Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Isaca CGEIT Dumps

Page: 1 / 68
Total 682 questions

Certified in the Governance of Enterprise IT Exam Questions and Answers

Question 1

Which of the following is a CIO's BEST approach to ensure IT executes against an approved strategy?

Options:

A.

Ask project management to define the IT activities for accomplishing the strategy.

B.

Request IT senior leaders to collectively plan tactics for execution

C.

Have IT leaders independently develop goals for their teams.

D.

Provide specific direction for execution of the tasks across IT.

Question 2

Which of the following would BEST help to prevent an IT system from becoming obsolete before its planned return on investment (ROI)?

Options:

A.

Obtaining independent assurance that the IT system conforms to business requirements

B.

Defining IT and business goals to ensure value delivery as required

C.

Managing the benefit realization through the entire life cycle

D.

Ordering an external audit for the IT system early in the roll out

Question 3

An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?

Options:

A.

Ensure IT has knowledgeable representation and is included in the strategic planning process.

B.

Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.

C.

Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).

D.

Outsource both IT operations and IT development and implement controls based on a standardized framework.

Question 4

An enterprise's IT department has failed to deliver required solutions on time due to insufficient resource allocation, resulting in a longer time to market. Which of the following is the BEST way for the chief information officer (CIO) to address this situation?

Options:

A.

Implement a new IT change management procedure.

B.

Evaluate the availability and capacity planning process.

C.

Benchmark IT staffing levels against similar organizations in the industry.

D.

Direct the project management office (PMO) to review and prioritize IT projects.

Question 5

Which of the following situations provides the BEST justification for considering the adoption of a qualitative risk assessment method?

Options:

A.

Determining a quantitative risk score would require complex calculations

B.

It is cost prohibitive to obtain relevant historical quantitative data

C.

There are fewer information assets in the risk register

D.

A higher risk tolerance level has been defined by enterprise leadership

Question 6

Which of the following will BEST enable an enterprise to convey IT governance direction and objectives?

Options:

A.

Skills and competencies

B.

Principles and policies

C.

Corporate culture

D.

Business processes

Question 7

Which of the following should be done FIRST when developing an IT strategy to support a new AI business strategy?

Options:

A.

Assess current AI capabilities and infrastructure

B.

Establish guidelines and policies for responsible use of AI

C.

Create use cases to understand the impact of AI

D.

Build a team of AI professionals

Question 8

Which of the following is the BEST way for a CIO to ensure that the work of IT employees is aligned with approved IT directives?

Options:

A.

Mandate technical training related to the IT objectives.

B.

Have business leaders present their departments' objectives.

C.

Include relevant IT goals in individual performance objectives.

D.

Request a progress review of IT objectives by internal audit.

Question 9

An enterprise’s IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

Options:

A.

Business to help define IT goals.

B.

IT and business to define risks.

C.

Business to fund IT services.

D.

IT to define business objectives.

Question 10

An enterprise will be adopting wearable technology to improve business performance. Which of the following is the BEST way for the CIO to validate IT’s preparedness for this initiative?

Options:

A.

Request an enterprise architecture (EA) review.

B.

Perform a baseline business value assessment.

C.

Request reprioritization of the IT portfolio.

D.

Identify the penalties for noncompliance.

Question 11

Which of the following is the BEST way for a CIO to ensure that IT-related training is taken seriously by the IT management team and direct employees?

Options:

A.

Develop training programs based on results of an IT staff survey of preferences.

B.

Embed training metrics into the annual performance appraisal process.

C.

Promote IT-specific training awareness program.

D.

Research and identify training needs based on industry trends.

Question 12

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

Options:

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Question 13

Which of the following provides an enterprise with the BEST understanding of the value proposition for employing a new cloud service?

Options:

A.

Key risk indicators (KRIs).

B.

Service level agreements (SLAs).

C.

Return on investment (ROI).

D.

Customer satisfaction surveys.

Question 14

An organization requires updates to their IT infrastructure to meet business needs. Which of the following will provide the MOST useful information when planning for the necessary IT investments?

Options:

A.

Enterprise architecture (EA)

B.

Risk assessment report

C.

Business user satisfaction metrics

D.

Audit findings

Question 15

An enterprise has launched a digitization effort requiring a single view of customer information across all product lines. Which of the following should be done FIRST to enable this initiative?

Options:

A.

Develop funding estimates for integrating applications

B.

Modify the future state enterprise architecture (EA)

C.

Assess the current data standards that are in use for applications

D.

Audit the infrastructure architecture for integration points

Question 16

Which of the following BEST enables informed IT investment decisions?

Options:

A.

Business case

B.

Technology roadmap

C.

Program plan

D.

Risk classification

Question 17

An enterprise is required to implement several regulatory requirements. Which of the following functions is BEST suited to determine compliance priorities?

Options:

A.

Legal counsel

B.

The IT risk department

C.

The audit department

D.

Business units

Question 18

Which of the following BEST supports an IT strategy committee’s objective to align employee competencies with planned initiatives?

Options:

A.

Set management goals to hire cooperative work experience students.

B.

Specify minimum training hours required for continuing professional education.

C.

Require balanced scorecard concepts training of all employees.

D.

Add achievement of competencies to employee performance goals.

Question 19

An IT governance committee is defining a risk management policy for a portfolio of IT-enabled investments. Which of the following should be the PRIMARY consideration when developing the policy?

Options:

A.

Risk appetite of the enterprise.

B.

Possible investment failures.

C.

Risk management framework.

D.

Value obtained with minimum risk.

Question 20

New legislation requires an enterprise to report cybersecurity incidents to a government agency within a defined timeline. Which of the following should be the FIRST course of action?

Options:

A.

Establish an incident reporting system and hotline.

B.

Require automation of incident reporting to agencies.

C.

Establish a cybersecurity incident manager role.

D.

Understand requirements and definitions for reportable incidents.

Question 21

An enterprise plans to migrate its applications and data to an external cloud environment. Which of the following should be the ClO's PRIMARY focus before the migration?

Options:

A.

Reviewing the information governance framework

B.

Selecting best-of-breed cloud offerings

C.

Updates the enterprise architecture (EA) repository

D.

Conducting IT staff training to manage cloud workloads

Question 22

When an enterprise plans to deploy mobile device technologies, it is MOST important for leadership to ensure that:

Options:

A.

Users agree to an acceptable use policy

B.

Appropriate controls are implemented

C.

The IT policy addresses mobile devices

D.

The project management office (PMO) is engaged

Question 23

When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?

Options:

A.

Standardization

B.

Replication

C.

Segregation

D.

Sanitization

Question 24

A regulator has expressed concerns about the timeliness of information reported from an enterprise. Which of the following should be done FIRST to address this issue?

Options:

A.

Assess the reporting delivery process.

B.

Negotiate an exception process with the regulator.

C.

Automate the reporting process.

D.

Evaluate the implications of risk acceptance.

Question 25

Which of the following should be done FIRST when preparing to migrate patient records to a cloud service provider?

Options:

A.

Review the current data governance policy.

B.

Update the enterprise architecture (EA).

C.

Revise the risk management framework.

D.

Define the service level agreement (SLA).

Question 26

Which of the following should be the MOST important consideration when establishing key performance indicators (KPIs) for IT initiatives?

Options:

A.

An owner can be assigned

B.

Processes can be optimized

C.

Data collection can be automated

D.

Quality has been evaluated

Question 27

When an enterprise outsources to a third-party data center, who is accountable for the governance of data retention controls for the data that has been transferred?

Options:

A.

The enterprise's internal audit team

B.

The third party's data steward

C.

The third party's control operators

D.

The enterprise's data owner

Question 28

Which of the following is MOST helpful in determining whether an enterprise’s quality assurance (QA) program is meeting business requirements?

Options:

A.

Review the quality framework.

B.

Perform a SWOT analysis.

C.

Review service outage reports.

D.

Perform a quality audit.

Question 29

An enterprise is planning to upgrade its current enterprise resource planning (ERP) system to remain competitive within the industry. Which of the following would be MOST helpful to facilitate a successful implementation?

Options:

A.

Documenting the current ERP processes and procedures

B.

Reviewing the ERP post-implementation report

C.

Establishing a change and transition planning process

D.

Conducting a comprehensive requirements review

Question 30

An enterprise has an overarching enterprise architecture (EA) document. The CIO is concerned that EA is not leveraged in recent IT-enabled investments. Which of the following would BEST help to address these concerns and enforce the leveraging of EA?

Options:

A.

Form a team to update EA regularly.

B.

Require EA review at key milestones.

C.

Publish and train on the EA document.

D.

Adopt a globally recognized EA framework.

Question 31

Which of the following is the BEST approach to ensure global regulatory compliance when implementing a new business process?

Options:

A.

Use a balanced scorecard to track the business process.

B.

Ensure the appropriate involvement Of the legal department.

C.

Review and revise the business architecture.

D.

Seek approval from the change management board.

Question 32

Which of the following is the BEST critical success factor (CSF) to use when changing an IT value management program in an enterprise?

Options:

A.

Documenting the process for the board of directors' approval

B.

Adopting the program by using an incremental approach

C.

Implementing the program through the enterprise's change plan

D.

Aligning the program to the business requirements

Question 33

Which of the following should be the CIO’s GREATEST consideration when making changes to the IT strategy?

Options:

A.

Have key stakeholders been consulted?

B.

Has the impact to the enterprise architecture (EA) been assessed?

C.

Have IT risk metrics been adjusted?

D.

Has the investment portfolio been revised?

Question 34

An IT governance committee realizes there are antiquated technologies in use throughout the enterprise. Which of the following is the BEST group to evaluate the recommendations to address these shortcomings?

Options:

A.

Enterprise architecture (EA) review board

B.

Business process improvement workgroup

C.

Audit committee

D.

Risk management committee

Question 35

Which of the following BEST enables an enterprise to minimize the risks of intellectual property theft and loss of sensitive information when acquiring Internet of Things (IoT) hardware and software components?

Options:

A.

Review the data classification policy and relevant documentation

B.

Terminate contracts with suppliers from sanctioned regions of the world

C.

Require nondisclosure agreements (NDAs) from all suppliers

D.

Integrate supply chain cyber risk management processes

Question 36

The GREATEST benefit associated with a decision to implement performance metrics for key IT assets is the ability to:

Options:

A.

establish the span of control during the life cycle of IT assets.

B.

determine the average cost of controls for protection of IT assets.

C.

compare the performance Of IT assets against industry best practices.

D.

determine the contribution of IT assets in achievement of IT goals.

Question 37

A CIO observes that many information assets are hosted on legacy technology that can no longer be patched or updated. The systems are not currently in use, but business units are reluctant to decommission assets due to information retention requirements. Which of the following is the BEST strategic response to this situation?

Options:

A.

Ensure the legacy systems are behind a secure firewall

B.

Isolate the legacy systems and disconnect them from the internet

C.

Apply legacy system surcharges to the business units

D.

Develop and enforce life cycle policies in consultation with business

Question 38

When conducting a risk assessment in support of a new regulatory

requirement, the IT risk committee should FIRST consider the:

Options:

A.

cost burden to achieve compliance.

B.

readiness of IT systems to address the risk.

C.

risk profile of the enterprise.

D.

disruption to normal business operations.

Question 39

Of the following, who is responsible for the achievement of IT strategic objectives?

Options:

A.

IT steering committee

B.

Business process owners

C.

Chief information officer (CIO)

D.

Board of directors

Question 40

Which of the following is MOST important for the successful establishment of an ethics program?

Options:

A.

Defined whistleblower processes

B.

Culture of accountability and responsibility

C.

Defined roles and responsibilities

D.

Clear mission and vision statements

Question 41

Which of the following BEST enables an enterprise to determine an appropriate retention policy for its information assets?

Options:

A.

Business and compliance requirements

B.

Business storage and processing needs

C.

Backup and restoration capabilities

D.

External customer data retention requirements

Question 42

When selecting a cloud provider, which of the following provides the MOST comprehensive information regarding the current status and effectiveness of the provider's controls?

Options:

A.

Globally recognized certification

B.

Third-party audit report

C.

Control self-assessment (CSA)

D.

Maturity assessment

Question 43

Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?

Options:

A.

Defined roles.

B.

Replicated systems.

C.

A risk register.

D.

Budget allocation.

Question 44

A newly appointed CIO is concerned that IT is too reactive and wants to ensure IT adds value to the enterprise by proactively anticipating business needs. Which of the following will BEST contribute to meeting this objective?

Options:

A.

Incorporating IT planning into the enterprise strategic planning process

B.

Implementing an IT portfolio management framework

C.

Involving more IT representation in strategic business case reviews

D.

Including IT management within the program management office

Question 45

Despite an adequate training budget, IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?

Options:

A.

Provide incentives for IT staff to attend outside conferences and training.

B.

Require human resources (HR) to recruit new talent using an established IT skills matrix.

C.

Create a standard-setting center of excellence for IT.

D.

Establish an agreed-upon skills development plan with each employee.

Question 46

What should be the FIRST action of a new CIO when considering an IT governance framework for an enterprise?

Options:

A.

Understand corporate culture and IT'S role in providing business value.

B.

Understand critical IT processes to define the scope of the IT governance framework.

C.

Verify stakeholder sponsorship of the IT governance initiative.

D.

Develop an IT balanced scorecard to monitor and track IT performance.

Question 47

A series of cyber events impacting internet-facing business services has been successfully contained. To minimize future business risk exposure, which of the following should the board require of the IT team?

Options:

A.

Review the internet service provider (ISP) contract.

B.

Purchase cybersecurity insurance.

C.

Conduct a business impact analysis (BIA).

D.

Perform a root cause analysis.

Question 48

Which of the following is the GREATEST consideration when evaluating whether to comply with the new carbon footprint regulations impacted by blockchain technology?

Options:

A.

The enterprise's organizational structure

B.

The enterprise's risk appetite

C.

The current IT process capability maturity

D.

The IT strategic plan

Question 49

Which of the following BEST facilitates the adoption of an IT governance program in an enterprise?

Options:

A.

Defining clear roles and responsibilities for the participants

B.

Using a comprehensive business case for the initiative

C.

Communicating the planned IT strategy to stakeholders

D.

Addressing the behavioral and cultural aspects of change

Question 50

Despite an adequate training budget. IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?

Options:

A.

Provide incentives for IT staff to attend outside conferences and training

B.

Create a standard-setting center of excellence for IT.

C.

Require human resources (HR) to recruit new talent using an established IT skills matrix.

D.

Establish an agreed-upon skills development plan with each employee

Question 51

An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:

Options:

A.

a common risk management taxonomy.

B.

a common risk organization.

C.

common key risk indicators (KRIs).

D.

common risk mitigation strategies.

Question 52

Which of the following BEST helps to ensure that IT standards will be consistently applied across the enterprise?

Options:

A.

Enterprise risk management (ERM) reviews.

B.

Mandatory systems development training.

C.

Business case reviews by the steering committee.

D.

Established enterprise architecture (EA) practices.

Question 53

Which of the following is the BEST way for a CIO to provide progress updates on a newly implemented IT strategic plan to the board of directors?

Present an IT summary dashboard.

Present IT critical success factors (CSFs).

Report results Of key risk indicators (KRIs).

Options:

A.

Report results of stage-gate reviews.

Question 54

An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:

Options:

A.

for robust change management.

B.

for periodic service provider audits.

C.

for enterprise architecture (EA) updates.

D.

to qualify service providers.

Question 55

The board of an enterprise has decided to implement an emerging technology, and employees are extremely concerned about the unknown future of the company. What should be the CIO’s PRIMARY responsibility in addressing these concerns?

Options:

A.

Develop and communicate new performance measures.

B.

Define new roles and responsibilities for IT staff.

C.

Initiate IT workforce training on the new technology.

D.

Define and communicate a new IT strategy.

Question 56

Which of the following provides the STRONGEST indication that IT governance is well established within an organizational culture?

Options:

A.

Benefits of IT governance are realized throughout the organization.

B.

There is awareness of IT metrics throughout the organization.

C.

IT governance defines how IT projects should be assessed.

D.

IT performance metrics are defined in the balanced scorecard.

Question 57

Senior management is concerned about the unauthorized use of third-party data that is stored within the enterprise's data repositories. Which of the following is the BEST way to address this concern?

Options:

A.

Communicate consequences for staff who misuse third-party data.

B.

Ensure all third-party data in transit is encrypted.

C.

Establish data ownership with clear accountabilities.

D.

Establish optimal retention periods for third-party data.

Question 58

Which of the following is the PRIMARY outcome of using a comprehensive architecture framework?

Options:

A.

Key third-party relationships are supported.

B.

Business goal conflicts are identified.

C.

Relevant controls are identified.

D.

Organizational management policies are developed.

Question 59

A newly established IT steering committee is concerned whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

Options:

A.

Critical success factors (CSFs)

B.

Performance indicators

C.

Capability maturity levels

D.

Balanced scorecard

Question 60

What is the BEST way for IT to achieve compliance with regulatory requirements?

Options:

A.

Enforce IT policies and procedures.

B.

Create an IT project portfolio.

C.

Review an IT performance dashboard.

D.

Report on IT audit findings and action plans.

Question 61

Which of the following would BEST help assess the effectiveness of a newly established IT governance framework?

