CGEIT Exam Questions

Total 279 Questions

Last Updated Exam :

Topic 1: Volume A

You work as a project manager for TechSoft Inc. You are working with the project
stakeholders on the qualitative risk analysis process in your project. You have used all the
tools to the qualitative risk analysis process in your project. Which of the following
techniques is NOT used as a tool in qualitative risk analysis process?


A.

Risk Data Quality Assessment


B.

Risk Categorization


C.

Risk Reassessment


D.

Risk Urgency Assessment





C.
  

Risk Reassessment



Paul has been asked to complete SWOT analysis for his solution scope. What does SWOT analysis mean?


A.

Stakeholder Weaknesses, Organizational Threats


B.

Strengths, Weaknesses, Opportunities, Threats


C.

Strengths, Weaknesses, Opportunities, Time


D.

Stakeholders Weaknesses, Organization, Threats





B.
  

Strengths, Weaknesses, Opportunities, Threats



Marsha is the project manager of the NHQ Project. There's a risk that her project team has
identified, which could cause the project to be late by more than a month. Marsha does not
want this risk event to happen so she devises extra project activities to ensure that the risk
event will not happen. The extra steps, however, will cost the project an additional $10,000.
What type of risk response is this approach?


A.

Exploiting


B.

Transference


C.

Mitigation


D.

Enhancing





C.
  

Mitigation



Which of the following essential elements of IT Portfolio Investment Management drives
better decisions by providing real-time portfolio performance information in personalized
views, such as cost/benefit summary, risk versus reward, ROI versus alignment, and
balance bubble charts?


A.

Workflow, Process Management, Tracking and Authorization


B.

Portfolio Management


C.

Integrated Dashboards and Scorecards


D.

Portfolio What-If Planning





C.
  

Integrated Dashboards and Scorecards



Which of the following essential elements of IT Portfolio Investment Management enables
portfolio managers to include or exclude investments, change start and end dates, adjust
budgets and reevaluate priorities?


A.

Integrated Capability


B.

Portfolio Planning Analysis


C.

Portfolio What-If Planning


D.

Portfolio Management





C.
  

Portfolio What-If Planning



Which of the following stages of the Forrester's IT Governance Maturity Model describes
that the IT governance processes are applied across the enterprise where all business
units/entities conform to the same set of IT governance processes, and IT investment
decisions are based on the enterprise view?


A.

Stage 3-Consistent


B.

Stage 4-Best practices


C.

Stage 1-Ad hoc


D.

Stage 2-Fragmented





A.
  

Stage 3-Consistent



Mark is the project manager of the BFL project for his organization. He and the project
team are creating a probability and impact matrix using RAG rating. There is some
confusion and disagreement among the project team as to how a certain risk is important
and priority for attention should be managed. Where can Mark determine the priority of a
risk given its probability and impact?


A.

Risk response plan


B.

Look-up table


C.

Project sponsor


D.

Risk management plan





B.
  

Look-up table



In software development, which of the following analysis is used to document the services
and functions that have been accidentally left out, deliberately eliminated or still need to be
developed?


A.

Vulnerability analysis


B.

Cost-benefit analysis


C.

Requirement analysis


D.

Gap analysis





D.
  

Gap analysis



Which of the following is NOT a valid maturity level of the Software Capability Maturity
Model (CMM)?


A.

Repeatable level


B.

Managed level


C.

Defined level


D.

Fundamental level





D.
  

Fundamental level



In which of the following phases of the SDLC does the software and other components of
the system faithfully incorporate the design specifications and provide proper
documentation and training?


A.

Design


B.

Initiation


C.

Programming and training


D.

Evaluation and acceptance





C.
  

Programming and training




Page 6 out of 28 Pages
Previous