[Free] 2018(Jan) EnsurePass Testinsides Isaca CGEIT Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Isaca Official New Released CGEIT
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/CGEIT.html

Topic 1, Volume A

Question No: 31 – (Topic 1)

Which of the following processes is responsible for low risk, frequently occurring low cost changes?

  1. Incident Management

  2. IT Facilities Management

  3. Release Management

  4. Request Fulfillment

Answer: D

Question No: 32 – (Topic 1)

You work as a project manager for TYU project. You are planning for risk mitigation.

You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

  1. Estimate activity duration

  2. Quantitative analysis

  3. Qualitative analysis

  4. Risk identification

Answer: C

Question No: 33 – (Topic 1)

Which of the following responsibilities are performed by the core team of IT governance? Each correct answer represents a complete solution. Choose all that apply.

  1. Provide service feedback to providers.

  2. Undertake core tasks.

  3. Define plan and deliverables.

  4. Report on process.

Answer: B,C,D

Question No: 34 – (Topic 1)

Which of the following domains of COBIT covers areas such as the execution of the applications within the IT system and its results as well as the support processes that enable the effective and efficient execution of these IT systems?

  1. Deliver and Support

  2. Acquire and Implement

  3. Monitor and Evaluate

  4. Plan and Organize

Answer: A

Question No: 35 – (Topic 1)

Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?

  1. Delphi technique

  2. Isolated pilot groups

  3. SWOT analysis

  4. Root cause analysis

Answer: A

Question No: 36 – (Topic 1)

Which of the following is the main objective of business process outsourcing?

  1. Realigning business process with business strategy

  2. Permitting the enterprise to focus on core main competences

  3. Optimizing business processes

  4. Increasing the automation of business processes

Answer: B

Question No: 37 – (Topic 1)

Gary has identified a project risk that could injure project team members. He does not want to accept any risk where someone could become injured on this project so he hires a

professional vendor to complete this portion of the project work. This workaround to the risk event is known as what type of risk response?

  1. Avoidance

  2. Mitigation

  3. Acceptance

  4. Transference

Answer: D

Question No: 38 – (Topic 1)

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

  1. Mitigation

  2. Sharing

  3. Transference

  4. Acceptance

Answer: B

Question No: 39 – (Topic 1)

Beth is an HR Professional for her organization and she#39;s been alerted by management that the company will be outsourcing a large portion of operations. This outsourcing will likely cause several employees to lose employment with the organization. Which of the following is the best course of action that Beth can take in regard to communicating with the employees about the outsourcing change?

  1. Be honest and truthful and do not hide the facts.

  2. Refer all

  3. Document all

  4. Don#39;t share the details of the outsourcing decision.

Answer: A

Question No: 40 – (Topic 1)

Sensitivity analysis is a technique for systematically changing parameters in a model to determine the effects of such changes and is useful for computer modelers for a range of purposes. Which of the following purposes does the sensitivity analysis include? Each correct answer represents a complete solution. Choose all that apply.

  1. Decision making or the development of recommendations for decision makers

  2. Model development

  3. Estimating the average outcome

  4. Increased understanding or quantification of the system

Answer: A,B,D

100% Ensurepass Free Download!
Download Free Demo:CGEIT Demo PDF
100% Ensurepass Free Guaranteed!
CGEIT Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

This entry was posted in CGEIT Latest Exam (Jan 2018) and tagged , , , , , , , . Bookmark the permalink.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.