DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CGEIT Practice Tests, Mock Tests & Study Resources, Certified in the Governance of Enterprise IT | SPOTO

Welcome to SPOTO's comprehensive CGEIT exam preparation suite! The Certified in the Governance of Enterprise IT (CGEIT) certification is highly respected in the IT governance and management domain. As a Certified Data Privacy Solutions Engineer™ (CDPSE®), demonstrating proficiency in assessing, building, and implementing robust data privacy measures is paramount.Our practice tests, mock tests, and study resources are meticulously crafted to ensure your success. With a focus on exam questions, sample questions, exam materials, and exam answers, our resources provide a solid foundation for your exam preparation journey.Utilize our practice tests to familiarize yourself with the exam format, hone your skills with exam practice sessions, and gain confidence with our exam simulator. Our mock exams simulate real exam conditions, allowing you to assess your readiness and identify areas for improvement.Prepare effectively for your CGEIT certification with SPOTO's trusted practice tests, mock tests, and study resources. Success awaits with SPOTO by your side!
Take other online exams

Question #1
Which of the following sub-processes of Capacity Management is concerned with the management of the individual components of the IT Infrastructure?
A. Capacity Management Reporting
B. Business Capacity Management
C. Service Capacity Management
D. Resource Capacity Management
View answer
Correct Answer: A

View The Updated CGEIT Exam Questions

SPOTO Provides 100% Real CGEIT Exam Questions for You to Pass Your CGEIT Exam!

