DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Pass Your CGEIT Certification Questions & Practice Tests, Certified in the Governance of Enterprise IT | SPOTO

Obtaining the Certified in the Governance of Enterprise IT (CGEIT) certification from ISACA can be a significant milestone in your career. However, passing the exam requires thorough preparation and practice. SPOTO offers a comprehensive range of exam materials, including practice tests, sample questions, and exam simulators, to help you achieve your CGEIT certification goals.Our CGEIT practice tests are designed to replicate the actual exam environment, allowing you to familiarize yourself with the question format, time management, and exam-day pressure. Our exam questions and answers are meticulously crafted by subject matter experts, ensuring accuracy and relevance. Additionally, our online exam questions and mock exams provide you with instant feedback, enabling you to identify and address your weaknesses effectively.By utilizing our exam preparation resources, including exam questions, exam materials, exam answers, free tests, and exam dumps, you can confidently approach the CGEIT certification exam with the knowledge and skills required to succeed.
Take other online exams

Question #1
Which of the following types of IT organizational structures states that all IT decision making and the IT budget are in one place, much easier to manage, and require much less effort to organize? wwwwww..vvcceepplluuss..ccoomm -- VVCCEE EExxaamm SSiimmuullaattoorr -- DDoowwnnllooaadd AA++ VVCCEE ((llaatteesstt)) ffrreeee OOppeenn VVCCEE EExxaammss -- VVCCEE ttoo PPDDFF CCoonnvveerrtteerr -- PPDDFF OOnnlliinneeA. Decentralized
B. Federated
C. Project-based
D. Centralized
View answer
Correct Answer: D
Question #2
An organization supports both programs and projects for various industries. What is a portfolio?
A. A portfolio describes all of the monies that are invested in the organization
B. A portfolio is the total amount of funds that have been invested in programs, projects, and operations
C. A portfolio describes any project or program within one industry or application area
D. A portfolio describes the organization of related projects, programs, and operations
View answer
Correct Answer: D
Question #3
Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?
A. Delphi technique
B. Isolated pilot groupsC
D. Root cause analysis
View answer
Correct Answer: A
Question #4
IT Governance is used by the management to regulate the Information Systems, to accomplish its objectives. IT governance forms an integral part of corporate governance. Which of the following elements are required to implement a good IT governance framework? Each correct answer represents a complete solution. Choose all that apply.
A. Communication
B. Structure
C. Project
D. Process
View answer
Correct Answer: ABD
Question #5
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Estimate activity duration
B. Quantitative analysis
C. Qualitative analysis
D. Risk identification
View answer
Correct Answer: C
Question #6
Which of the following processes is described in the statement below? "This is the process of numerically analyzing the effect of identified risks on overall project objectives."
A. Identify Risks
B. Perform Qualitative Risk Analysis
C. Perform Quantitative Risk Analysis
D. Monitor and Control Risks
View answer
Correct Answer: C
Question #7
Which of the following types of IT organizational structures states that all IT decision making and the IT budget are in one place, much easier to manage, and require much less effort to organize?
A. Decentralized
B. Federated
C. Project-based
D. Centralized
View answer
Correct Answer: D
Question #8
What are the various phases of the Software Assurance Acquisition process according to the U.S. Department of Defense (DoD) and Department of Homeland Security (DHS) Acquisition and Outsourcing Working Group?
A. Implementing, contracting, auditing, monitoring
B. Requirements, planning, monitoring, auditing
C. Designing, implementing, contracting, monitoring
D. Planning, contracting, monitoring and acceptance, follow-on
View answer
Correct Answer: D
Question #9
The IT strategy formulation process consists of four steps to provide guidance to all who are involved. Which of the following steps are performed in the IT strategy formulation process? Each correct answer represents a complete solution. Choose all that apply.
A. Decide how to get from here to there
B. Evaluate changes
C. Assess process maturity
D. Map out the big picture
View answer
Correct Answer: ABD
Question #10
You are the project manager of the NHQ project for your company. You are working with your project team to complete a risk audit. A recent issue that your project team responded to, and management approved, was to increase the project schedule because there was risk surrounding the installation time of a new material. Your logic was that with the expanded schedule there would be time to complete the installation without affecting downstream project activities. What type of risk response is being audited in
A. Avoidance
B. Mitigation
C. Parkinson's Law
D. Lag Time
View answer
Correct Answer: A
Question #11
You are the project manager for your organization and you are working with Thomas, a project team member. You and Thomas have been working on a specific risk response for a probable risk event in the project. Thomas is empowered with a risk response and will control all aspects of the identified risk response in which a particular risk event will happen within the project. What title, in regard to risk, is bestowed on Thomas?
A. Risk coordinator
B. Risk expeditor
C. Risk owner
D. Risk team leader
View answer
Correct Answer: C
Question #12
You are the project manager of a large project that will last four years. In this project, you would like to model the risk based on its distribution, impact, and other factors. There are three modeling techniques that a project manager can use to include both event-oriented and project oriented analysis. Which modeling technique does NOT provide event-oriented and project oriented analysis for identified risks?
A. Modeling and simulation
B. Expected monetary value
C. Sensitivity analysis
D. Jo-Hari Window
View answer
Correct Answer: D
Question #13
In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?
A. Design
B. Initiation
C. Programming and training
D. Evaluation and acceptance
View answer
Correct Answer: C
Question #14
You are the project manager for your organization. You are preparing for the quantitative risk analysis. Mark, a project team member, wants to know why you need to do quantitative risk analysis when you just completed qualitative risk analysis. Which one of the following statements best defines what quantitative risk analysis is?
A. Quantitative risk analysis is the process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact
B. Quantitative risk analysis is the planning and quantification of risk responses based on probability and impact of each risk event
C. Quantitative risk analysis is the review of the risk events with the high probability and the highest impact on the project objectives
D. Quantitative risk analysis is the process of numerically analyzing the effect of identified risks on overall project objectives
View answer
Correct Answer: D
Question #15
Your organization mainly focuses on the production of bicycles for selling it around the world. In addition to this, the organization also produces scooters. Management wants to restrict its line of production to bicycles. Therefore, it decides to sell the scooter production department to another competitor. Which of the following terms best describes the sale of the scooter production department to your competitor?
A. Corporate restructure
B. Divestiture
C. Rightsizing
D. Outsourcing
View answer
Correct Answer: B
Question #16
Wendy is the project manager of the FBL project for your company. She has identified several risks within her project and has created a risk contingency reserve of $45,000 total. Her project is nearly complete and many of the risks have not happened in the project. What should Wendy do with the funds in the contingency reserve?
A. The funds for the risks that have passed and have not happened are transferred to the project budget
B. The funds remain in the contingency reserve until all of the risks have passed
C. The funds remain in the contingency reserve until the project is closed
D. The funds for the risks that have passed and have not happened are released
View answer
Correct Answer: D
Question #17
Which of the following is a process that occurs due to mergers, outsourcing or changing business needs?
A. Voluntary exit
B. Plant closing
C. Involuntary exit
D. Outplacement
View answer
Correct Answer: C
Question #18
Which of the following would BEST help to improve an enterprise’s ability to manage large IT investment projects?
A. Reviewing and evaluating existing business cases
B. Creating a change management board
C. Publishing the IT approval process online for wider scrutiny
D. Implementing a review and approval process for each phase
View answer
Correct Answer: C
Question #19
You are the project manager of a newly formed project to create a new manufacturing facility. You are working with a business analyst to identify, document, and prioritize stakeholders' needs for the facility. You'll also need to quantify any subjective terms and needs to define the project scope. What is this process called? wwwwww..vvcceepplluuss..ccoomm -- VVCCEE EExxaamm SSiimmuullaattoorr -- DDoowwnnllooaadd AA++ VVCCEE ((llaatteesstt)) ffrreeee OOppeenn VVCCEE EExxaammss -- VVCCEE ttoo PPDDFF CCoonnvv
B. Project scope statement creation
C. Requirements gathering
D. Stakeholder analysis
View answer
Correct Answer: D
Question #20
Which of the following are the roles of a CEO in the Resource management framework? Each correct answer represents a complete solution. Choose all that wwwwww..vvcceepplluuss..ccoomm -- VVCCEE EExxaamm SSiimmuullaattoorr -- DDoowwnnllooaadd AA++ VVCCEE ((llaatteesstt)) ffrreeee OOppeenn VVCCEE EExxaammss -- VVCCEE ttoo PPDDFF CCoonnvveerrtteerr -- PPDDFF OOnnlliinneeapply.
A. Organizing and facilitating IT strategic implementations
B. Establishment of business priorities & allocation of resources for IT performance
C. Overseeing the aggregate IT funding
D. Capitalization on knowledge & information
View answer
Correct Answer: ABD
Question #21
Gary has identified a project risk that could injure project team members. He does not want to accept any risk where someone could become injured on this project so he hires a professional vendor to complete this portion of the project work. This workaround to the risk event is known as what type of risk response?
A. Avoidance
B. Mitigation
C. Acceptance
D. Transference
View answer
Correct Answer: D
Question #22
Enterprise IT has overseen the implementation of an array of data services with overlapping functionality leading to businessinefficiencies. Which of the following is the MOST likely cause of this situation?
A. An outdated service level agreement (SLA)
B. Ineffective project management
C. An incomplete cost-benefit analysis
D. Insufficient information architecture
View answer
Correct Answer: B
Question #23
The CIO of a global technology company is considering introducing a bring your own device (BYOD) program. What shouldthe CIO do FIRST?
A. Ensure the infrastructure can meet BYOD requirements
B. Define a clear and inclusive BYOD policy
C. Establish a business case
D. Focus on securing data and access to data
View answer
Correct Answer: C
Question #24
Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?
A. Project gap
B. Competitive gap
C. Usage gap
D. Product gap
View answer
Correct Answer: C
Question #25
Jenny is the project manager for the NBT projects. She is working with the project team and several subject matter experts to perform the quantitative risk analysis process. During this process she and the project team uncover several risks events that were not previously identified. What should Jenny do with these risk events?
A. The events should be determined if they need to be accepted or responded to
B. The events should be entered into the risk register
C. The events should continue on with quantitative risk analysis
D. The events should be entered into qualitative risk analysis
View answer
Correct Answer: B
Question #26
Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell Bonny?
A. A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process
B. A risk audit is a review of all the risks that have yet to occur and what their probability of happening are
C. A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been
D. A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred
View answer
Correct Answer: A
Question #27
Which of the following is MOST important for the effective design of an IT balanced scorecard?
A. On-demand reporting and continuous monitoring
B. Consulting with the CIO
C. Emphasizing the financial results
D. Identifying appropriate key performance indicators (KPIs)
View answer
Correct Answer: D
Question #28
An IT strategy committee wants to ensure that a risk program is successfully implemented throughout the enterprise. Whichof the following would BEST support this goal?
A. Commitment from senior management
B. Mandatory risk awareness courses for staff
C. A risk management framework
D. A risk recognition and reporting policy
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: