CGEIT Exam Questions

Total 279 Questions

Last Updated Exam :

Topic 1: Volume A

Which of the following sub-processes of Service Portfolio Management is used to define
the overall goals that the service provider should follow in its development based on the
outcome of Strategic Service Assessment?


A.

Service Portfolio Update


B.

Strategic Service Assessment


C.

Service Strategy Definition


D.

Strategic Planning





C.
  

Service Strategy Definition



Gary has identified a project risk that could injure project team members. He does not want
to accept any risk where someone could become injured on this project so he hires a
professional vendor to complete this portion of the project work. This workaround to the risk
event is known as what type of risk response?


A.

Avoidance


B.

Mitigation


C.

Acceptance


D.

Transference





D.
  

Transference



All projects that are presented in your organization must go through a board to review the
return on investment, risk, and worthiness of a project. All projects are considered but not
all projects are initiated. What is the name of the process that this board is completing in
your organization?


A.

Project selection committee


B.

Change governance


C.

Project portfolio management


D.

Project portfolio management board





C.
  

Project portfolio management



Which of the following domains of CGEIT aims to guarantee that the IT enables and
supports the achievement of business objectives through the integration of IT strategic
plans with business strategic plans and the alignment of IT services with enterprise
operations?


A.

Risk Management


B.

IT Governance Framework


C.

Strategic Alignment


D.

Value Delivery





C.
  

Strategic Alignment



Your project spans the entire organization. You would like to assess the risk of the project
but are worried that some of the managers involved in the project could affect the outcome
of any risk identification meeting. Your worry is based on the fact that some employees
would not want to publicly identify risk events that could make their supervisors look bad.
You would like a method that would allow participants to anonymously identify risk events.
What risk identification method could you use?


A.

Delphi technique


B.

Isolated pilot groups


C.

SWOT analysis


D.

Root cause analysis





A.
  

Delphi technique



You are hosting a collection of stakeholders from across the organization to identify the
ideas and attitudes about your company's help desk. You want the stakeholders to
honestly share their opinions about the help desk service so you can identify problems,
solutions, and take actions to improve the service. What type of requirements elicitation
activity is this?


A.

Root cause analysis


B.

Stakeholder analysis


C.

Focus groups


D.

Workshop





C.
  

Focus groups



You work as a project manager for TYU project. You are planning for risk mitigation.
You need to identify the risks that will need a more in-depth analysis. Which of the following
activities will help you in this?


A.

Estimate activity duration


B.

Quantitative analysis


C.

Qualitative analysis


D.

Risk identification





C.
  

Qualitative analysis



An organization supports both programs and projects for various industries. What is a
portfolio?


A.

A portfolio describes all of the monies that are invested in the organization.


B.

A portfolio is the total amount of funds that have been invested in programs, projects,
and operations.


C.

A portfolio describes any project or program within one industry or application area.


D.

A portfolio describes the organization of related projects, programs, and operations.





D.
  

A portfolio describes the organization of related projects, programs, and operations.



Sensitivity analysis is a technique for systematically changing parameters in a model to
determine the effects of such changes and is useful for computer modelers for a range of
purposes. Which of the following purposes does the sensitivity analysis include? Each
correct answer represents a complete solution. Choose all that apply.


A.

Decision making or the development of recommendations for decision makers


B.

Model development


C.

Estimating the average outcome


D.

Increased understanding or quantification of the system





A.
  

Decision making or the development of recommendations for decision makers



B.
  

Model development



D.
  

Increased understanding or quantification of the system



Harold is the project manager of a large project in his organization. He has been actively
communicating and working with the project stakeholders. One of the outputs of the
manage stakeholder expectations process can actually create new risk events for Harold's
project. Which output of the manage stakeholder expectations process can create risks?


A.

Project management plan updates


B.

Project document updates


C.

Change requests


D.

Organizational process assets updates





C.
  

Change requests




Page 7 out of 28 Pages
Previous