Inspirational journeys

Follow the stories of academics and their research expeditions

CGEIT—Certified in the Governance of Enterprise IT - Part 42

Mary Smith

Fri, 17 Apr 2026

CGEIT—Certified in the Governance of Enterprise IT - Part 42

1. Which of the following techniques seeks to identify the similarities and differences between the groups of customers or users?

A) Market Segmentation
B) PEST Analysis
C) SWOT Analysis
D) Scenario Planning



2. Which of the following areas concentrates on optimizing expenses, and providing the value of IT?

A) Value delivery
B) Risk management
C) Resource management
D) Strategic alignment



3. Which of the following is used as a tool that assists in risk identification?

A) Performance report
B) Status report
C) Variance analysis
D) Issue log



4. Which of the following is the amount of risk an enterprise is willing to except in pursuit of its mission?

A) Threats
B) Vulnerability
C) Risk Appetite
D) Inherent Risk



5. Which of the following risks refers to the risk associated with an event in the absence of specific controls?

A) Financial reporting risk
B) Inherent risk
C) Operational risk
D) Compliance risk



1. Right Answer: A
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment