Question #13
What business analysis element tries to identify as many potential options as possible to meet the business objectives and fill identified gaps in capabilities?
A. Decision analysis
B. Alternative generation
C. Documentation of assumptions and constraints
D. Ranking of approaches
View answer
Correct Answer: B
Question #14
Amy is the project manager for her company. In her current project the organization has a very low tolerance for risk events that will affect the project schedule. Management has asked Amy to consider the affect of all the risks on the project schedule. What approach can Amy take to create a bias against risks that will affect the schedule of the project?
A. She can filter all risks based on their affect on schedule versus other project objectives
B. She can have the project team pad their time estimates to alleviate delays in the project schedule
C. She can shift risk-laden activities that affect the project schedule from the critical path as much a possible
D. She can create an overall project rating scheme to reflect the bias towards risks that affect the project schedule
View answer
Correct Answer: D
Question #15
Holly and Gary are HR Professionals in their organization and they're working to develop the strategic plan for their organization. Holly and Gary are using SWOT analysis to help understand the needs of human, financial, technological, capital, and other aspects of their organization. What is SWOT?
A. SWOT is an analysis to define the strengths, weaknesses, opportunities, and threats an organization may face
B. SWOT is an analysis to define the schedule, weaknesses, opportunities, and timetable of a project endeavor
C. SWOT is an analysis to define the strengths, weaknesses, openness, and timeliness of an organization
D. SWOT is an analysis to define the seriousness, weaknesses, openness, and timetable of organization development
View answer
Correct Answer: A
Question #16
Which of the following processes involves choosing the alternative strategies, executing a contingency or fallback plan, taking corrective action, and modifying the project management plan?
A. Scope Change control
B. Monitor and Control risk
C. Integrated Change control
D. Configuration Management
View answer
Correct Answer: B
Question #17
What stakeholder(s) must participate in the document elicitation result?
A. Business analyst and the key stakeholders
B. Business analyst and the business owner
C. Business analyst, business analysis team, and the key stakeholders
D. Business analyst
View answer
Correct Answer: D
Question #18
Your project is an agricultural-based project that deals with plant irrigation systems. You have discovered a byproduct in your project that your organization could use to make a profit you’re your organization seizes this opportunity it would be an example of what risk response?
A. Exploiting
B. Positive
C. Opportunistic
D. Enhancing
View answer
Correct Answer: A
Question #19
Jane is the project manager of the GBB project for her company. In the current project a vendor has offered the project a ten percent discount based if they will order 100 units for the project. It is possible that the GBB Project may need the 100 units, but the cost of the units is not a top priority for the project. Jane documents the offer and tells the vendor that they will keep the offer in mind and continue with the project as planned. What risk response has been given in this project?
A. Acceptance
B. Enhance
C. Sharing
D. Exploiting
View answer
Correct Answer: A
Question #20
Which of the following responsibilities are performed by the core team of IT governance? Each correct answer represents a complete solution. Choose all that apply.
A. Provide service feedback to providers
B. Undertake core tasks
C. Define plan and deliverables
D. Report on process
View answer
Correct Answer: BCD
Question #21
Which of the following domains of CGEIT aims to guarantee that the IT function remains aligned with the organization's strategic objectives?
A. Strategic Alignment
B. Risk Management
C. Value Delivery
D. IT Governance Framework
View answer
Correct Answer: D
Question #22
Which of the following are the roles of a CIO in the Resource management framework? Each correct answer represents a complete solution. Choose all that apply.
A. Standardizes architecture & technology
B. Defines value creation roles within IT
C. Provides IT infrastructure to facilitate knowledge & information creation/sharing
D. Establishes business priorities & allocates resources for IT performance
View answer
Correct Answer: ABC
Question #23
Which conduct stakeholder analysis technique is useful for identifying shared characteristics of a stakeholder group?
A. Brainstorming
B. Scope modeling
C. Interviews
D. Surveys
View answer
Correct Answer: D
Question #24
Which of the following IT governance frameworks provides governance of IT investments, produced by the IT Governance Institute (ITGI), and is a formal statement of principles and processes for IT portfolio management?
A. VMM
B. Val IT
C. Risk IT
D. COBIT
View answer
Correct Answer: B
Question #25
Which of the following frameworks describes a standard for processes within business information management at the strategy, management and operations level?
A. Val IT
B. BISL
C. COBIT
D. TOGAF
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: