SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CGEIT: Certified In The Governance Of Enterprise It
Start Test
Study First
Subjects
:
certifications
,
cgeit
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Balanced scorecard (BSC)
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
Encourages the identification of a few relevant high-level financial measures. In Particular - designers were encouraged to choose measures that helped inform the answer to the question 'How do we look to shareholders?'
quantitative risk analysis approach - damage cost per year * enter frequency
A strategic performance management tool - a semi-standard structured report - supported by proven design methods and automation tools - that can be used by managers to keep track of the execution of activities by the staff within their control and .
2. Refine the innovation process management
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
Benefits realization - risk optimization - resource optimization
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
3. To address three types of risk in the ICS
Financial - Operational - Reputation
VR level - integration and business strategy it - Chaired by a business executive / board member
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
4. COBIT framework
inadequate or failed internal processes
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
Tests - Extensive testing
5. ISO 27000
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
critical success factors
informations inherited
processes are assets that create value for the customer
6. Escrow contracts
Trust Service Contracts
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
To take the residual risk a company is willing risk
Encourages the identification of a few relevant high-level financial measures. In Particular - designers were encouraged to choose measures that helped inform the answer to the question 'How do we look to shareholders?'
7. A widely used definition of operational risk is the one contained in the Basel II [1] regulations. This definition states that operational risk is the risk of loss resulting from ____________ - people and systems - or from external events.
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
plan-prepare-execute-track-report
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
inadequate or failed internal processes
8. The report stage of a review
COBIT provides the means of risk management - Riskit provides the ends.
Observations / findings - risks - recommendation / report
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
9. KPI
inadequate or failed internal processes
operational risk (HR - Law - Nature - IT) - reputational risk
Observations / findings - risks - recommendation / report
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
10. Control self assessment Self-assessment (kd) or a Control Self Assessment (CSA supervised self-assessment
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
QA
11. Three different control categories?
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
inherent risk - control risk: insufficient control system - detection risk: insufficient testing
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
12. Function point analysis
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
Encourages the identification of a few relevant high-level financial measures. In Particular - designers were encouraged to choose measures that helped inform the answer to the question 'How do we look to shareholders?'
Review process for software system - The functional size is determined - where you split the functional requirements of an application into small - meaningful to the user activities that elementary processes. Same elementary processes are evaluated o
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
13. Best practices in dealing with policies Policies (not principles)
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
To take the residual risk a company is willing risk
risk that the controls are inadequate
14. The 3 themes of the ICS economic / financial risk
operational risk (HR - Law - Nature - IT) - reputational risk
quantitative risk analysis approach - damage cost per year * enter frequency
informations inherited
pain points - improvment opportunities
15. ISO 9000
QA
Encourages the identification of measures that answer the question 'How do customers see us?'
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
16. Entity level controls
Signature - statement - audit trail
Controls at the corporate level - are internal controls that help Ensure that management directives pertaining to the entire entity are Carried out. They are the second level of a top-down approach to understanding the risks of an organization. Gener
Saving the cost of damage (eg ALE) minus cost of mitigation
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
17. The implementation phase of a (Gov. Compliance) Review
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
Encourages the identification of measures that answer the question? 'How can we continue to improve and create value. '
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
Benefits realization - risk optimization - resource optimization
18. Balanced scorecard - Learning and Growt
19. IT Steering Committee
executive tasks: prioritization - resource alloc - project tracking
Encourages the identification of measures that answer the question 'How do customers see us?'
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
plan-prepare-execute-track-report
20. Operational risk is...
21. COBIT cascading goals
operational risk (HR - Law - Nature - IT) - reputational risk
Business goals with Gov. goals priorisiern - IT goals with U-prioritize targets (script 82) - prioritize process with IT goals
what are the drivers - where are we now - where do we want to be - what needs to be done (project plan) - how do we get there (execute) - did we get there - how to keep the momentum going
pain points - improvment opportunities
22. Inherent risk
operational risk (HR - Law - Nature - IT) - reputational risk
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
unavoidable risk
Encourages the identification of measures that answer the question? 'How can we continue to improve and create value. '
23. Control risk
risk and risk response evaluation
Scenarios set in a risk environment
risk that the controls are inadequate
Encourages the identification of measures that answer the question? 'How can we continue to improve and create value. '
24. Comprehensive audits
The identification of measures that answer the question 'What must we excel at?'
