SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CGEIT: Certified In The Governance Of Enterprise It
Start Test
Study First
Subjects
:
certifications
,
cgeit
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Risk appetite
To take the residual risk a company is willing risk
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
Encourages the identification of a few relevant high-level financial measures. In Particular - designers were encouraged to choose measures that helped inform the answer to the question 'How do we look to shareholders?'
2. IT Steering Committee
Tests - Extensive testing
pain points - improvment opportunities
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
executive tasks: prioritization - resource alloc - project tracking
3. Hierarchy of policies
informations inherited
Controls at the corporate level - are internal controls that help Ensure that management directives pertaining to the entire entity are Carried out. They are the second level of a top-down approach to understanding the risks of an organization. Gener
policy - principles - statements
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
4. COBIT cascading goals
processes are assets that create value for the customer
Business goals with Gov. goals priorisiern - IT goals with U-prioritize targets (script 82) - prioritize process with IT goals
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
Benefits realization - risk optimization - resource optimization
5. ISO 9000
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
To take the residual risk a company is willing risk
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
6. ISO 31000
pain points - improvment opportunities
critical success factors
enterprise risk management
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
7. application vs. controls. IT general controls
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
implementation - information security - assurance - Risk
informations inherited
general: magmt change - security - operations control Application: do everything to do with app. pgm. has zb source management - authentication validation
8. benefit management (Profit organization realization)
Benefits realization management (BRM) (also benefits management or benefits realization) is the explicit planning - delivery and management of whole life benefits from an investment. An investment is only successful if Intended benefits are Realised
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
Encourages the identification of measures that answer the question 'How do customers see us?'
9. The report stage of a review
Observations / findings - risks - recommendation / report
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
quantitative risk analysis approach - damage cost per year * enter frequency
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
10. Derivation Cobit practices / control objectives
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
QA
11. Structure of the 32 COBIT processes mgmt.
operational risk (HR - Law - Nature - IT) - reputational risk
Review process for software system - The functional size is determined - where you split the functional requirements of an application into small - meaningful to the user activities that elementary processes. Same elementary processes are evaluated o
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
Signature - statement - audit trail
12. A widely used definition of operational risk is the one contained in the Basel II [1] regulations. This definition states that operational risk is the risk of loss resulting from ____________ - people and systems - or from external events.
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
inadequate or failed internal processes
Define risk owners (possibly delegate to process owners) - avoid the formation - reduction - sharing - acceptance - cost benefit measures to keep the residual risk within defined tolerance limits
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
13. To address three types of risk in the ICS
quantitative risk analysis approach - damage cost per year * enter frequency
what are the drivers - where are we now - where do we want to be - what needs to be done (project plan) - how do we get there (execute) - did we get there - how to keep the momentum going
Financial - Operational - Reputation
plan-prepare-execute-track-report
14. Control risk
risk that the controls are inadequate
COBIT provides the means of risk management - Riskit provides the ends.
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
critical success factors
15. Establishing accountability
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
quantitative risk analysis approach - damage cost per year * enter frequency
unavoidable risk
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
16. IT Governance and COBIT
processes are assets that create value for the customer
risk and risk response evaluation
5 gov processes (GL - PR) - std (users realize - risks opt opt ress) and framework - stakeholder transparency create - it gov: provide direction - evaluate performance - it Mgmnt: translate strategy into direction - and report performance mesure - 32
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
17. COBIT framework
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
Observations / findings - risks - recommendation / report
18. Balanced scorecard - Learning and Growt
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. Key principle of BPM
quantitative risk analysis approach - damage cost per year * enter frequency
processes are assets that create value for the customer
To take the residual risk a company is willing risk
Saving the cost of damage (eg ALE) minus cost of mitigation
20. Refine the innovation process management
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
unavoidable risk
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
21. Risk analysis techniques
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
processes are assets that create value for the customer
Tests - Extensive testing
critical success factors
22. Use of balanced scorecards
inherent risk - control risk: insufficient control system - detection risk: insufficient testing
performance monitoring - to demostrate the effectivness if IT and communicate about it - Performance - risk and capabilities
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
23. Procedure for Governance Compliance Review
plan-prepare-execute-track-report
A strategic performance management tool - a semi-standard structured report - supported by proven design methods and automation tools - that can be used by managers to keep track of the execution of activities by the staff within their control and .
Saving the cost of damage (eg ALE) minus cost of mitigation
operational risk (HR - Law - Nature - IT) - reputational risk
24. 3 Governance Objectives
processes are assets that create value for the customer
plan-prepare-execute-track-report
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
Benefits realization - risk optimization - resource optimization
25. Balanced scorecard - Financial
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. Comprehensive audits
risk and risk response evaluation
enterprise risk management
executive tasks: prioritization - resource alloc - project tracking
Tests - Extensive testing
27. Entity level controls
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
Encourages the identification of measures that answer the question 'How do customers see us?'
Observations / findings - risks - recommendation / report
Controls at the corporate level - are internal controls that help Ensure that management directives pertaining to the entire entity are Carried out. They are the second level of a top-down approach to understanding the risks of an organization. Gener
28. Audit risk consists of...
create an environment conductive to innovate - Maintain / understand the enterprise environment - monitor / scan the technology environment - assess the potential of emerging tech.- recommend appropriate further initiatives - monitor the implication
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
inherent risk - control risk: insufficient control system - detection risk: insufficient testing
Controls at the corporate level - are internal controls that help Ensure that management directives pertaining to the entire entity are Carried out. They are the second level of a top-down approach to understanding the risks of an organization. Gener
29. Three different control categories?
QA
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
enterprise risk management
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
30. Raci carts (RACI)
implementation - information security - assurance - Risk
a technique for analysis and presentation of responsibilities - the name is derived from the initial letters of the words Responsible - Accountable - Consulted and Informed.
A quality management standard describes the requirements that must be satisfied by the management system of a company in order to meet a certain standard in the implementation of quality management. It can serve both informative for implementation wi
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
31. COBIT enabler guides
Trust Service Contracts
only known processes enabling
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
QA
32. Balanced scorecard - Internal Business Processes
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. risk governance
critical success factors
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
Scoping - formal enactment - clear Vogaben at exceptions - verification of compliance
risk and risk response evaluation
34. ISO 27000
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
VR level - integration and business strategy it - Chaired by a business executive / board member
informations inherited
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
35. Control self assessment Self-assessment (kd) or a Control Self Assessment (CSA supervised self-assessment
QA
Observations / findings - risks - recommendation / report
policy - principles - statements
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
36. ISO 9000
Financial - Operational - Reputation
unavoidable risk
QA
VR level - integration and business strategy it - Chaired by a business executive / board member
37. Risk analysis methodology
unavoidable risk
QA
To take the residual risk a company is willing risk
Scenarios set in a risk environment
38. Risk treatment process
Define risk owners (possibly delegate to process owners) - avoid the formation - reduction - sharing - acceptance - cost benefit measures to keep the residual risk within defined tolerance limits
Business goals with Gov. goals priorisiern - IT goals with U-prioritize targets (script 82) - prioritize process with IT goals
A strategic performance management tool - a semi-standard structured report - supported by proven design methods and automation tools - that can be used by managers to keep track of the execution of activities by the staff within their control and .
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
39. Detection risk
risk that something will NOT be revealed - ill-prepared - not tested properly - misinterpreted findings weighted wrong
Encourages the identification of a few relevant high-level financial measures. In Particular - designers were encouraged to choose measures that helped inform the answer to the question 'How do we look to shareholders?'
what are the drivers - where are we now - where do we want to be - what needs to be done (project plan) - how do we get there (execute) - did we get there - how to keep the momentum going
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
40. Escrow contracts
executive tasks: prioritization - resource alloc - project tracking
policy - principles - statements
Trust Service Contracts
Define risk owners (possibly delegate to process owners) - avoid the formation - reduction - sharing - acceptance - cost benefit measures to keep the residual risk within defined tolerance limits
41. Anual loss expectancy ALE
quantitative risk analysis approach - damage cost per year * enter frequency
Benefits realization - risk optimization - resource optimization
Preventive controls - detective controls - corrective controls (troubleshooting instructions)
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
42. 5 focus area of IT Governance
who should do what? - establishing accountability - VR / goals objectives - GL translate strategy into action (automation - cost - risk mgmt)
stratecic establish alignment / framework - value delivery - risk management - resource mgmt - performance mgmt / stakeholer transparency
pain points - improvment opportunities
An internally controlled collection and analysis of values. In a control self-assessment fill out one or more units surveyed questionnaires - which can then be evaluated independently. This survey can help the units (individuals - groups - department
43. Types of assertions
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
(hierarchy) 5 domains (EDM - po ad ds me) - processes 37 - 211 practices
Controls at the corporate level - are internal controls that help Ensure that management directives pertaining to the entire entity are Carried out. They are the second level of a top-down approach to understanding the risks of an organization. Gener
Signature - statement - audit trail
44. The implementation phase of a (Gov. Compliance) Review
basic ingredients - basic principles - enterprise enablers - goals cascade - maturity model
iter (interview - test analysis - detecting / hold / summarize - Discuss with auditee
Tests - Extensive testing
Trust Service Contracts
45. CSFs
critical success factors
TQM - BPM /BPR (... reengineering) - BSC - Six Sigma - CMMI
Scenarios set in a risk environment
Value analysis - was initially applied WA - to identify and eliminate unnecessary costs. WA is equally successful in improving the performance and function of resources other than the costs. In the course of time - extended the WA applications from p
46. KPI
5 gov processes (GL - PR) - std (users realize - risks opt opt ress) and framework - stakeholder transparency create - it gov: provide direction - evaluate performance - it Mgmnt: translate strategy into direction - and report performance mesure - 32
Threat analysis - vulnerability assessment - gap analysis - (positive and negative / opportunities and threats)
implementation - information security - assurance - Risk
Used in business administration figures - references which can be the progress or the level of compliance with regard to important objectives or critical success factors measured within an organization and / or calculated - Important KPIs in the serv
47. Return on security investment ROSI
Saving the cost of damage (eg ALE) minus cost of mitigation
plan: align - plan - Organize (PO) - build: build - Aquire - Implement (AI) - run: Deliver - servie - Support (DS) - Monitor: Monitor - Evaluate - control ME
policy - principles - statements
unavoidable risk
48. Riskit vs. COBIT
Benefits realization - risk optimization - resource optimization
a risk Arising from execution of a company's business functions. It is a very broad concept Which Focuses on the risks you Arising from the people - systems and processes through Which a company operates. It therefore includes other categories examin
COBIT provides the means of risk management - Riskit provides the ends.
inadequate or failed internal processes
49. Balanced scorecard - Customer
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. Valit content framework
extract optimal value from investments it - value management: processes - monitor - portfolio management: funds - human - investment management: business case - Manging program / projects
unavoidable risk
QA
Financial - Operational - Reputation