Topic 1: Volume A
Which of the following sub-processes of Service Portfolio Management is used to define
the overall goals that the service provider should follow in its development based on the
outcome of Strategic Service Assessment?
A.
Service Portfolio Update
B.
Strategic Service Assessment
C.
Service Strategy Definition
D.
Strategic Planning
Service Strategy Definition
Gary has identified a project risk that could injure project team members. He does not want
to accept any risk where someone could become injured on this project so he hires a
professional vendor to complete this portion of the project work. This workaround to the risk
event is known as what type of risk response?
A.
Avoidance
B.
Mitigation
C.
Acceptance
D.
Transference
Transference
All projects that are presented in your organization must go through a board to review the
return on investment, risk, and worthiness of a project. All projects are considered but not
all projects are initiated. What is the name of the process that this board is completing in
your organization?
A.
Project selection committee
B.
Change governance
C.
Project portfolio management
D.
Project portfolio management board
Project portfolio management
Which of the following domains of CGEIT aims to guarantee that the IT enables and
supports the achievement of business objectives through the integration of IT strategic
plans with business strategic plans and the alignment of IT services with enterprise
operations?
A.
Risk Management
B.
IT Governance Framework
C.
Strategic Alignment
D.
Value Delivery
Strategic Alignment
Your project spans the entire organization. You would like to assess the risk of the project
but are worried that some of the managers involved in the project could affect the outcome
of any risk identification meeting. Your worry is based on the fact that some employees
would not want to publicly identify risk events that could make their supervisors look bad.
You would like a method that would allow participants to anonymously identify risk events.
What risk identification method could you use?
A.
Delphi technique
B.
Isolated pilot groups
C.
SWOT analysis
D.
Root cause analysis
Delphi technique
Page 13 out of 56 Pages |
Previous |