Go Back on CGEIT Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CGEIT Practice Test


Page 13 out of 56 Pages

Topic 1: Volume A

Which of the following sub-processes of Service Portfolio Management is used to define
the overall goals that the service provider should follow in its development based on the
outcome of Strategic Service Assessment?


A.

Service Portfolio Update


B.

Strategic Service Assessment


C.

Service Strategy Definition


D.

Strategic Planning





C.
  

Service Strategy Definition



Gary has identified a project risk that could injure project team members. He does not want
to accept any risk where someone could become injured on this project so he hires a
professional vendor to complete this portion of the project work. This workaround to the risk
event is known as what type of risk response?


A.

Avoidance


B.

Mitigation


C.

Acceptance


D.

Transference





D.
  

Transference



All projects that are presented in your organization must go through a board to review the
return on investment, risk, and worthiness of a project. All projects are considered but not
all projects are initiated. What is the name of the process that this board is completing in
your organization?


A.

Project selection committee


B.

Change governance


C.

Project portfolio management


D.

Project portfolio management board





C.
  

Project portfolio management



Which of the following domains of CGEIT aims to guarantee that the IT enables and
supports the achievement of business objectives through the integration of IT strategic
plans with business strategic plans and the alignment of IT services with enterprise
operations?


A.

Risk Management


B.

IT Governance Framework


C.

Strategic Alignment


D.

Value Delivery





C.
  

Strategic Alignment



Your project spans the entire organization. You would like to assess the risk of the project
but are worried that some of the managers involved in the project could affect the outcome
of any risk identification meeting. Your worry is based on the fact that some employees
would not want to publicly identify risk events that could make their supervisors look bad.
You would like a method that would allow participants to anonymously identify risk events.
What risk identification method could you use?


A.

Delphi technique


B.

Isolated pilot groups


C.

SWOT analysis


D.

Root cause analysis





A.
  

Delphi technique




Page 13 out of 56 Pages
Previous