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
To take the residual risk a company is willing risk
Tests - Extensive testing
25. Audit risk consists of...
To take the residual risk a company is willing risk
implementation - information security - assurance - Risk
inadequate or failed internal processes
inherent risk - control risk: insufficient control system - detection risk: insufficient testing
26. ISO 9000
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
27. ISO 31000
Observations / findings - risks - recommendation / report
enterprise risk management
Tests - Extensive testing
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
28. 3 Governance Objectives
pain points - improvment opportunities
implementation - information security - assurance - Risk
Benefits realization - risk optimization - resource optimization
Observations / findings - risks - recommendation / report
29. Risk analysis techniques
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
only known processes enabling
The identification of measures that answer the question 'What must we excel at?'
5 gov processes (GL - PR) - std (users realize - risks opt opt ress) and framework - stakeholder transparency create - it gov: provide direction - evaluate performance - it Mgmnt: translate strategy into direction - and report performance mesure - 32
30. Structure of the 32 COBIT processes mgmt.
inadequate or failed internal processes
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
executive tasks: prioritization - resource alloc - project tracking
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
31. Procedure for Governance Compliance Review
Tests - Extensive testing
Saving the cost of damage (eg ALE) minus cost of mitigation
plan-prepare-execute-track-report
critical success factors
32. Risk analysis methodology
only known processes enabling
Scenarios set in a risk environment
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
33. Balanced scorecard - Customer
34. Derivation Cobit practices / control objectives
informations inherited
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
inherent risk - control risk: insufficient control system - detection risk: insufficient testing
35. Methods for continuous process improvement
informations inherited
pain points - improvment opportunities
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
36. CSFs
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
Saving the cost of damage (eg ALE) minus cost of mitigation
critical success factors
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
37. Balanced scorecard - Financial
38. IT Strategy Committee
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
VR level - integration and business strategy it - Chaired by a business executive / board member
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
39. COBIT enabler guides
only known processes enabling
Financial - Operational - Reputation
To take the residual risk a company is willing risk
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
40. Return on security investment ROSI
Saving the cost of damage (eg ALE) minus cost of mitigation
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
Benefits realization management (BRM) (also benefits management or benefits realization) is the explicit planning - delivery and management of whole life benefits from an investment. An investment is only successful if Intended benefits are Realised
41. COBIT professional guides
operational risk (HR - Law - Nature - IT) - reputational risk
Encourages the identification of measures that answer the question? 'How can we continue to improve and create value. '
Tests - Extensive testing
implementation - information security - assurance - Risk
42. Risk appetite
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
QA
To take the residual risk a company is willing risk
43. Hierarchy of policies
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
Encourages the identification of a few relevant high-level financial measures. In Particular - designers were encouraged to choose measures that helped inform the answer to the question 'How do we look to shareholders?'
policy - principles - statements
44. Valit content framework
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
45. Detection risk
Review process for software system - The functional size is determined - where you split the functional requirements of an application into small - meaningful to the user activities that elementary processes. Same elementary processes are evaluated o
critical success factors
inherent risk - control risk: insufficient control system - detection risk: insufficient testing
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
46. Establishing accountability
Observations / findings - risks - recommendation / report
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
risk that the controls are inadequate
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
47. Anual loss expectancy ALE
quantitative risk analysis approach - damage cost per year * enter frequency
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
inadequate or failed internal processes
Trust Service Contracts
48. Types of assertions
COBIT provides the means of risk management - Riskit provides the ends.
operational risk (HR - Law - Nature - IT) - reputational risk
Signature - statement - audit trail
general: magmt change - security - operations control Application: do everything to do with app. pgm. has zb source management - authentication validation
49. Balanced scorecard - Internal Business Processes
50. application vs. controls. IT general controls
Business goals with Gov. goals priorisiern - IT goals with U-prioritize targets (script 82) - prioritize process with IT goals
pain points - improvment opportunities
only known processes enabling
general: magmt change - security - operations control Application: do everything to do with app. pgm. has zb source management - authentication validation