DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Pass Your CGEIT Exam with Practice Tests 2024 Updated, Certified in the Governance of Enterprise IT | SPOTO

Pass Your CGEIT Exam with Practice Tests 2024 Updated | SPOTOAs technology continues to evolve, the demand for skilled professionals in enterprise IT governance increases. Obtaining the Certified in the Governance of Enterprise IT (CGEIT) certification from ISACA demonstrates your commitment to excellence and expertise in this field. To ensure success in the 2024 CGEIT exam, thorough preparation is crucial, and SPOTO offers the latest and most comprehensive exam preparation resources.Our 2024 updated CGEIT practice tests are meticulously crafted to mirror the actual exam format, helping you familiarize yourself with the question types, time management strategies, and exam environment. Our exam questions and answers are regularly reviewed and updated by subject matter experts, ensuring you receive the most current and relevant information.Utilize our exam materials, including sample questions, exam dumps, online exam questions, and mock exams, to identify your strengths and weaknesses, allowing you to focus your preparation efforts effectively. Our exam simulator replicates the real exam experience, providing you with valuable practice and boosting your confidence.
Take other online exams

Question #1
You are a management consultant. WebTech Inc., an e-commerce organization, hires you to analyze its SWOT. Which of the following factors will you not wwwwww..vvcceepplluuss..ccoomm -- VVCCEE EExxaamm SSiimmuullaattoorr -- DDoowwnnllooaadd AA++ VVCCEE ((llaatteesstt)) ffrreeee OOppeenn VVCCEE EExxaammss -- VVCCEE ttoo PPDDFF CCoonnvveerrtteerr -- PPDDFF OOnnlliinneeconsider for the SWOT analysis?
A. Bandwidth
B. Pricing
C. Product
D. Promotion
View answer
Correct Answer: A
Question #2
Which of the following processes is responsible for low risk, frequently occurring low cost changes?
A. Incident Management
B. IT Facilities Management
C. Release Management
D. Request Fulfillment
View answer
Correct Answer: D
Question #3
Which of the following are the roles of a CEO in the Resource management framework? Each correct answer represents a complete solution. Choose all that apply.
A. Organizing and facilitating IT strategic implementations
B. Establishment of business priorities & allocation of resources for IT performance
C. Overseeing the aggregate IT funding
D. Capitalization on knowledge & information
View answer
Correct Answer: ABD
Question #4
Which of the following are the main goals of Broadcasting Board of Governors (BBG)'s strategic plan 2008-2013?Each correct answer represents a complete solution. Choose all that apply.
A. It employs modern communication techniques and technologies
B. It builds on our reach and impact within the muslim world
C. It engages the world in conversation about England
D. It enhances program delivery across all platforms
View answer
Correct Answer: ABD
Question #5
Jenny is the project manager for the NBT projects. She is working with the project team and several subject matter experts to perform the quantitative risk analysis process. During this process she and the project team uncover several risks events that were not previously identified. What should Jenny do with these risk events?
A. The events should be determined if they need to be accepted or responded to
B. The events should be entered into the risk register
D. The events should be entered into qualitative risk analysis
View answer
Correct Answer: B
Question #6
Which of the following sub-processes of Service Portfolio Management is used to define the overall goals that the service provider should follow in its development based on the outcome of Strategic Service Assessment?
A. Service Portfolio Update
B. Strategic Service Assessment
C. Service Strategy Definition
D. Strategic Planning
View answer
Correct Answer: C
Question #7
Which of the following domains of COBIT covers areas such as the execution of the applications within the IT system and its results as well as the support processes that enable the effective and efficient execution of these IT systems?
A. Deliver and Support
B. Acquire and Implement
C. Monitor and Evaluate
D. Plan and Organize
View answer
Correct Answer: A
Question #8
Which of the following are parts of SWOT Analysis? Each correct answer represents a complete solution. Choose all that apply.
A. Optimism
B. Threats
C. Weaknesses
D. Opportunities
E. Tools
F. Strengths
View answer
Correct Answer: BCDF
Question #9
Beth is a project team member on the JHG Project. Beth has added extra features to the project and this has introduced new risks to the project work. The project manager of the JHG project elects to remove the features Beth has added. The process of removing the extra features to remove the risks is called what?
A. Corrective action
B. Preventive action
C. Scope creep
D. Defect repair
View answer
Correct Answer: B
Question #10
You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?
A. Quantitative analysis
B. Qualitative risk analysis
C. Historical information
D. Rolling wave planning
View answer
Correct Answer: B
Question #11
Which of the following is the main objective of business process outsourcing?
A. Realigning business process with business strategy
B. Permitting the enterprise to focus on core main competences
C. Optimizing business processes
D. Increasing the automation of business processes
View answer
Correct Answer: B
Question #12
Melody is the project manager for her organization. She has created a risk response to conduct more tests on the software her project is creating. The identified risk that prompted this response was that the software is mission-critical and must be flawless before it can be put into product. What type of a risk response has Melody used in this scenario?
A. Transference
B. Enhance
C. Avoidance
D. Mitigation
View answer
Correct Answer: D
Question #13
The entry points to Service Strategy are referred to as "the Four Ps". They identify the different forms a service strategy may take. Which of the following is a correct list of the 'Four Ps'?
A. People, Products, Partners, and Profit
B. People, Potential, Products, and Performance
C. Potential, Preparation, Performance, and Profit
D. Perspective, Position, Plan, and Pattern
View answer
Correct Answer: D
Question #14
Mark is the project manager of the BFL project for his organization. He and the project team are creating a probability and impact matrix using RAG rating. There is some confusion and disagreement among the project team as to how a certain risk is important and priority for attention should be managed. Where can Mark determine the priority of a risk given its probability and impact?
A. Risk response plan
B. Look-up table
C. Project sponsor
D. Risk management plan
View answer
Correct Answer: B
Question #15
Which of the following frameworks defines ERM as a process, effected by an entity's board of directors, management, and other personnel, applied in strategy setting and across the enterprise?
A. COBIT
B. COSO ERM framework
C. Casualty Actuarial Society framework
D. Val IT
View answer
Correct Answer: B
Question #16
Which of the following essential elements of IT Portfolio Investment Management drives better decisions by providing real-time portfolio performance information in personalized views, such as cost/benefit summary, risk versus reward, ROI versus alignment, and balance bubble charts?
A. Workflow, Process Management, Tracking and Authorization
B. Portfolio Management
C. Integrated Dashboards and Scorecards
D. Portfolio What-If Planning
View answer
Correct Answer: C
Question #17
Fred is the project manager of the PKL project. He is working with his project team to complete the quantitative risk analysis process as a part of risk management planning. Fred understands that once the quantitative risk analysis process is complete, the process will need to be completed again in at least two other times in the project. When will the quantitative risk analysis process need to be repeated?
A. Quantitative risk analysis process will be completed again after the risk response planning and as a part of monitoring and controlling
B. Quantitative risk analysis process will be completed again after the plan risk response planning and as part of procurement
C. Quantitative risk analysis process will be completed again after new risks are identified and as pa of monitoring and controlling
D. Quantitative risk analysis process will be completed again after the cost management planning an as a part of monitoring and controlling
View answer
Correct Answer: A
Question #18
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
A. Vulnerability analysis
B. Cost-benefit analysis
C. Requirement analysis
D. Gap analysis
View answer
Correct Answer: D
Question #19
wwwwww..vvcceepplluuss..ccoomm -- VVCCEE EExxaamm SSiimmuullaattoorr -- DDoowwnnllooaadd AA++ VVCCEE ((llaatteesstt)) ffrreeee OOppeenn VVCCEE EExxaammss -- VVCCEE ttoo PPDDFF CCoonnvveerrtteerr -- PPDDFF OOnnlliinneeYour project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publi
A. Delphi technique
B. Isolated pilot groups
C. SWOT analysis
D. Root cause analysis
View answer
Correct Answer: A
Question #20
Benchmarking is a continuous process that can be time consuming to do correctly. Which of the following guidelines for performing benchmarking identifies the critical processes and creates measurement techniques to grade the process?
A. Research
B. Adapt
C. Plan
D. Improve
View answer
Correct Answer: C
Question #21
Mary is the business analyst for your organization. She asks you what the purpose of the assess capability gaps task is. Which of the following is the best response to give Mary?
A. It identifies the causal factors that are contributing to an effect the solution will solve
B. It identifies new capabilities required by the organization to meet the business need
C. It describes the ends that the organization wants to improve
D. It identifies the skill gaps in the existing resources
View answer
Correct Answer: B
Question #22
You are the project manager for your organization and you are working with Thomas, a project team member. You and Thomas have been working on a specific risk response for a probable risk event in the project. Thomas is empowered with a risk response and will control all aspects of the identified risk response in which a particular risk event will happen within the project. What title, in regard to risk, is bestowed on Thomas?
A. Risk coordinator
B. Risk expeditor
C. Risk owner wwwwww
View answer
Correct Answer: C
Question #23
Which of the following essential elements of IT Portfolio Investment Management enables portfolio managers to include or exclude investments, change start and end dates, adjust budgets and reevaluate priorities?
A. Integrated Capability
B. Portfolio Planning Analysis
C. Portfolio What-If Planning
D. Portfolio Management
View answer
Correct Answer: C
Question #24
wwwwww..vvcceepplluuss..ccoomm -- VVCCEE EExxaamm SSiimmuullaattoorr -- DDoowwnnllooaadd AA++ VVCCEE ((llaatteesstt)) ffrreeee OOppeenn VVCCEE EExxaammss -- VVCCEE ttoo PPDDFF CCoonnvveerrtteerr -- PPDDFF OOnnlliinneeWhich of the following processes is described in the statement below? "This is the process of numerically analyzing the effect of identified risks on overall project objectives."
A. Identify Risks
B. Perform Qualitative Risk Analysis
C. Perform Quantitative Risk Analysis
D. Monitor and Control Risks
View answer
Correct Answer: C
Question #25
wwwwww..vvcceepplluuss..ccoomm -- VVCCEE EExxaamm SSiimmuullaattoorr -- DDoowwnnllooaadd AA++ VVCCEE ((llaatteesstt)) ffrreeee OOppeenn VVCCEE EExxaammss -- VVCCEE ttoo PPDDFF CCoonnvveerrtteerr -- PPDDFF OOnnlliinneeWendy is the project manager of the FBL project for your company. She has identified several risks within her project and has created a risk contingency reserve of $45,000 total. Her project is nearly complete and many of the risks have not happened in the project. What should Wendy do with the
A. The funds for the risks that have passed and have not happened are transferred to the project budget
B. The funds remain in the contingency reserve until all of the risks have passed
C. The funds remain in the contingency reserve until the project is closed
D. The funds for the risks that have passed and have not happened are released
View answer
Correct Answer: D
Question #26
An organization supports both programs and projects for various industries. What is a portfolio?
A. A portfolio describes all of the monies that are invested in the organization
B. A portfolio is the total amount of funds that have been invested in programs, projects, and operations
D. A portfolio describes the organization of related projects, programs, and operations
View answer
Correct Answer: D
Question #27
The IT strategy formulation process consists of four steps to provide guidance to all who are involved. Which of the following steps are performed in the IT strategy formulation process? Each correct answer represents a complete solution. Choose all that apply.
A. Decide how to get from here to there
B. Evaluate changes
D. Map out the big picture
View answer
Correct Answer: ABD

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: