Inspirational journeys

Follow the stories of academics and their research expeditions

CGEIT—Certified in the Governance of Enterprise IT - Part 48

Mary Smith

Fri, 17 Apr 2026

CGEIT—Certified in the Governance of Enterprise IT - Part 48

1. The testing methods help in shaping opinion against assurance objectives by combining one or more of the test types. Which of the following are the test types used in this process? Each correct answer represents a complete solution. Choose all that apply.(Select 3answers)

A) Observe
B) Inspect
C) Plan
D) Inquire



2. Which of the following strategic issues in the IFAC report highlight the underlying success and failure of enterprises? Each correct answer represents a complete solution.Choose all that apply.(Select 3answers)

A) Ability to provide service feedback to providers
B) Strategy execution
C) Ability to undertake successful mergers and acquisitions
D) Clarity of strategy



3. Which of the following guides emphasizes on the fundamental steps for implementing information security within the enterprise, and provides easy to follow guidance for addressing security aspects of IT governance?

A) COBIT security baseline guide
B) COBIT control practices guide
C) IT assurance guide
D) IT control for Sarbanes Oxley guide



4. Which of the following quadrant analysis identifies the key issues of working well with other functions, IT value realization over time rather than-just cost, and being business process- focused but solution driven?

A) Low level role (tactical/utility) and business market leader (risk-taker/high growth)
B) High level role (strategic/transformational) and business market leader (risktaker/high growth)
C) High level role (strategic/transformational) and business market followers (riskaverse/mature)
D) Low level role (tactical/utility) and business market followers (risk-averse/mature)



5. Which of the following examples are included in the application controls embedded in business process applications? Each correct answer represents a complete solution.Choose all that apply.(Select 2answers)

A) Segregation of duties
B) Validity
C) Security
D) Computer operations



1. Right Answer: A,B,D
Explanation:

2. Right Answer: B,C,D
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: A,B
Explanation:

0 Comments

Leave a comment