Question #2
Drag and drop the various SSE-CMM levels at the appropriate places.
A. Mastered
B. Not Mastered
View answer
Correct Answer: A
Question #3
Which of the following objectives are used by the system to increase costs or revenues? Each correct answer represents a complete solution. Choose all that apply.
A. Erecting barriers to entry by competitors
B. Increasing production rates
C. Improving product quality
D. Creating new distribution channels
View answer
Correct Answer: D
Question #4
Which of the following is the process of comparing the business processes and performance metrics including cost, cycle time, productivity, or quality?
A. Agreement
B. COBIT
C. Service Improvement Plan
D. Benchmarking
View answer
Correct Answer: D
Question #5
A service provider guarantees for end-to-end network traffic performance to a customer. Which of the following types of agreement is this?
A. LA
B. VPN
C. NDA
D. SLA
View answer
Correct Answer: B
Question #6
Which of the following processes uses statistical evidences to determine progress toward specific defined organizational objectives?
A. Resource management
B. Risk management
C. Value delivery
D. Performance measurement
View answer
Correct Answer: A
Question #7
Which of the following is a family of ISO standards for Total Quality Management (TQM)?
A. ISO 20000
B. ISO 9000
C. ISO 38500
D. ISO 27001
View answer
Correct Answer: A
Question #8
Choose and reorder the steps required in the development of business case.
A. Mastered
B. Not Mastered
View answer
Correct Answer: D
Question #9
Fill in the blank with an appropriate word. ____ is also referred to as corporate governance, and covers issues such as board structures, roles and executive remuneration.
A. Conformance
View answer
Correct Answer: A
Question #10
Which of the following is NOT a sub-process of Service Portfolio Management?
A. Service Portfolio Update
B. Business Planning Data
C. Strategic Planning
D. Strategic Service Assessment
E. Service Strategy Definition
View answer
Correct Answer: B
Question #11
Which of the following frameworks describes a standard for processes within business information management at the strategy, management and operations level?
A. Val IT
B. BISL
C. COBIT
D. TOGAF
View answer
Correct Answer: ACD
Question #12
Fred is the project manager of a large project in his organization. Fred needs to begin planning the risk management plan with the project team and key stakeholders. Which plan risk management process tool and technique should Fred use to plan risk management?
A. Planning meetings and analysis
B. Variance and trend analysis
C. Data gathering and representation techniques
D. Information gathering techniques
View answer
Correct Answer: B
Question #13
Which of the following functions are performed by the Future Orientation measure of the IT BSC management tool? Each correct answer represents a complete solution. Choose all that apply.
A. It focuses on professional learning and development
B. It attracts and retains people with key competencies
C. It manages operational service performance
D. It measures and rewards individual and team performance
View answer
Correct Answer: B
Question #14
Which of the following areas tracks the project delivery, and monitors the IT services?
A. Risk management
B. Performance measurement
C. Strategic alignment
D. Value delivery
View answer
Correct Answer: C
Question #15
Which of the following components of the COSO ERM identifies the required information, captures it, and communicates it in a form and time frame that enable people to carry out their responsibilities?
A. Information and communication
B. Internal environment
C. Monitoring
D. Objectives setting
View answer
Correct Answer: B
Question #16
You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?
A. A qualitative risk analysis requires fast and simple data to complete the analysis
B. A qualitative risk analysis required unbiased stakeholders with biased risk tolerances
C. A qualitative risk analysis encourages biased data to reveal risk tolerances
D. A qualitative risk analysis requires accurate and unbiased data if it is to be credible
View answer
Correct Answer: B
Question #17
Which of the following examples are included in the general controls embedded in IT processes and services? Each correct answer represents a complete solution. Choose all that apply.
A. Completeness
B. Change management
C. Systems development
D. Accuracy
View answer
Correct Answer: ABC
Question #18
Fill in the blank with an appropriate phrase. The ______ provides investment management services to the firm and directs on how to take decisions on fund.
A. fund manager
View answer
Correct Answer: A
Question #19
Which of the following processes are involved under the COBIT framework? Each correct answer represents a complete solution. Choose all that apply.
A. Managing the IT workforce
B. Correcting all risk issues
C. Conducting IT risk assessments
D. Developing a strategic plan
View answer
Correct Answer: C
Question #20
Melody is the project manager for her organization. She has created a risk response to conduct more tests on the software her project is creating. The identified risk that prompted this response was that the software is mission- critical and must be flawless before it can be put into product. What type of a risk response has Melody used in this scenario?
A. Transference
B. Enhance
C. Avoidance
D. Mitigation
View answer
Correct Answer: C
Question #21
Which of the following is the process of defining the way work is performed and the tasks that a given job requires?
A. Selection
B. Recruitment
C. Job design
D. Job analysis
View answer
Correct Answer: BC
Question #22
Fill in the blank with an appropriate phrase. ____ are activities that are dangerous to complete and manage such as construction, electrical work, or manufacturing.
A. Pure risks
View answer
Correct Answer: D
Question #23
You are interviewing members of a project team to test their understanding of the assigned risk responses as risk owners. You and the project manager are working together to evaluate the risk responses to determine their effectiveness in the project. What project management technique are you performing with the project manager in this scenario?
A. Risk identification with the project team
B. Risk audits
C. Risk analysis
D. Stakeholder analysis as the project team is a stakeholder
View answer
Correct Answer: B
Question #24
Which of the following guides provides risk and value statements to help identify and validate the need to execute each control objective?
A. IT assurance guide
B. IT control objectives for Basel II guide
C. COBIT control practices guide
D. IT control for Sarbanes Oxley guide
View answer
Correct Answer: B
Question #25
Which of the following examples are included in the application controls embedded in business process applications? Each correct answer represents a complete solution. Choose all that apply.
A. Segregation of duties
B. Validity
C. Security
D. Computer operations
View answer
Correct Answer: A
Question #26
Which of the following guides provides guidance on how COBIT is useful in supporting a variety of assurance tasks, along with the recommended testing steps that are aligned with the control practices?
A. COBIT control practices guide
B. IT control for Sarbanes Oxley guide
C. IT assurance guide
D. IT control objectives for Basel II guide
View answer
Correct Answer: A

View The Updated ISACA Exam Questions

SPOTO Provides 100% Real ISACA Exam Questions for You to Pass Your ISACA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: