SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CGEIT: Certified In The Governance Of Enterprise It
Start Test
Study First
Subjects
:
certifications
,
cgeit
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO 9000
QA
Benefits realization - risk optimization - resource optimization
Value analysis - was initially applied WA - to identify and eliminate unnecessary costs. WA is equally successful in improving the performance and function of resources other than the costs. In the course of time - extended the WA applications from p
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
2. Anual loss expectancy ALE
plan-prepare-execute-track-report
quantitative risk analysis approach - damage cost per year * enter frequency
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
3. Good starting points forIT Gov
general: magmt change - security - operations control Application: do everything to do with app. pgm. has zb source management - authentication validation
informations inherited
pain points - improvment opportunities
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
4. Audit risk consists of...
Observations / findings - risks - recommendation / report
COBIT provides the means of risk management - Riskit provides the ends.
inherent risk - control risk: insufficient control system - detection risk: insufficient testing
The identification of measures that answer the question 'What must we excel at?'
5. Balanced scorecard - Learning and Growt
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Balanced scorecard - Customer
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. 3 Governance Objectives
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
Benefits realization - risk optimization - resource optimization
Encourages the identification of measures that answer the question? 'How can we continue to improve and create value. '
8. IT governance life cycle
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
VR level - integration and business strategy it - Chaired by a business executive / board member
enterprise risk management
what are the drivers - where are we now - where do we want to be - what needs to be done (project plan) - how do we get there (execute) - did we get there - how to keep the momentum going
9. Hierarchy of policies
Observations / findings - risks - recommendation / report
enterprise risk management
Saving the cost of damage (eg ALE) minus cost of mitigation
policy - principles - statements
10. A widely used definition of operational risk is the one contained in the Basel II [1] regulations. This definition states that operational risk is the risk of loss resulting from ____________ - people and systems - or from external events.
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
inadequate or failed internal processes
11. COBIT cascading goals
general: magmt change - security - operations control Application: do everything to do with app. pgm. has zb source management - authentication validation
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
Business goals with Gov. goals priorisiern - IT goals with U-prioritize targets (script 82) - prioritize process with IT goals
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
12. COBIT professional guides
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
implementation - information security - assurance - Risk
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
13. IT Strategy Committee
QA
quantitative risk analysis approach - damage cost per year * enter frequency
VR level - integration and business strategy it - Chaired by a business executive / board member
Controls at the corporate level - are internal controls that help Ensure that management directives pertaining to the entire entity are Carried out. They are the second level of a top-down approach to understanding the risks of an organization. Gener
14. The 3 themes of the ICS economic / financial risk
operational risk (HR - Law - Nature - IT) - reputational risk
executive tasks: prioritization - resource alloc - project tracking
Observations / findings - risks - recommendation / report
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
15. ISO 27000
informations inherited
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
risk and risk response evaluation
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
16. Risk treatment process
implementation - information security - assurance - Risk
Define risk owners (possibly delegate to process owners) - avoid the formation - reduction - sharing - acceptance - cost benefit measures to keep the residual risk within defined tolerance limits
Value analysis - was initially applied WA - to identify and eliminate unnecessary costs. WA is equally successful in improving the performance and function of resources other than the costs. In the course of time - extended the WA applications from p
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
17. IT Steering Committee
executive tasks: prioritization - resource alloc - project tracking
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
Tests - Extensive testing
Business goals with Gov. goals priorisiern - IT goals with U-prioritize targets (script 82) - prioritize process with IT goals
18. Key principle of BPM
Saving the cost of damage (eg ALE) minus cost of mitigation
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
policy - principles - statements
processes are assets that create value for the customer
19. The report stage of a review
processes are assets that create value for the customer
Trust Service Contracts
Observations / findings - risks - recommendation / report
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
20. 5 focus area of IT Governance
VR level - integration and business strategy it - Chaired by a business executive / board member
Business goals with Gov. goals priorisiern - IT goals with U-prioritize targets (script 82) - prioritize process with IT goals
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
Trust Service Contracts
21. Refine the innovation process management
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
quantitative risk analysis approach - damage cost per year * enter frequency
22. Control self assessment Self-assessment (kd) or a Control Self Assessment (CSA supervised self-assessment
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
risk and risk response evaluation
Trust Service Contracts
implementation - information security - assurance - Risk
23. ISO 9000
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
Observations / findings - risks - recommendation / report
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
24. Risk analysis methodology
The identification of measures that answer the question 'What must we excel at?'
Scenarios set in a risk environment
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
only known processes enabling
25. Three different control categories?
A strategic performance management tool - a semi-standard structured report - supported by proven design methods and automation tools - that can be used by managers to keep track of the execution of activities by the staff within their control and .
VR level - integration and business strategy it - Chaired by a business executive / board member
Define risk owners (possibly delegate to process owners) - avoid the formation - reduction - sharing - acceptance - cost benefit measures to keep the residual risk within defined tolerance limits
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
26. IT Governance and COBIT
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
5 gov processes (GL - PR) - std (users realize - risks opt opt ress) and framework - stakeholder transparency create - it gov: provide direction - evaluate performance - it Mgmnt: translate strategy into direction - and report performance mesure - 32
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
27. To address three types of risk in the ICS
To take the residual risk a company is willing risk
Financial - Operational - Reputation
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
Signature - statement - audit trail
28. Comprehensive audits
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
quantitative risk analysis approach - damage cost per year * enter frequency
Tests - Extensive testing
Encourages the identification of measures that answer the question? 'How can we continue to improve and create value. '
29. Balanced scorecard - Internal Business Processes
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. benefit management (Profit organization realization)
COBIT provides the means of risk management - Riskit provides the ends.
Benefits realization management (BRM) (also benefits management or benefits realization) is the explicit planning - delivery and management of whole life benefits from an investment. An investment is only successful if Intended benefits are Realised
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
plan-prepare-execute-track-report
31. Riskit vs. COBIT
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
COBIT provides the means of risk management - Riskit provides the ends.
5 gov processes (GL - PR) - std (users realize - risks opt opt ress) and framework - stakeholder transparency create - it gov: provide direction - evaluate performance - it Mgmnt: translate strategy into direction - and report performance mesure - 32
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
32. The implementation phase of a (Gov. Compliance) Review
A strategic performance management tool - a semi-standard structured report - supported by proven design methods and automation tools - that can be used by managers to keep track of the execution of activities by the staff within their control and .
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
Benefits realization - risk optimization - resource optimization
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
33. KPI
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
Financial - Operational - Reputation
Tests - Extensive testing
34. risk governance
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
risk and risk response evaluation
operational risk (HR - Law - Nature - IT) - reputational risk
35. Inherent risk
unavoidable risk
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
Define risk owners (possibly delegate to process owners) - avoid the formation - reduction - sharing - acceptance - cost benefit measures to keep the residual risk within defined tolerance limits
36. Methods for continuous process improvement
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
A strategic performance management tool - a semi-standard structured report - supported by proven design methods and automation tools - that can be used by managers to keep track of the execution of activities by the staff within their control and .
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
37. Operational risk is...
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. COBIT framework
Trust Service Contracts
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
Scenarios set in a risk environment
39. Establishing accountability
Scenarios set in a risk environment
COBIT provides the means of risk management - Riskit provides the ends.
implementation - information security - assurance - Risk
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
40. Valit content framework
risk that the controls are inadequate
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
41. Balanced scorecard - Financial
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Risk analysis techniques
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
operational risk (HR - Law - Nature - IT) - reputational risk
43. Best practices in dealing with policies Policies (not principles)
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
risk and risk response evaluation
policy - principles - statements
44. Balanced scorecard (BSC)
Value analysis - was initially applied WA - to identify and eliminate unnecessary costs. WA is equally successful in improving the performance and function of resources other than the costs. In the course of time - extended the WA applications from p
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
A strategic performance management tool - a semi-standard structured report - supported by proven design methods and automation tools - that can be used by managers to keep track of the execution of activities by the staff within their control and .
Benefits realization - risk optimization - resource optimization
45. Detection risk
general: magmt change - security - operations control Application: do everything to do with app. pgm. has zb source management - authentication validation
Financial - Operational - Reputation
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
5 gov processes (GL - PR) - std (users realize - risks opt opt ress) and framework - stakeholder transparency create - it gov: provide direction - evaluate performance - it Mgmnt: translate strategy into direction - and report performance mesure - 32
46. Use of balanced scorecards
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
policy - principles - statements
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
executive tasks: prioritization - resource alloc - project tracking
47. Derivation Cobit practices / control objectives
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
implementation - information security - assurance - Risk
Encourages the identification of a few relevant high-level financial measures. In Particular - designers were encouraged to choose measures that helped inform the answer to the question 'How do we look to shareholders?'
Controls at the corporate level - are internal controls that help Ensure that management directives pertaining to the entire entity are Carried out. They are the second level of a top-down approach to understanding the risks of an organization. Gener
48. CSFs
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
critical success factors
COBIT provides the means of risk management - Riskit provides the ends.
executive tasks: prioritization - resource alloc - project tracking
49. Procedure for Governance Compliance Review
Scenarios set in a risk environment
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
plan-prepare-execute-track-report
Value analysis - was initially applied WA - to identify and eliminate unnecessary costs. WA is equally successful in improving the performance and function of resources other than the costs. In the course of time - extended the WA applications from p
50. Structure of the 32 COBIT processes mgmt.
Tests - Extensive testing
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME