Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Isaca CGEIT Dumps Questions Answers

Page: 1 / 51
Total 682 questions

Certified in the Governance of Enterprise IT Exam Questions and Answers

Question 1

An enterprise is planning to upgrade its current enterprise resource planning (ERP) system to remain competitive within the industry. Which of the following would be MOST helpful to facilitate a successful implementation?

Options:

A.

Documenting the current ERP processes and procedures

B.

Reviewing the ERP post-implementation report

C.

Establishing a change and transition planning process

D.

Conducting a comprehensive requirements review

Buy Now
Question 2

From a governance perspective, which of the following functions MUST approve the agreed-upon criteria for a new technology-enabled service before submitting the final high-level design to project stakeholders?

Options:

A.

Information security

B.

Project management office (PMO)

C.

Quality assurance (QA)

D.

Internal audit

Question 3

Which of the following BEST enables effective enterprise risk management (ERM)?

Options:

A.

Risk register

B.

Risk ownership

C.

Risk tolerance

D.

Risk training

Question 4

Which of the following would BEST enable an enterprise to ensure selected cloud vendors meet stringent regulatory requirements?

Options:

A.

Stage gate reviews

B.

Risk assessment

C.

Internal audit report

D.

Third-party audit reports

Question 5

Which of the following is the BEST way for a CIO to assess the consistency of IT processes against industry benchmarks to determine where to focus improvement initiatives?

Options:

A.

Utilizing a capability maturity model

B.

Evaluating the current balanced scorecard

C.

Reviewing key performance measures

D.

Reviewing IT process audit results

Question 6

An enterprise wants to reduce the complexity of its data assets while ensuring impact to the business is minimized during the transition.

Which of the following should be done FIRST?

Options:

A.

Remove applications that are not aligned with the information architecture.

B.

Review the information classification and retention policies.

C.

Review the information architecture.

D.

Assess current information ownership.

Question 7

Which of the following is the PRIMARY role of the governance function in enabling an enterprise to achieve its business objectives?

Options:

A.

Determining risk thresholds that the enterprise can sustain

B.

Preparing business continuity and resiliency plans

C.

Providing a means to effectively manage stakeholders

D.

Monitoring strategic plans to reach the desired target state

Question 8

Which of the following is the GREATEST driver of ethical decision making in an IT enterprise?

Options:

A.

Corporate culture

B.

Process and control environment

C.

Code of conduct

D.

Training and awareness programs

Question 9

Of the following, who is responsible for the achievement of IT strategic objectives?

Options:

A.

IT steering committee

B.

Business process owners

C.

Chief information officer (CIO)

D.

Board of directors

Question 10

A small enterprise has just hired its first CIO, who has been tasked with making the IT department more efficient. What should be the CIO's NEXT step after identifying several new improvement initiatives?

Options:

A.

Mandate IT staff training.

B.

Request an IT balanced scorecard.

C.

Require a cost-benefit analysis.

D.

Allocate funding for the initiatives.

Question 11

An enterprise will be adopting wearable technology to improve business performance. Which of the following is the BEST way for the CIO to validate IT’s preparedness for this initiative?

Options:

A.

Request an enterprise architecture (EA) review.

B.

Perform a baseline business value assessment.

C.

Request reprioritization of the IT portfolio.

D.

Identify the penalties for noncompliance.

Question 12

A CIO realizes a significant change is required in the way IT responds to key external customers and needs to gain support from the enterprise to address this situation. What should be done FIRST?

Options:

A.

Empower key IT staff to implement a solution.

B.

Establish new customer service policies.

C.

Engage customer service training providers.

D.

Engage the IT steering committee.

Question 13

An enterprise has established a goal of leveraging AI as a source of strategic advantage. Which of the following should be done FIRST when developing the related IT strategy?

Options:

A.

Document requirements mapped to each business function.

B.

Benchmark how other IT organizations are leveraging AI.

C.

Define the IT infrastructure requirements for AI implementation.

D.

Define an operational level agreement (OLA) between IT and business functions.

Question 14

An enterprise is implementing its first mobile sales channel. Final approval for accepting the associated IT risk should be obtained from which of the following?

Risk manager

Business sponsor

Options:

A.

Chief information officer (CIO)

B.

IT steering committee

Question 15

Which of the following is MOST important for the successful establishment of an ethics program?

Options:

A.

Defined whistleblower processes

B.

Culture of accountability and responsibility

C.

Defined roles and responsibilities

D.

Clear mission and vision statements

Question 16

When developing IT risk management policies and standards, it is MOST important to align them with:

Options:

A.

Best practices for IT risk management.

B.

The corporate risk culture.

C.

Enterprise goals and objectives.

D.

The enterprise risk management (ERM) framework.

Question 17

An executive management team has determined the need to implement an IT governance framework, beginning with the maturity assessment process. The PRIMARY purpose for maturity assessment is to:

Options:

A.

Benchmark IT performance.

B.

Identify gaps in performance.

C.

Support impact analysis.

D.

Identify gaps in capability.

Question 18

Which of the following BEST provides an enterprise with greater insight into its environmental, social, and governance (ESG) metrics?

Options:

A.

Audit committee oversight

B.

Benchmarking against similar industries

C.

Collaborative tools and approaches

D.

Customer satisfaction surveys

Question 19

An enterprise wants to implement metrics to monitor the performance of its IT portfolio. Whose input is MOST important to consider when establishing these metrics?

Options:

A.

Project management office (PMO).

B.

IT executives.

C.

The chief executive officer (CEO).

D.

Business unit stakeholders.

Question 20

Which of the following is the BEST way for a CIO to ensure that IT-related training is taken seriously by the IT management team and direct employees?

Options:

A.

Develop training programs based on results of an IT staff survey of preferences.

B.

Embed training metrics into the annual performance appraisal process.

C.

Promote IT-specific training awareness program.

D.

Research and identify training needs based on industry trends.

Question 21

Which of the following should be the PRIMARY consideration when developing an IT strategy for the global implementation of Internet of Things (IoT) solutions?

Options:

A.

Hiring additional IT staff with IoT expertise

B.

Addressing security and privacy

C.

Identifying cost-effective IoT devices

D.

Maintaining compatibility with legacy systems

Question 22

An organization requires updates to their IT infrastructure to meet business needs. Which of the following will provide the MOST useful information when planning for the necessary IT investments?

Options:

A.

Enterprise architecture (EA)

B.

Risk assessment report

C.

Business user satisfaction metrics

D.

Audit findings

Question 23

An enterprise's current business continuity plan (BCP) fails to consider many common crisis events. What would be MOST helpful to address this situation?

Options:

A.

Engage stakeholders in scenario development

B.

Review the root cause analysis

C.

Require further walk-through tests

D.

Review and update the crisis communication plan

Question 24

Which of the following roles is accountable for the confidentiality, integrity, and availability of information within an enterprise?

Options:

A.

Data owner

B.

Lead legal counsel

C.

Risk manager

D.

Data custodian

Question 25

A board of directors has mandated that key performance indicators (KPIs) be developed for all IT projects that are created in support of a business objective. Which of the following MUST be reflected in the KPIs to be effective?

Options:

A.

Future-state architecture

B.

Critical success factors (CSFs)

C.

Portfolio management principles

D.

Key risk indicators (KRIs)

Question 26

ACIO determines IT investment management processes are not fully realizing the benefits identified in business cases. Which of the following would be the BEST way to prevent this issue?

Options:

A.

Establish a requirement for ClO review and approval of each business case.

B.

Evaluate the delegation of investment approval authorities.

C.

Perform stage-gate reviews throughout the life cycle of each project.

D.

Document lessons learned throughout the investment life cycle.

Question 27

An enterprise has a centralized IT function but also allows business units to have their own technology operations, resulting in duplicate technologies and conflicting priorities. Which of the following should be done FIRST to reduce the complexity of the IT landscape?

Promote automation tools used by the business units.

Options:

A.

Conduct strategic planning with business units.

B.

Migrate all in-house systems to an external cloud environment.

C.

Standardize technology architecture on common products.

Question 28

When an enterprise is evaluating potential IT service vendors, which of the following BEST enables a clear understanding of the vendor's capabilities that will be critical to the enterprise's strategy?

Due diligence process

Options:

A.

Independent audit results

B.

Historical service level agreements (SLAs)

C.

Benchmarking analysis results

Question 29

Which of the following is the PRIMARY outcome of using a comprehensive architecture framework?

Options:

A.

Key third-party relationships are supported.

B.

Business goal conflicts are identified.

C.

Relevant controls are identified.

D.

Organizational management policies are developed.

Question 30

An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?

Options:

A.

Ensure IT has knowledgeable representation and is included in the strategic planning process.

B.

Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.

C.

Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).

D.

Outsource both IT operations and IT development and implement controls based on a standardized framework.

Question 31

Which of the following would be MOST helpful to review when determining how to allocate IT resources during a resource shortage?

Options:

A.

IT strategic plan

B.

IT skills inventory

C.

IT organizational structure

D.

IT skill development plan

Question 32

Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?

Options:

A.

Defined roles.

B.

Replicated systems.

C.

A risk register.

D.

Budget allocation.

Question 33

Which of the following is the GREATEST expected strategic organizational benefit from the standardization of technical platforms?

Options:

A.

Reduces IT operational training costs

B.

Reduces response time

C.

Optimizes infrastructure investments

D.

Meets regulatory compliance requirements

Question 34

An enterprise recently approved a bring your own device (BYOD) policy. The IT steering committee has directed IT management to develop a communication plan to disseminate information regarding the associated technical risks. Which of the following is MOST important to include in this communication plan?

Options:

A.

A link on the corporate intranet to the BYOD policy

B.

Potential exposures and impacts using common terms

C.

Schedule and content for mandatory training

D.

Disciplinary actions for violation of the BYOD policy

Question 35

IT governance within an enterprise is attempting to drive a cultural shift to enhance compliance with IT security policies. The BEST way to support this objective is to ensure that enterprise IT policies are:

Options:

A.

communicated on a regular basis.

B.

acknowledged and signed by each employee.

C.

centrally posted and contain detailed instructions.

D.

integrated into individual performance objectives.

Question 36

Which of the following should be considered FIRST when migrating data to a cloud environment?

Options:

A.

Disaster recovery plan (DRP).

B.

Skills matrix.

C.

Information architecture.

D.

Data structure.

Question 37

Which of the following should be the MOST essential consideration when outsourcing IT services?

Options:

A.

Identification of core and non-core business processes.

B.

Compliance with enterprise architecture (EA).

C.

Alignment with existing human resources (HR) policies and practices.

D.

Adoption of a diverse vendor selection process.

Question 38

Which of the following BEST enables informed IT investment decisions?

Options:

A.

Business case

B.

Technology roadmap

C.

Program plan

D.

Risk classification

Question 39

Which of the following is MOST important for a data steward to verify when a system's data is edited by an automated tool to fix an incident?

Options:

A.

The change has been requested by the business department and approved by the data owner.

B.

The change is documented in preparation for future audits.

C.

The change maintains consistency among databases and has no other impacts.

D.

The change is a temporary fix for the incident, and the permanent solution is addressed by problem management.

Question 40

The board directed the CIO to ensure that required IT resources are available to execute a new enterprise strategy. Which of the following should be done FIRST to support this initiative?

Options:

A.

Implement an IT capability strategy

B.

Perform a gap analysis

C.

Develop a capacity management plan

D.

Develop a resource management plan

Question 41

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

Options:

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Question 42

When determining the desired maturity levels for IT governance processes, it is MOST important to:

Options:

A.

Focus on existing strengths as key drivers for the target levels

B.

Ensure target levels are in line with external competitor benchmarks

C.

Agree on target levels in response to need

D.

Ensure that maturity can be achieved at the lowest cost

Question 43

An enterprise is exploring a new business opportunity. Which of the following is the BEST way to help ensure related IT projects deliver the business requirements?

Options:

A.

Hire a business consultant to manage the projects.

B.

Develop a policy to enforce the processes and procedures.

C.

Implement stage-gate reviews that require business sign-off.

D.

Focus on maturing processes and developing procedures.

Question 44

An enterprise has launched a critical new IT initiative that is expected to produce substantial value. Which of the following would BEST facilitate the reporting of benefits realized by the IT investment to the board?

Options:

A.

Balanced scorecard

B.

Milestone chart

C.

Performance management

D.

Critical risk and issue walk through

Question 45

Which of the following is the BEST indication that an implementation plan for a new governance initiative will be successful?

Options:

A.

Staff have been trained on the new initiative.

B.

External consultants created the plan.

C.

The plan assigns responsibility for completing milestones.

D.

The plan is designed to engage employees across the enterprise.

Question 46

The BEST way for a CIO to manage the organizational impact of deploying a new enterprise-wide tool is to implement:

Options:

A.

change management.

B.

project management.

C.

risk management.

D.

resource management.

Question 47

Which of the following is the BEST way for a CIO to provide progress updates on a newly implemented IT strategic plan to the board of directors?

Present an IT summary dashboard.

Present IT critical success factors (CSFs).

Report results Of key risk indicators (KRIs).

Options:

A.

Report results of stage-gate reviews.

Question 48

What is the BEST way for IT to achieve compliance with regulatory requirements?

Options:

A.

Enforce IT policies and procedures.

B.

Create an IT project portfolio.

C.

Review an IT performance dashboard.

D.

Report on IT audit findings and action plans.

Question 49

A newly appointed CIO is concerned that IT is too reactive and wants to ensure IT adds value to the enterprise by proactively anticipating business needs. Which of the following will BEST contribute to meeting this objective?

Options:

A.

Incorporating IT planning into the enterprise strategic planning process

B.

Implementing an IT portfolio management framework

C.

Involving more IT representation in strategic business case reviews

D.

Including IT management within the program management office

Question 50

A global organization has noticed a significant decrease in the return on IT investments in a particular region. To enhance project governance in this region, the CEO should FIRST

Options:

A.

Perform a program benefit calculation and review the project selection methodology

B.

Suspend funding until project managers from better-performing regions can be assigned

C.

Perform an independent review of business cases for each current and proposed project in the region

D.

Work with the region's leadership to better understand why the situation has occurred

Question 51

Which of the following is the MOST important consideration regarding IT measures as part of an IT strategic plan?

Options:

A.

Data collection for the metrics is automated.

B.

The metrics can be traced to enterprise goals.

C.

Minimum target levels are realistic.

D.

Thresholds align to key risk indicators (KRIs).

Question 52

Which of the following is the MOST important consideration when integrating a new vendor with an enterprise resource planning (ERP) system?

Options:

A.

IT senior management selects the vendor.

B.

A vendor risk assessment is conducted

C.

ERP data mapping is approved by the enterprise architect.

D.

Procurement provides the terms of the contract.

Question 53

A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:

confirm process owners' acceptance of residual risk.

perform an internal and external network penetration test.

obtain IT security approval on security policy exceptions.

Options:

A.

benchmark policy against industry best practice.

Question 54

When establishing a methodology for business cases, it would be MOST beneficial for an enterprise to include procedures for:

Options:

A.

updating the business case throughout its life cycle.

B.

addressing required changes outside the business case.

C.

identifying metrics post-implementation to measure project success.

D.

entering the business case into the enterprise architecture (EA).

Question 55

A CIO has recently been made aware of a new regulatory requirement that may affect IT-enabled business activities. Which of the following should be the CIO s FIRST step in deciding the appropriate response to the new requirement?

Options:

A.

Revise initiatives that are active to reflect the new requirements.

B.

Confirm there are adequate resources to mitigate compliance requirements.

C.

Consult with legal and risk experts to understand the requirements.

D.

Consult with the board for guidance on the new requirements

Question 56

The GREATEST benefit associated with a decision to implement performance metrics for key IT assets is the ability to:

Options:

A.

establish the span of control during the life cycle of IT assets.

B.

determine the average cost of controls for protection of IT assets.

C.

compare the performance Of IT assets against industry best practices.

D.

determine the contribution of IT assets in achievement of IT goals.

Question 57

An enterprise has learned of a new regulation that may impact delivery of one of its core technology services. Which of the following should be done FIRST?

Options:

A.

Request an action plan from the risk team.

B.

Determine whether the board wants to comply with the regulation.

C.

Update the risk management framework.

D.

Assess the risk associated with the new regulation.

Question 58

Executive management is concerned that IT has not achieved its performance targets. At the end of the fiscal year, it was noted the reason was largely due to insufficient spending on key IT initiatives. Which of the following would help to alleviate the issue for the coming year?

Options:

A.

Key risk indicators (KRIs)

B.

Stage gate reviews

C.

Lag indicators

D.

Lead indicators

Question 59

Which of the following would be the BEST way for an enterprise to address new legal and regulatory requirements applicable to IT?

Options:

A.

Treat as a risk to be assessed before developing a response.

B.

Benchmark how other IT organizations are treating the new requirements.

C.

Adopt a zero-tolerance approach for noncompliance with regulatory matters.

D.

Use a cost-benefit analysis to determine if compliance is warranted.

Question 60

Which of the following BEST enables an enterprise to determine whether a current program for IT infrastructure migration to the cloud is continuing to provide benefits?

Options:

A.

Key performance indicators (KPls)

B.

Total cost of ownership (TCO)

C.

Key risk indicators (KRIS)

D.

Net present value (NPV)

Question 61

An enterprise plans to implement a business intelligence tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

Options:

A.

Interface issues between enterprise and business intelligence applications.

B.

The need for staff to be trained on the new business intelligence tool.

C.

Large volumes of data fed from enterprise applications.

D.

Data definition and mapping sources from applications.

Question 62

Which of the following will BEST enable an enterprise to convey IT governance direction and objectives?

Options:

A.

Skills and competencies

B.

Principles and policies

C.

Corporate culture

D.

Business processes

Question 63

An IT value delivery framework PRIMARILY helps an enterprise:

Options:

A.

Improve value of successful IT projects.

B.

Increase transparency of value to the enterprise.

C.

Assist top management in approving IT projects.

D.

Optimize value to the enterprise.

Question 64

Which of the following is the BEST way to address the risk associated with new IT investments?

Options:

A.

Develop security best practices to protect applications.

B.

Integrate security requirements at the beginning of projects

C.

Establish an enterprise-wide incident response process.

D.

Implement an enterprise-wide security awareness program.

Question 65

When a shortfall of IT resources is identified, the FIRST course of action is to;

Options:

A.

perform a business impact analysis (BIA).

B.

reallocate the budget to close the gap in resources.

C.

reduce business requirements.

D.

negotiate best pricing for contracted resources.

Question 66

An enterprise plans to migrate its applications and data to an external cloud environment. Which of the following should be the ClO's PRIMARY focus before the migration?

Options:

A.

Reviewing the information governance framework

B.

Selecting best-of-breed cloud offerings

C.

Updates the enterprise architecture (EA) repository

D.

Conducting IT staff training to manage cloud workloads

Question 67

An enterprise wants to establish key risk indicators (KRIs) in an effort to better manage IT risk. Which of the following should be identified FIRST?

Options:

A.

The enterprise risk appetite

B.

Key performance metrics

C.

Risk mitigation strategies

D.

Enterprise architecture (EA) components

Question 68

An IT governance committee is reviewing its current risk management policy in light of increased usage of social media within an enterprise. The FIRST task for the governance committee is to:

Options:

A.

recommend blocking access to social media.

B.

review current level of social media usage.

C.

initiate an assessment of the impact on the business.

D.

reassess the enterprise's bring your own device (BYOD) policy.

Question 69

The CIO of a large enterprise has taken the necessary steps to align IT objectives with business objectives. What is the BEST way for the CIO to ensure these objectives are delivered effectively by IT staff?

Options:

A.

Map the IT objectives to an industry-accepted framework.

B.

Enhance the budget for training based on the IT objectives.

C.

Include the IT objectives in staff performance plans.

D.

Include CIO sign-off of the objectives as part of the IT strategic plan.

Question 70

Which of the following is the BEST way to maximize the value of an enterprise’s information asset base?

Options:

A.

Seek additional opportunities to leverage existing information assets.

B.

Facilitate widespread user access to all information assets

C.

Regularly purge information assets to minimize maintenance costs

D.

Implement an automated information management platform

Question 71

When establishing a risk management process which of the following should be the FIRST step?

Options:

A.

Determine the probability of occurrence

B.

Identify threats

C.

Identify assets

D.

Assess risk exposures

Question 72

In a successful enterprise that is profitable in its marketplace and consistently growing in size, the non-IT workforce has grown by 50% in the last two years. The demand for IT staff in the marketplace is more than the supply, and the enterprise is losing staff to rival organizations. Due to the rapid growth. IT has struggled to keep up with the enterprise, and IT procedures and associated job roles are not well-defined. The MOST critical activity for reducing the impact caused by IT staff turnover is to:

Options:

A.

document processes and procedures.

B.

outsource the IT operation.

C.

increase compensation for IT staff

D.

hire temporary staff.

Question 73

Which of the following would be MOST helpful to an enterprise that wants to standardize how sensitive corporate data is handled?

Options:

A.

Information classification framework

B.

Enterprise risk policy

C.

Enterprise risk management (ERM) framework

D.

Information security policy

Question 74

An enterprise has entered into a new market which brings additional regulatory compliance requirements. What should be done FIRST to address these requirements?

Options:

A.

Outsource the compliance process.

B.

Appoint a compliance officer.

C.

Update the organization's risk profile.

D.

Have executive management monitor compliance.

Question 75

Due to the recent introduction of personal data protection regulations, an enterprise is required to maintain its employee data in production systems only for a limited time. Which of the following is MOST important to review?

Options:

A.

Asset retention policies

B.

Information retention policies

C.

Data archival policies

D.

Data backup and restoration policies

Question 76

The BEST time to identity metrics to measure the performance of an IT-enabled investment is during:

Options:

A.

system implementation

B.

project initiation

C.

investment feasibility analysis

D.

business case development.

Question 77

An IT risk committee is trying to mitigate the risk associated with a newly implemented bring your own device (BYOD) policy and supporting mobile device management (MDM) tools. Which of the following would be the BEST way to ensure employees understand how to protect sensitive corporate data on their mobile devices?

Options:

A.

Require staff to complete security awareness training

B.

Develop security procedures for mobile devices.

C.

Distribute the BYOD policy on the company Intranet.

D.

Require staff to review and sign nondisclosure agreements (NDAs)

Question 78

When updating an IT governance framework to support an outsourcing strategy, which of the following is MOST important?

Options:

A.

Evaluating the choice of underlying technology platforms used by the service provider

B.

Ensuring the outsource provider's IT function is aligned with its business function

C.

Verifying the vendor has developed standard operation procedures for outsourced functions

D.

Ensuring the effective management of contracts with third-party providers

Question 79

An enterprise will be adopting wearable technology to improve business performance Whtch of the following would be the BEST way for the CIO to validate IPs preparedness for this initiative?

Options:

A.

Request an enterprise architecture (EA) review.

B.

Request reprioritization of the IT portfolio.

C.

Perform a baseline business value assessment

D.

Identify the penalties for noncompliance.

Question 80

The PRIMARY reason a CIO and IT senior management should stay aware of the business environment is to:

Options:

A.

revisit prioritization of IT projects.

B.

adjust IT strategy as needed.

C.

measure efficiency of IT resources.

D.

re-assess the IT investment portfolio.

Question 81

Which of the following is the MOST important aspect of business ethics?

Options:

A.

Ensuring fair and consistent vendor management practices

B.

Providing equal opportunities to employees

C.

Protecting stakeholders' interests

D.

Complying with legal and regulatory requirements

Question 82

An enterprise's decision to move to a virtualized architecture will have the GREATEST impact on:

Options:

A.

system life cycle management.

B.

asset classification.

C.

vendor management

D.

vulnerability management.

Question 83

An enterprise's executive team has recently released a new IT strategy and related objectives. Which of the following would be the MOST effective way for the CIO to ensure IT personnel are supporting the new strategy's objectives?

Options:

A.

Measure progress towards IT objectives and communicate the results to IT staff.

B.

Incorporate IT objectives into individual performance evaluations.

C.

Develop communication materials to promote the new IT strategy and objectives.

D.

Require IT managers to assign activities aligned to the IT objectives.

Question 84

A multinational enterprise is planning to migrate to cloud-based systems. Which of the following should be of MOST concern to the risk management committee?

Options:

A.

Cost considerations

B.

Regulatory compliance

C.

Resource alignment

D.

Security breaches

Question 85

Which of the following is MOST important to the successful implementation of enterprise architecture (EA)?

Options:

A.

Developing data modeling tools

B.

Managing the challenge of change

C.

Reducing the cost of IT investments

D.

Establishing key performance indicators (KPIs)

Question 86

The FIRST step in aligning resource management to the enterprise's IT strategic plan would be to

Options:

A.

develop a responsible, accountable, consulted and informed (RACI) chart

B.

assign appropriate roles and responsibilities

C.

perform a gap analysis

D.

identify outsourcing opportunities

Question 87

Which of the following provides the BEST information to assess the effective alignment of IT investments?

Options:

A.

IT balanced scorecard

B.

Net present value (NPV).

C.

IT delivery time metrics

D.

Total cost of ownership (TCO)

Question 88

Which of the following should be the MOST important consideration when designing an implementation plan for IT governance?

Options:

A.

Principles and policies

B.

Roles and responsibilities

C.

Risk tolerance levels

D.

Organizational culture

Question 89

An IT department has forwarded a request to the IT strategy committee for funding of a discretionary Investment. The committee's MOST important consideration should be to evaluate:

Options:

A.

the technical feasibility of the investment.

B.

the business and technical scope of the investment •

C.

whether the investment supports corporate goals

D.

whether the investment aligns with the enterprise architecture (EA).

Question 90

Which of the following should be the FIRST consideration for an enterprise faced with a pandemic situation resulting in a mandatory remote work environment?

Options:

A.

Reviewing and testing disaster recovery plans (DRPs)

B.

Ensuring staff has the necessary technology to be productive

C.

Ensuring remote work policies are updated and communicated

D.

Revising IT performance monitoring metrics

Question 91

A large enterprise has decided to use an emerging technology that needs to be integrated with the current IT infrastructure. Which of the following is the BEST way to prevent adverse effects to the enterprise resulting from the new technology?

Options:

A.

Develop key performance indicators (KPIs).

B.

Update the risk appetite statement

C.

Develop key risk indicators (KRIs).

D.

Implement service level agreements (SLAs)

Question 92

Communicating which of the following to staff BEST demonstrates senior management's commitment to IT governance?

Options:

A.

Legal and regulatory requirements

B.

Approved IT investment opportunities

C.

Objectives and responsibilities

D.

Need for enterprise architecture (EA)

Question 93

Business management is seeking assurance from the CIO that controls are in place to help minimize the risk of critical IT systems being unavailable during month-end financial processing. What is the BEST way to address this concern?

Options:

A.

Create a communication plan with risk owners.

B.

Outsource infrastructure hosting.

C.

Restrict and monitor user access.

D.

Develop key risk indicators (KRIs) and action plans.

Question 94

To ensure that information can be traced to the originating event and accountable parties, an enterprise should FIRST:

Options:

A.

capture source information and supporting evidence.

B.

improve business process controls.

C.

review information event logs tor potential incidents.

D.

review retention requirements for source information.

Question 95

Which of the following BEST indicates that a change management process has been implemented successfully?

Options:

A.

Maturity levels

B.

Degree of control

C.

Process performance

D.

Outcome measures

Question 96

An airline wants to launch a new program involving the use of artificial intelligence (Al) and machine learning the mam objective of the program is to use customer behavior to determine new routes and markets Which of the following should be done NEXT?

Options:

A.

Consult with the enterprise privacy function

B.

Define the critical success factors (CSFs)

C.

Present the proposal to the IT strategy committee

D.

Perform a business impact analysis (BIA)

Question 97

Which of the following decisions would be made by the IT strategy committee?

Options:

A.

Communication plan for a major IT initiative

B.

Cloud implementation and support plan

C.

Enterprise risk management (ERM) framework

D.

Composition of the investment portfolio

Question 98

Which of the following activities MUST be completed before developing an IT strategic plan?

Options:

A.

Review the enterprise business plan

B.

Align the enterprise vision statement with business processes

C.

Develop an enterprise architecture (EA) framework

D.

Review the enterprise risk tolerance level

Question 99

Which of the following has the GREATEST influence on data quality assurance?

Options:

A.

Data stewardship

B.

Data encryption

C.

Data classification

D.

Data modeling

Question 100

Which of the following is the MOST important consideration when developing a new IT service'?

Options:

A.

Return on investment (ROI)

B.

Resource requirements.

C.

Service level agreements (SLAs)

D.

Economies of scale

Question 101

The PRIMARY reason for periodically evaluating IT resource staffing requirements is to:

Options:

A.

ascertain the IT function has sufficient skilled staff to maintain daily operations.

B.

ensure the enterprise has sufficient resources to address changing business and IT needs.

C.

verify that human resource recruitment and retention processes meet enterprise IT objectives.

D.

confirm IT-related responsibilities are defined for the enterprise's business and IT staff.

Question 102

To enable IT to deliver adequate services and maintain availability of a web-facing infrastructure, an IT governance committee should FIRST establish:

Options:

A.

web operations procedures.

B.

business continuity plans (BCPs).

C.

key performance indicators (KPIs).

D.

customer survey processes.

Question 103

Which of the following is MOST important to include in IT governance reporting to the board of directors?

Options:

A.

Critical risks

B.

Technology cost savings

C.

Threat landscape

D.

Security events

Question 104

The PRIMARY objective of building outcome measures is to:

Options:

A.

monitor whether the chosen strategy is successful

B.

visualize how the strategy will be achieved.

C.

demonstrate commitment to IT governance.

D.

clarify the cause-and-effect relationship of the strategy.

Question 105

The CIO of a large enterprise has taken the necessary steps to align IT objectives with business objectives. What is the BEST way for the CIO to ensure these objectives are delivered effectively by IT staff?

Options:

A.

Map the IT objectives to an industry-accepted framework.

B.

Enhance Ihe budget for training based on the IT objectives.

C.

Include the IT objectives in staff performance plans.

D.

Include CIO sign-off of the objectives as part of the IT strategic plan.

Question 106

An IT manager is trying to determine optimal IT service levels. Which of the following should be the PRIMARY consideration?

Options:

A.

Internal rate of return

B.

Recovery time objective (RTO)

C.

Cost-benefit analysis

D.

Resource utilization analysis

Question 107

Which of the following metrics would provide senior management with the BEST indication of the success of IT investments?

Options:

A.

Number of IT investments tracked in the balanced scorecard

B.

Percentage of IT investments recorded in the enterprise architecture (EA)

C.

Number of IT investments impacted by business-related incidents

D.

Percentage of IT investments that meet expected benefits

Question 108

An IT steering committee has received a report that supports the economic and service benefits of moving infrastructure hosting to an external cloud provider. Business leadership is very concerned about the security risk and potential loss of customer data. What is the BEST way for the committee to address these concerns?

Options:

A.

Mandate there will be no customer data at rest stored on cloud servers used by the vendor.

B.

Include compliance with the enterprise's data governance policy in the contract.

C.

Ensure reporting and penalty clauses are included in the contract for any loss of data.

D.

Require an encrypted connection between the cloud and enterprise servers.

Question 109

Which of the following are the MOST important processes for information asset life cycle management?

Options:

A.

Procurement management and third-party management

B.

Configuration management and financial management

C.

Vulnerability management and network management

D.

Business continuity management and disaster recovery management

Question 110

The PRIMARY reason for using quantitative criteria in developing business cases for IT projects is to:

Options:

A.

improve the process of evaluating returns after implementation.

B.

benchmark project success with similar enterprises.

C.

learn lessons from errors made in past projects.

D.

apply other corporate standards to the development project.

Question 111

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

Options:

A.

Granting access to information based on information architecture

B.

Engaging an audit of logical access controls and related security policies

C.

Implementing multi-factor authentication controls

D.

Authenticating access to information assets based on roles or business rules

Question 112

To enable the development of required IT skill sets for the enterprise, it is MOST important to define skill requirements based on:

Options:

A.

training needs.

B.

one set of skills applicable to all IT staff.

C.

a best practices framework.

D.

each role within the IT department.

Question 113

Which of the following would BEST help a CIO enhance the competencies of an IT business analytics team?

Options:

A.

Understanding current staff skill sets and identifying gaps

B.

Creating operational processes and identifying resources

C.

Defining the IT architecture and identifying training areas

D.

Establishing team goals and identifying the proper structure

Question 114

The board of directors of an enterprise has questioned whether the business is focused on optimizing value. The IT strategy committees’ BEST action to address the board's concern is to:

Options:

A.

initiate reporting and review of key IT performance metrics.

B.

conduct a portfolio review to assess the benefits realization of IT investments.

C.

conduct a benchmark to assess IT value relative to competitors.

D.

form a technology council to monitor the efficiency of project implementation.

Question 115

Which of the following should be done FIRST when concerns have been identified regarding the financial viability of a potential software supplier?

Options:

A.

Implement an escrow agreement

B.

Perform a risk assessment

C.

Include a right-to-audit clause in the contract

D.

License the intellectual property

Question 116

An IT steering committee is evaluating whether a third-party supplier is delivering the correct level of service Reviewing which of the following will provide the BEST information to the committee?

Options:

A.

Key performance indicators (KPIs)

B.

Service portfolio management

C.

Vendor status reports

D.

Operational cost reduction reports

Question 117

To develop appropriate measures to improve organizational performance, the measures MUST be:

Options:

A.

a result of benchmarking and comparative analysis.

B.

accepted by and meaningful to the stakeholders.

C.

based on existing and validated data sources.

D.

approved by the IT steering committee.

Question 118

An enterprise is developing an ethics program, and the ethical standards have been defined. Which of the following should the enterprise do NEXT?

Options:

A.

Establish a training and awareness program focused on ethics.

B.

Implement an enterprise-wide employee monitoring program.

C.

Develop key performance indicators (KPIs) for program implementation.

D.

Outline and document consequences for noncompliance.

Question 119

What is the BEST criterion for prioritizing IT risk remediation when resource requirements are equal?

Options:

A.

Deviation from IT standards

B.

IT strategy alignment

C.

IT audit recommendations

D.

Impact on business

Question 120

An internal audit revealed a widespread perception that the enterprise's IT governance reporting lacks transparency Which of the following should the CIO do FIRST?

Options:

A.

Add stakeholder transparency metrics to the balanced scorecard

B.

Develop a communication and awareness strategy

C.

Meet with key stakeholders to understand their concerns

D.

Adopt an industry-recognized template to standardize reports.

Question 121

Which of the following should be established FIRST so that data owners can consistently assess the level of data protection needed across the enterprise?

Options:

A.

Data encryption program

B.

Data risk management program

C.

Data retention policy

D.

Data classification policy

Question 122

Which of the following would be the MOST effective way to ensure IT capabilities are appropriately aligned with business requirements for specific business processes?

Options:

A.

Establishing key performance indicators {KPIs)

B.

Requiring Internal IT architecture and design reviews

C.

Requiring architecture and design reviews with business process stakeholders

D.

Issuing a management mandate that IT and business process stakeholders work together

Question 123

Which of the following provides the BEST evidence of effective IT governance?

Options:

A.

Cost savings and human resource optimization

B.

Business value and customer satisfaction

C.

IT risk identification and mitigation

D.

Comprehensive IT policies and procedures

Question 124

An enterprise is trying to increase the maturity of its IT process from being ad hoc to being repeatable. Which of the following is the PRIMARY benefit of this change?

Options:

A.

Process optimization is embedded across the organization.

B.

Required outcomes are mapped to business objectives.

C.

Process performance is measured in business terms.

D.

Required outcomes are more frequently achieved.

Question 125

An enterprise has launched a series of critical new IT initiatives that are expected to produce substantial value Which of the following would BEST provide the board with an indication of progress of the IT initiatives?

Options:

A.

Portfolio management review

B.

Full life cycle cost-benefit analysis

C.

Demonstration of prototype and user testing

D.

Critical risk and issue walk-through

Question 126

Which of the following is the BEST way to address an IT audit finding that many enterprise application updates lack appropriate documentation?

Options:

A.

Enforce change control procedures.

B.

Conduct software quality audits

C.

Review the application development life cycle.

D.

Add change control to the risk register.

Question 127

When developing an IT governance framework, it is MOST important for an enterprise to consider:

Options:

A.

information technology risk.

B.

framework development cost.

C.

information technology strategy.

D.

stakeholders' support.

Question 128

Which of the following BEST supports an enterprise's ability to comply with privacy laws and regulations?

Options:

A.

Complete inventory of enterprise data

B.

Implementation of a breach notification process

C.

Accurate classification of enterprise data

D.

Robust enterprise policy related to data retention

Question 129

Which of the following should be the FIRST step for executive management to take in communicating what is considered acceptable use with regard to personally owned devices for company business?

Options:

A.

Require employees to read and sign a disclaimer.

B.

Develop and disseminate an applicable policy.

C.

Post awareness messages throughout the facility.

D.

Provide training on how to protect data on personal devices.

Question 130

Which of the following is the BEST approach to assist an enterprise in planning for iT-enabled investments?

Options:

A.

Enterprise architecture (EA).

B.

IT process mapping

C.

Task management

D.

Service level management

Question 131

Which of the following methods is MOST likely to be used to assess plausible risk scenarios that could result in reputational risk to the enterprise?

Options:

A.

Controls gap analysis

B.

Qualitative analysis

C.

Quantitative analysis

D.

SWOT analysis

Question 132

A newly appointed CIO has been tasked with the responsibility of developing an effective IT enterprise roadmap that meets business requirements. Which of the following is the BEST way to ensure that the business needs have been taken into consideration?

Options:

A.

Involve process owners in requirements gathering.

B.

Implement a balanced scorecard.

C.

Include user acceptance testing (UAT) as part of the resulting IT solutions.

Question 133

The PRIMARY benefit of using an IT service catalog as part of the IT governance program is that it.

Options:

A.

ensures IT effectively meets future business needs,

B.

provides a foundation for measuring IT performance,

C.

improves the ability to allocate IT resources

D.

establishes enterprise performance metrics per service

Question 134

A new chief information officer (CIO) of an enterprise recommends implementing portfolio management after realizing there is no process in place for evaluating investments prior to selection. What should be the PRIMARY strategic goal driving this decision?

Options:

A.

Maximize value from the combined investments.

B.

Standardize processes for investment evaluation.

C.

Align investments to the enterprise architecture (EA).

D.

Enable transparency within the investment process.

Question 135

Which of the following aspects of IT governance BEST addresses the potential intellectual property implications of a cloud service provider having a database in another country?

Options:

A.

Contract management

B.

Continuity planning

C.

Data management

D.

Security architecture

Question 136

Which of the following is MOST important to review during IT strategy development?

Options:

A.

Industry best practices

B.

IT balanced scorecard

C.

Current business environment

D.

Data flows that indicate areas requiring IT support

Question 137

An enterprise learns that a new privacy regulation was recently published to protect customers in the event of a breach involving personally identifiable information (Pll). The IT risk management team's FIRST course of action should be to:

Options:

A.

evaluate the risk appetite for the new regulation.

B.

define the risk tolerance for the new regulation.

C.

determine if the new regulation introduces new risk.

D.

assign a risk owner for the new regulation.

Question 138

The PRIMARY benefit of integrating IT resource planning into enterprise strategic planning is that it enables the enterprise to:

Options:

A.

allocate resources efficiently to achieve desired goals.

B.

adjust business goals depending upon resource availability.

C.

prioritize resource allocation based on sourcing strategy.

D.

develop tactical plans to achieve resource optimization.

Question 139

An IT audit reveals inconsistent maintenance of data privacy in enterprise systems primarily due to a lack of data sensitivity categorizations. Once the categorizations are defined, what is the BEST long-term strategic response by IT governance to address this problem?

Options:

A.

Standardize data classification processes throughout the enterprise.

B.

Incorporate enterprise privacy categorizations into contracts.

C.

Require business impact analyses (BIAs) for enterprise systems.

D.

Reassess the data governance policy.

Question 140

Which of the following is the MOST effective way to manage risks within the enterprise?

Options:

A.

Assign individuals responsibilities and accountabilities for management of risks.

B.

Make staff aware of the risks in their area and risk management techniques.

C.

Provide financial resources for risk management systems.

D.

Document procedures and reporting processes.

Question 141

An enterprise's internal audit group has scheduled a control review of a payroll system project but has been told to wait until the system is implemented. Which of the following is the GREATEST risk associated with the delay?

Options:

A.

delay in the development of new key performance indicators (KPIs)

B.

Continued dependency on compliant legacy systems

C.

Increased cost to mitigate deficiencies

D.

Lack of adherence to industry best practices

Question 142

The PRIMARY reason for an enterprise to adopt an IT governance framework is to:

Options:

A.

assure IT sustains and extends the enterprise strategies and objectives.

B.

expedite IT investments among other competing business investments.

C.

establish IT initiatives focused on the business strategy.

D.

allow IT to optimize confidentiality, integrity, and availability of information assets.

Question 143

Which of the following would provide the BEST input for prioritizing strategic IT improvement initiatives?

Options:

A.

Business dependency assessment

B.

Business process analysis

C.

Business case evaluation

D.

Business impact analysis (BIA)

Question 144

The CIO of a financial services company is tasked with ensuring IT processes are in compliance with recently instituted regulatory changes. The FIRST course of action should be to:

Options:

A.

align IT project portfolio with regulatory requirements.

B.

create an IT balanced scorecard.

C.

identify the penalties for noncompliance.

D.

perform a current state assessment.

Question 145

A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?

Options:

A.

Mitigate and track data-related issues and risks.

B.

Modify legal and regulatory data requirements.

C.

Define data protection and privacy practices.

D.

Assess the information governance framework.

Question 146

As the required core competencies of the IT workforce are anticipated and identified, what is the NEXT step in strengthening the department's human resource assets?

Options:

A.

Develop a responsible, accountable, consulted, and informed (RACI) chart.

B.

Create an effective recruitment, retention, and training program.

C.

Commit to the board performance metrics and bonus structure.

D.

Develop personnel requirements for third-party assurance.

Question 147

Which of the following would BEST help to improve an enterprise's ability to manage large IT investment projects?

Options:

A.

Creating a change management board

B.

Reviewing and evaluating existing business cases

C.

Implementing a review and approval process for each phase

D.

Publishing the IT approval process online for wider scrutiny

Question 148

When determining the optimal IT service levels to support business, which of the following is MOST important?

Options:

A.

IT capacity utilization and availability.

B.

Cost/benefit to the business.

C.

Available IT budget.

D.

Business user requests

Question 149

The board of directors of an enterprise has approved a three-year IT strategic program to centralize the core business processes of its global entities into one core system. Which of the following should be the ClO's NEXT step?

Options:

A.

Engage a team to perform a business impact analysis (BIA).

B.

Require the development of a risk management plan.

C.

Determine resource requirements for program implementation.

D.

Require the development of a program roadmap.

Question 150

When evaluating benefits realization of IT process performance, the analysis MUST be based on;

Options:

A.

key business objectives.

B.

industry standard key performance indicators (KPIs).

C.

portfolio prioritization criteria.

D.

IT risk policies.

Question 151

A CIO has been asked to modify an organization's IT performance measurement system to reflect recent changes in technology, including the movement of some data processing to a cloud solution. Which of the following is the PRIMARY consideration when designing such a measurement system?

Options:

A.

Ensuring that cost of measurement and reporting is minimized

B.

Ensuring the measurement system maps to the enterprise architecture (EA)

C.

Adequately defining the scope of services moved to the cloud

D.

Correctly understanding stakeholder needs for IT-related measurement

Question 152

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

Options:

A.

Require an update to enterprise data policies.

B.

Request an impact analysis.

C.

Review documented data interdependence.

D.

Validate against existing architecture.

Question 153

Which of the following is the MOST important attribute of an information steward?

Options:

A.

The information steward manages the systems that process the relevant data.

B.

The information steward has expertise in managing data quality systems.

C.

The information steward is closely aligned with the business function.

D.

The information steward is part of the information architecture group.

Question 154

Which of the following BEST reflects mature risk management in an enterprise?

Options:

A.

A regularly updated risk register

B.

Ongoing risk assessment

C.

Ongoing investment in risk mitigation

D.

Responsive risk awareness culture

Question 155

A retail enterprise has cost reduction as its top priority. From a governance perspective, which of the following should be the MOST important consideration when evaluating different IT investment options?

Options:

A.

Support for increased sales

B.

Risk associated with each option

C.

Industry best practices

D.

Business value impact

Question 156

Which of the following is the BEST method to monitor IT governance effectiveness?

Options:

A.

Service level management

B.

Balanced scorecard

C.

Risk control self-assessment (CSA)

D.

SWOT analysis

Question 157

Which of the following is the MOST important driver of IT governance?

Options:

A.

Effective internal controls

B.

Management transparency

C.

Quality measurement

D.

Technical excellence

Question 158

Establishing a uniform definition for likelihood and impact through risk management standards PRIMARILY addresses which of the following concerns?

Options:

A.

Inconsistent categories of vulnerabilities

B.

Conflicting interpretations of risk levels

C.

Inconsistent data classification

D.

Lack of strategic IT alignment

Question 159

The board of directors has mandated the use of geolocation software to track mobile assets assigned to employees who travel outside of their home country. To comply with this mandate, the IT steering committee should FIRST request

Options:

A.

the inclusion of mandatory training for remote device users.

B.

an architectural review to determine appropriate solution design.

C.

an assessment to determine if data privacy protection is addressed.

D.

an update to the acceptable use policy.

Question 160

A financial institution with a highly regarded reputation for protecting customer interests has recently deployed a mobile payments program. Which of the following key risk indicators (KRIs) would be of MOST interest to the CIO?

Options:

A.

Number of failed software updates on mobile devices

B.

Percentage of incomplete transactions

C.

Failure rate of point-of-sale systems

D.

Total volume of suspicious transactions

Question 161

An enterprise is initiating efforts to improve system availability to mitigate IT risk to the business. Which of the following results would be MOST important to report to the CIO to measure progress?

Options:

A.

Incident severity and downtime trend analysis

B.

Probability and seventy of each IT risk

C.

Financial losses and bad press releases

D.

Customer and stakeholder complaints over time

Question 162

The board of a start-up company has directed the CIO to develop a technology resource acquisition and management policy. Which of the following should be the MOST important consideration during the development of this policy?

Options:

A.

Enterprise growth plans

B.

Industry best practices

C.

Organizational knowledge retention

D.

IT staff competencies

Question 163

A global financial enterprise has been experiencing a substantial number of information security incidents that have directly affected its business reputation. Which of the following should be the IT governance board's FIRST course of action?

Options:

A.

Require revisions to how security incidents are managed by the IT department.

B.

Request an IT security assessment to identify the main security gaps.

C.

Execute an IT maturity assessment of the security process.

D.

Mandate an update to the enterprise's IT security policy.

Question 164

Which of the following is the BEST IT architecture concept to ensure consistency, interoperability, and agility for infrastructure capabilities?

Options:

A.

Establishment of an IT steering committee

B.

Standards-based reference architecture and design specifications

C.

Establishment of standard vendor and technology designations

D.

Design of policies and procedures

Question 165

Which of the following MOST effectively demonstrates operational readiness to address information security risk issues?

Options:

A.

Executive management has announced an information security risk initiative.

B.

IT management has communicated the need for information security risk management to the business.

C.

A policy has been communicated stating enterprise commitment and readiness to address information security risk.

D.

Procedures have been established for assessing and mitigating information security risks.

Question 166

An enterprise is evaluating a Software as a Service (SaaS) solution to support a core business process. There is no outsourcing governance or vendor management in place. What should be the CEO's FIRST course of action?

Options:

A.

Ensure the roles and responsibilities to manage service providers are defined.

B.

Establish a contract with the SaaS solution provider.

C.

Instruct management to use the standard procurement process.

D.

Ensure the service level agreements (SLAs) for service providers are defined.

Question 167

An IT strategy committee wants to ensure that a risk program is successfully implemented throughout the enterprise. Which of the following would BEST support this goal?

Options:

A.

A risk management framework

B.

Mandatory risk awareness courses for staff

C.

A risk recognition and reporting policy

D.

Commitment from senior management

Question 168

Risk management strategies are PRIMARILY adopted to:

Options:

A.

avoid risks for business and IT assets.

B.

take necessary precautions for claims and losses.

C.

achieve acceptable residual risk levels.

D.

achieve compliance with legal requirements.

Question 169

The MOST successful IT performance metrics are those that:

Options:

A.

measure financial results.

B.

measure all areas.

C.

are approved by the stakeholders.

D.

contain objective measures.

Question 170

To generate value for the enterprise, it is MOST important that IT investments are:

Options:

A.

aligned with the IT strategic objectives.

B.

approved by the CFO.

C.

consistent with the enterprise's business objectives.

D.

included in the balanced scorecard.

Question 171

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

Options:

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Question 172

Which of the following is the BEST way to ensure the continued usefulness of IT governance reports for stakeholders?

Options:

A.

Conduct quarterly audits and adjust reporting based on findings.

B.

Establish a standard process for providing feedback.

C.

Rely on IT leaders to advise when adjustments should be made.

D.

Issue frequent service level satisfaction surveys.

Question 173

An IT risk assessment for a large healthcare group revealed an increased risk of unauthorized disclosure of information. Which of the following should be established FIRST to address the risk?

Options:

A.

Data encryption tools

B.

Data loss prevention tools

C.

Data classification policy

D.

Data retention policy

Question 174

Which of the following is MOST important when an IT-enabled business initiative involves multiple business functions?

Options:

A.

Defining cross-departmental budget allocation

B.

Conducting a systemic risk assessment

C.

Developing independent business cases

D.

Establishing a steering committee with business representation

Question 175

An enterprise considers implementing a system that uses a technology that is not in line with its IT strategy. The business case indicates significant benefit to the enterprise. Which of the following is the BEST way to manage this situation within an IT governance framework?

Options:

A.

Update the IT strategy to align with the new technology.

B.

Initiate an operational change request.

C.

Reject based on non-alignment.

D.

Address as part of an architecture exception process.

Question 176

Which of the following MOST effectively prevents an IT system from becoming technologically obsolete before its planned return on investment (ROi)?

Options:

A.

Requesting periodic third-party assessments of the system throughout its life

B.

Obtaining long-term support commitments from the system platform vendors)

C.

Obtaining independent assurance that the system will conform to future business requirements

D.

Ensuring that the system is maintained in compliance with enterprise architecture (EA) standards

Question 177

An enterprise made a significant change to its business operating model that resulted in a new strategic direction. Which of the following should be reviewed FIRST to ensure IT congruence with the new business strategy?

Options:

A.

IT risk appetite

B.

Enterprise project management framework

C.

IT investment portfolio

D.

Information systems architecture

Question 178

Which of the following represents the GREATEST challenge to implementing IT governance?

Options:

A.

Determining the best practice to follow

B.

Planning the project itself

C.

Developing a business case

D.

Applying behavioral change management

Question 179

Which of the following is PRIMARILY achieved through performance measurement?

Options:

A.

Process improvement

B.

Transparency

C.

Cost efficiency

D.

Benefit realization

Question 180

An enterprise has a zero-tolerance policy regarding security. This policy is causing a large number of email attachments to be blocked and is a disruption to enterprise. Which of the following should be the FIRST governance step to address this email issue?

Options:

A.

Direct the development of an email usage policy.

B.

Obtain senior management input based on identified risk.

C.

Recommend business sign-off on the zero-tolerance policy.

D.

Introduce an exception process.

Question 181

Senior management wants to expand offshoring to include IT services as other types of business offshoring have already resulted in significant financial benefits for the enterprise. The CIO is currently midway through a successful five-year strategy that relies heavily on internal IT resources. What should the CIO do NEXT?

Options:

A.

Reevaluate the offshoring strategy.

B.

Abandon the current IT strategy.

C.

Continue with the existing IT strategy.

D.

Reevaluate the current IT strategy.

Question 182

The use of an IT balanced scorecard enables the realization of business value of IT through:

Options:

A.

business value and control mechanisms.

B.

outcome measures and performance drivers.

C.

financial measures and investment management.

D.

vision and alignment with corporate programs.

Question 183

An IT director has become aware that a certain subset of data collected lawfully can be used to generate additional revenue. However, this particular use of the data is outside the original intention. What is the PRIMARY reason this situation should be escalated to the IT steering committee?

Options:

A.

Potential legal penalties

B.

Ethical concerns

C.

Regulatory requirements

D.

Data protection

Question 184

It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?

Options:

A.

Enterprise architecture (EA)

B.

Enterprise risk framework

C.

IT service management

D.

IT project roadmap

Question 185

The CIO in a large enterprise is seeking assurance that significant IT risk is being proactively monitored and does not exceed agreed risk tolerance levels. The BEST way to provide this ongoing assurance is to require the development of:

Options:

A.

an IT risk appetite statement.

B.

a risk management policy.

C.

key risk indicators (KRIs).

D.

a risk register.

Question 186

To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?

Options:

A.

IT staff morale

B.

Core IT processes

C.

Outsourcer's reputation

D.

New service level agreements (SLAs)

Question 187

Results of an enterprise's customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise's mobile applications are considered inferior compared to legacy browser-based applications. Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?

Options:

A.

Establish service level agreements (SLAs) with the development team.

B.

Identify key risks and mitigation strategies for mobile applications.

C.

Implement key performance indicators (KPIs) that include application quality.

D.

Identify business requirements concerning mobile applications.

Question 188

Of the following, who should approve the criteria for information quality within an enterprise?

Options:

A.

Information architect

B.

Information analyst

C.

Information steward

D.

Information owner

Question 189

Which of the following should be the MAIN governance focus when implementing a newly approved bring your own device (BYOD) policy?

Options:

A.

Recommending mobile applications that will increase business productivity

B.

Training employees on the enterprise's chosen mobile device management system

C.

Educating employees on the increased IT security risk to the enterprise

D.

Understanding knowledge gaps of IT employees to support different mobile platforms

Question 190

Which of the following is MOST important for the effective design of an IT balanced scorecard?

Options:

A.

On-demand reporting and continuous monitoring

B.

Consulting with the CIO

C.

Emphasizing the financial results

D.

Identifying appropriate key performance indicators (KPls)

Question 191

Which of the following is the PRIMARY element in sustaining an effective governance framework?

Options:

A.

Identification of optimal business resources

B.

Establishment of a performance metric system

C.

Ranking of critical business risks

D.

Assurance of the execution of business controls

Question 192

An enterprise has decided to create its first mobile application. The IT director is concerned about the potential impact of this initiative. Which of the following is the MOST important input for managing the risk associated with this initiative?

Options:

A.

Enterprise architecture (EA)

B.

IT risk scorecard

C.

Enterprise risk appetite

D.

Business requirements

Question 193

Which of the following is MOST important to effectively initiate IT-enabled change?

Options:

A.

Establish a change management process.

B.

Obtain top management support and ownership.

C.

Ensure compliance with corporate policy.

D.

Benchmark against best practices.

Question 194

To reduce the risk of reputational damage through inappropriate use of social media by employees outside of the workplace, the enterprise approach regarding social media should PRIMARILY focus on;

Options:

A.

implementing preventative controls.

B.

developing policies on social media.

C.

implementing a review of processes utilizing social media.

D.

ensuring each use of social media is approved by management.

Question 195

An audit report has revealed that data scientists are analyzing sensitive "big data" files using an offsite cloud because corporate servers do not have the necessary processing capabilities. A review of policies indicates this practice is not prohibited. Which of the following should be the FIRST strategic action to address the report?

Options:

A.

Authorize a risk analysis of the practice.

B.

Update data governance practices.

C.

Revise the information security policy.

D.

Recommend the use of a private cloud.

Question 196

The CIO of an enterprise learns the payroll server of a competitor has been the victim of ransomware. To help plan for the possibility of ransomed corporate data, what should be the ClO's FIRST course of action?

Options:

A.

Require development of key risk indicators (KRls).

B.

Develop a policy to address ransomware.

C.

Request a targeted risk assessment.

D.

Back up corporate data to a secure location.

Question 197

An IT investment review board wants to ensure that IT will be able to support business initiatives. Each initiative is comprised of several interrelated IT projects. Which of the following would help ensure that the initiatives meet their goals?

Options:

A.

Review of project management methodology

B.

Review of the business case for each initiative

C.

Establishment of portfolio management

D.

Verification of initiatives against the architecture

Question 198

The CEO of a large enterprise has announced me commencement of a major business expansion that will double the size of the organization. IT will need to support the expected demand expansion. What should the CIO do FIRST?

Options:

A.

Review the resource utilization matrix.

B.

Recruit IT resources based on the expansion decision.

C.

Embed IT personnel in the business units.

D.

Update the IT strategic plan to align with the decision.

Question 199

Which of the following is MOST critical for the successful implementation of an IT process?

Options:

A.

Process framework

B.

Service delivery process model

C.

Objectives and metrics

D.

IT process assessment

Question 200

When developing effective metrics for the measurement of solution delivery, it is MOST important to:

Options:

A.

establish project controls and monitoring objectives.

B.

perform an objective analysis of the project roadmap.

C.

establish the objectives and expected benefits.

D.

specify quantitative measures for solution delivery.

Question 201

The MOST important aspect of an IT governance framework to ensure that IT supports repeatable business processes is:

Options:

A.

earned value management.

B.

quality management,

C.

resource management.

D.

risk management

Question 202

Which of the following MUST be established before implementing an information architecture that restricts access to data based on sensitivity?

Options:

A.

Risk and control frameworks

B.

Probability and impact analysis

C.

Classification and ownership

D.

Security and privacy policies

Question 203

Which of the following is the BEST course of action to enable effective resource management?

Options:

A.

Conduct an enterprise risk assessment.

B.

Implement a cross-training program.

C.

Assign resources based on business priorities.

D.

Assign resources based on risk appetite.

Question 204

An IT audit report indicates that a lack of IT employee risk awareness is creating serious security issues in application design and configuration. Which of the following would be the BEST key risk indicator (KRI) to show progress in IT employee behavior?

Options:

A.

Number of IT employees attending security training sessions

B.

Results of application security testing

C.

Number of reported security incidents

D.

Results of application security awareness training quizzes

Exam Detail
Vendor: Isaca
Certification: Isaca Certification
Exam Code: CGEIT
Last Update: Jun 15, 2025
CGEIT Question Answers
Page: 1 / 51
Total 682 questions