You can prepare for Isaca CGEIT with little effort because Flydumps is now at your service to act as a guide in Flydumps you pass Isaca https://www.pass4itsure.com/cgeit.html exam. Now get that necessary competitive edge that comes with preparing with the help of Flydumps.
You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management’s objective for your project?
A. Quantitative analysis
B. Qualitative risk analysis
C. Historical information
D. Rolling wave planning
You are the project manager for your organization and you are working with Thomas, a project team member. You and Thomas have been working on a specific risk response for a probable risk event in the project. Thomas is empowered with a risk response and will control all aspects of the identified risk response in which a particular risk event will happen within the project. What title, in regard to risk, is bestowed on Thomas?
A. Risk coordinator
B. Risk expeditor
C. Risk owner
D. Risk team leader
Which of the following essential elements of IT Portfolio Investment Management drives better decisions by providing real-time portfolio performance information in personalized views, such as cost/benefit summary, risk versus reward, ROI versus alignment, and balance bubble charts?
A. Workflow, Process Management, Tracking and Authorization
B. Portfolio Management
C. Integrated Dashboards and Scorecards
D. Portfolio What-If Planning
Val IT is a suite of documents that provide a framework for the governance of IT investments, produced by the IT Governance Institute (ITGI). It is a formal statement of principles and processes for IT portfolio management. Drag and drop the correct domain (‘Portfolio management’) next to the IT processes defined by Val IT.
What are the various phases of the Software Assurance Acquisition process according to the U.S. Department of Defense (DoD) and Department of Homeland Security (DHS) Acquisition and Outsourcing Working Group?
A. Implementing, contracting, auditing, monitoring
B. Requirements, planning, monitoring, auditing
C. Designing, implementing, contracting, monitoring
D. Planning, contracting, monitoring and acceptance, follow-on
Which of the following sub-processes of Service Portfolio Management is used to define the overall goals that the service provider should follow in its development based on the outcome of Strategic Service Assessment?
A. Service Portfolio Update
B. Strategic Service Assessment
C. Service Strategy Definition
D. Strategic Planning
Which of the following are the main goals of Broadcasting Board of Governors (BBG)’s strategic plan
Each correct answer represents a complete solution. Choose all that apply.
A. It employs modern communication techniques and technologies.
B. It builds on our reach and impact within the muslim world.
C. It engages the world in conversation about England.
D. It enhances program delivery across all platforms.
Which of the following types of IT organizational structures states that all IT decision-making and the IT budget are in one place, much easier to manage, and require much less effort to organize?
A service provider guarantees for end-to-end network traffic performance to a customer. Which of the following types of agreement is this?
Which of the following domains of COBIT covers areas such as the execution of the applications within the IT system and its results as well as the support processes that enable the effective and efficient execution of these IT systems?
A. Deliver and Support
B. Acquire and Implement
C. Monitor and Evaluate
D. Plan and Organize
Gary has identified a project risk that could injure project team members. He does not want to accept any risk where someone could become injured on this project so he hires a professional vendor to complete this portion of the project work. This workaround to the risk event is known as what type of risk response?
Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell Bonny?
A. A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process.
B. A risk audit is a review of all the risks that have yet to occur and what their probability of happening are.
C. A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been.
D. A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred.
Wendy is the project manager of the FBL project for your company. She has identified several risks within her project and has created a risk contingency reserve of $45,000 total. Her project is nearly complete and many of the risks have not happened in the project. What should Wendy do with the funds in the contingency reserve?
A. The funds for the risks that have passed and have not happened are transferred to the project budget.
B. The funds remain in the contingency reserve until all of the risks have passed.
C. The funds remain in the contingency reserve until the project is closed.
D. The funds for the risks that have passed and have not happened are released.
Which of the following frameworks defines ERM as a process, effected by an entity’s board of directors, management, and other personnel, applied in strategy setting and across the enterprise?
B. COSO ERM framework
C. Casualty Actuarial Society framework
D. Val IT
The IT strategy formulation process consists of four steps to provide guidance to all who are involved. Which of the following steps are performed in the IT strategy formulation process? Each correct answer represents a complete solution. Choose all that apply.
A. Decide how to get from here to there.
B. Evaluate changes.
C. Assess process maturity.
D. Map out the big picture.
Which of the following concepts is a semi-standard structured report supported by proven design methods and automation tools that can be used by managers to keep track of the execution of activities by staff within their control and monitor the consequences arising from these actions?
A. Total Security Management
B. Balanced Scorecard (BSC)
C. Total Quality Management
D. Six Sigma
Drag and drop the various architecture domains for TOGAF at the appropriate places.
The Information Technology Infrastructure Library (ITIL) is a set of concepts and policies for managing information technology (IT) infrastructure, development, and operations. Drag and drop the ITIL processes that focus on service operation, i.e. operational processes in Service Support, in the correct places.
