Inspirational journeys

Follow the stories of academics and their research expeditions

CGEIT—Certified in the Governance of Enterprise IT - Part 1

Mary Smith

Sat, 18 Apr 2026

CGEIT—Certified in the Governance of Enterprise IT - Part 1

1. You are the project manager of the NHQ project for your company. You are working with your project team to complete a risk audit. A recent issue that your project team responded to, and management approved, was to increase the project schedule because there was risk surrounding the installation time of a new material. Your logic was that with the expanded schedule there would be time to complete the installation without affecting downstream project activities. What type of risk response is being audited in this scenario?

A) Avoidance
B) Mitigation
C) Parkinson's Law
D) Lag Time



2. You are the project manager for your organization. You are preparing for the quantitative risk analysis. Mark, a project team member, wants to know why you need to do quantitative risk analysis when you just completed qualitative risk analysis. Which one of the following statements best defines what quantitative risk analysis is?

A) Quantitative risk analysis is the process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact.
B) Quantitative risk analysis is the planning and quantification of risk responses based on probability and impact of each risk event.
C) Quantitative risk analysis is the review of the risk events with the high probability and the highest impact on the project objectives.
D) Quantitative risk analysis is the process of numerically analyzing the effect of identified risks on overall project objectives.



3. Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?

A) Delphi technique
B) Isolated pilot groups
C) SWOT analysis
D) Root cause analysis



4. Which of the following is NOT a sub-process of Service Portfolio Management?

A) Service Portfolio Update
B) Business Planning Data
C) Strategic Planning
D) Strategic Service Assessment
E) Service Strategy Definition


5. Mary is the business analyst for your organization. She asks you what the purpose of the assess capability gaps task is. Which of the following is the best response to give Mary?

A) It identifies the causal factors that are contributing to an effect the solution will solve.
B) It identifies new capabilities required by the organization to meet the business need.
C) It describes the ends that the organization wants to improve.
D) It identifies the skill gaps in the existing resources.



1. Right Answer: A
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment