Download Certified in the Governance of Enterprise IT.CGEIT.PassLeader.2019-02-25.279q.vcex

Vendor: ISACA
Exam Code: CGEIT
Exam Name: Certified in the Governance of Enterprise IT
Date: Feb 25, 2019
File Size: 1015 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
You are the project manager of the NHQ project for your company. You are working with your project team to complete a risk audit. A recent issue that your project team responded to, and management approved, was to increase the project schedule because there was risk surrounding the installation time of a new material. Your logic was that with the expanded schedule there would be time to complete the installation without affecting downstream project activities. What type of risk response is being audited in this scenario?
  1. Avoidance
  2. Mitigation
  3. Parkinson's Law
  4. Lag Time
Correct answer: A
Question 2
You are the project manager for your organization. You are preparing for the quantitative risk analysis. Mark, a project team member, wants to know why you need to do quantitative risk analysis when you just completed qualitative risk analysis. Which one of the following statements best defines what quantitative risk analysis is?
  1. Quantitative risk analysis is the process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact.
  2. Quantitative risk analysis is the planning and quantification of risk responses based on probability and impact of each risk event.
  3. Quantitative risk analysis is the review of the risk events with the high probability and the highest impact on the project objectives.
  4. Quantitative risk analysis is the process of numerically analyzing the effect of identified risks on overall project objectives.
Correct answer: D
Question 3
Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?
  1. Delphi technique
  2. Isolated pilot groups
  3. SWOT analysis
  4. Root cause analysis
Correct answer: A
Question 4
Fill in the blank with an appropriate phrase. 
_________models address specifications, requirements, design, verification and validation, and maintenance activities.
  1. Life cycle
Correct answer: 1
Question 5
Fill in the blank with an appropriate word. 
________is also referred to as corporate governance, and covers issues such as board structures, roles and executive remuneration.
  1. Conformance
Correct answer: 1
Question 6
Which of the following is NOT a sub-process of Service Portfolio Management?
  1. Service Portfolio Update
  2. Business Planning Data
  3. Strategic Planning
  4. Strategic Service Assessment
  5. Service Strategy Definition
Correct answer: B
Question 7
Mary is the business analyst for your organization. She asks you what the purpose of the assess capability gaps task is. Which of the following is the best response to give Mary?
  1. It identifies the causal factors that are contributing to an effect the solution will solve.
  2. It identifies new capabilities required by the organization to meet the business need.
  3. It describes the ends that the organization wants to improve.
  4. It identifies the skill gaps in the existing resources.
Correct answer: B
Question 8
Which of the following are the roles of a CEO in the Resource management framework? 
Each correct answer represents a complete solution. Choose all that apply.
  1. Organizing and facilitating IT strategic implementations
  2. Establishment of business priorities & allocation of resources for IT performance
  3. Overseeing the aggregate IT funding
  4. Capitalization on knowledge & information
Correct answer: ABD
Question 9
Fill in the blank with an appropriate phrase. 
_________is the study of how the variation (uncertainty) in the output of a mathematical model can be apportioned, qualitatively or quantitatively, to different sources of variation in the input of a model
  1. Sensitivity analysis
Correct answer: 1
Question 10
Which of the following is a process that occurs due to mergers, outsourcing or changing business needs?
  1. Voluntary exit
  2. Plant closing
  3. Involuntary exit
  4. Outplacement
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!