You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?
Which of the following is the main objective of business process outsourcing?
A. Realigning business process with business strategy
B. Permitting the enterprise to focus on core main competences
C. Optimizing business processes
D. Increasing the automation of business processes
In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?
C. Programming and training
D. Evaluation and acceptance
You are the project manager of a newly formed project to create a new manufacturing facility. You are working with a business analyst to identify, document, and prioritize stakeholders’ needs for the facility. You’ll also need to quantify any subjective terms and needs to define the project scope. What is this process called?
A. Requirements analysis
B. Project scope statement creation
C. Requirements gathering
D. Stakeholder analysis
IT Governance is used by the management to regulate the Information Systems, to accomplish its
objectives. IT governance forms an integral part of corporate governance. Which of the following
elements are required to implement a good IT governance framework?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
A. The Service Catalogue Manager
B. The Supplier Manager
C. The Configuration Manager
D. The IT Service Continuity Manager
All projects that are presented in your organization must go through a board to review the return on investment, risk, and worthiness of a project. All projects are considered but not all projects are initiated. What is the name of the process that this board is completing in your organization?
A. Project selection committee
B. Change governance
C. Project portfolio management
D. Project portfolio management board
Which of the following essential elements of IT Portfolio Investment Management enables portfolio managers to include or exclude investments, change start and end-dates, adjust budgets and reevaluate priorities?
A. Integrated Capability
B. Portfolio Planning Analysis
C. Portfolio What-If Planning
D. Portfolio Management
Fred is the project manager of the PKL project. He is working with his project team to complete the quantitative risk analysis process as a part of risk management planning. Fred understands that once the quantitative risk analysis process is complete, the process will need to be completed again in at least two other times in the project. When will the quantitative risk analysis process need to be repeated?
A. Quantitative risk analysis process will be completed again after the risk response planning and as a part of monitoring and controlling.
B. Quantitative risk analysis process will be completed again after the plan risk response planning and as part of procurement.
C. Quantitative risk analysis process will be completed again after new risks are identified and as pa of monitoring and controlling.
D. Quantitative risk analysis process will be completed again after the cost management planning an as a part of monitoring and controlling.
You work as a project manager for BlueWell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decided, with your stakeholders’ approval, to fast track the project work to get the project done faster. When you fast track the project which of the following are likely to increase?
C. Human resource needs
D. Quality control concerns
Which of the following processes ensures that all vital assets and resources of the organization are safeguarded?
A. Defining Resource Requirements process
B. Cost estimating process
C. Vendor contract administration process
D. Risk management process
The Information Technology Infrastructure Library (ITIL) is a set of concepts and policies for managing information technology (IT) infrastructure, development, and operations. Drag and drop the ITIL processes that focus on service planning, i.e. tactical processes in Service Delivery, in the correct places.
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
A. Vulnerability analysis
B. Cost-benefit analysis
C. Requirement analysis
D. Gap analysis
The entry points to Service Strategy are referred to as “the Four Ps”. They identify the different forms a service strategy may take. Which of the following is a correct list of the ‘Four Ps’?
A. People, Products, Partners, and Profit
B. People, Potential, Products, and Performance
C. Potential, Preparation, Performance, and Profit
D. Perspective, Position, Plan, and Pattern
Melody is the project manager for her organization. She has created a risk response to conduct more tests on the software her project is creating. The identified risk that prompted this response was that the software is mission-critical and must be flawless before it can be put into product. What type of a risk response has Melody used in this scenario?
Which of the following are the roles of a CIO in the Resource management framework? Each correct answer represents a complete solution. Choose all that apply.
A. Standardizes architecture & technology.
B. Defines value creation roles within IT.
C. Provides IT infrastructure to facilitate knowledge & information creation/sharing.
D. Establishes business priorities & allocates resources for IT performance.
Elizabeth is a project manager for her organization and she finds risk management to be very difficult for her to manage. She asks you, a lead project manager, at what stage in the project will risk management become easier. What answer best resolves the difficulty of risk management practices and the effort required?
A. Risk management only becomes easier the more often it is practiced.
B. Risk management only becomes easier when the project is closed.
C. Risk management is an iterative process and never becomes easier.
D. Risk management only becomes easier when the project moves into project execution.
Isaca CGEIT exam is a challenging Certification Exam. Besides the books, internet is considered to be a treasure house of knowledge. In Flydumps you can find your treasure house of knowledge. This is a site of great help to you. You will encounter the complex questions in the exam, but Passcert can help you to pass the exam easily. Flydumps Latest Isaca https://www.pass4itsure.com/cgeit.html dumps includes all the knowledge that must be mastered for the purpose of passing the Isaca CGEIT exam.