Options:

A.

Develop a business case for the program portfolio.

B.

Evaluate key performance indicator (KPI) results.

C.

Benchmark the IT governance framework to industry best practice.

D.

Review results of IT audit reports.

Question 62

Which of the following BEST enables an enterprise to determine whether a current program for IT infrastructure migration to the cloud is continuing to provide benefits?

Options:

A.

Key performance indicators (KPls)

B.

Total cost of ownership (TCO)

C.

Key risk indicators (KRIS)

D.

Net present value (NPV)

Question 63

An enterprise wants to establish key risk indicators (KRIs) in an effort to better manage IT risk. Which of the following should be identified FIRST?

Options:

A.

The enterprise risk appetite

B.

Key performance metrics

C.

Risk mitigation strategies

D.

Enterprise architecture (EA) components

Question 64

To define the risk management strategy, which of the following MUST be set by the board of directors?

Options:

A.

Risk management process

B.

Risk identification plan

C.

Risk treatment plan

D.

Risk appetite

Question 65

Which of the following is the PRIMARY responsibility of a data steward at an enterprise with mature data management programs?

Options:

A.

Implementing processes for data collection and use

B.

Ensuring compliance with data privacy laws and regulations

C.

Establishing data quality requirements and metrics

D.

Developing data-related policies and procedures

Question 66

From a governance perspective, which of the following functions MUST approve the agreed-upon criteria for a new technology-enabled service before submitting the final high-level design to project stakeholders?

Options:

A.

Information security

B.

Project management office (PMO)

C.

Quality assurance (QA)

D.

Internal audit

Question 67

Which of the following has the GREATEST impact on the design of an IT governance framework?

Options:

A.

IT performance metrics

B.

Resource allocation

C.

Business leadership

D.

Business risk

Question 68

The BEST way for a CIO to justify maintaining and supporting social media platforms is by demonstrating:

Options:

A.

how social media technology fits into the IT investment management process.

B.

that service level agreements (SLAs) for social media technologies have been met.

C.

the IT performance Of social media technologies.

D.

the value derived from investment in social media technologies.

Question 69

Which of the following is the BEST approach to assist an enterprise in planning for iT-enabled investments?

Options:

A.

Enterprise architecture (EA).

B.

IT process mapping

C.

Task management

D.

Service level management

Question 70

Which of the following BEST supports the implementation of an effective data classification policy?

Options:

A.

Monitoring with key performance indicators (KPIs)

B.

Implementation of data loss prevention (DLP) tools

C.

Clear guidelines adopted by the business

D.

Classification policy approval by the board

Question 71

Which of the following is the BEST way to implement effective IT risk management?

Options:

A.

Align with business risk management processes.

B.

Establish a risk management function.

C.

Minimize the number of IT risk management decision points.

D.

Adopt risk management processes.

Question 72

Following a re-prioritization of business objectives by management, which of the following should be performed FIRST to allocate resources to IT processes?

Options:

A.

Perform a maturity assessment.

B.

Implement a RACI model.

C.

Refine the human resource management plan.

D.

Update the IT strategy.

Question 73

The PRIMARY reason a CIO and IT senior management should stay aware of the business environment is to:

Options:

A.

revisit prioritization of IT projects.

B.

adjust IT strategy as needed.

C.

measure efficiency of IT resources.

D.

re-assess the IT investment portfolio.

Question 74

In which of the following situations is it MOST appropriate to use a quantitative risk assessment?

Options:

A.

There is a lack of accurate and reliable past and present risk data.

B.

The risk assessment needs to be completed in a short period of time.

C.

The objectivity of the risk assessment is of primary importance.

D.

The risk assessment is needed for an IT project business case.

Question 75

An enterprise is approaching the escalation date of a major IT risk. The IT steering committee wants to ascertain who is responsible for the risk response. Where should the committee find this information?

Options:

A.

Resource management plan

B.

RACl chart

C.

Risk management plan

D.

Risk register

Question 76

Communicating which of the following to staff BEST demonstrates senior management's commitment to IT governance?

Options:

A.

Legal and regulatory requirements

B.

Approved IT investment opportunities

C.

Objectives and responsibilities

D.

Need for enterprise architecture (EA)

Question 77

Which of the following would be the BEST way for an IT steering committee to monitor the adoption of a new enterprise IT strategy?

Options:

A.

Establish key performance indicators (KPIs).

B.

Establish key risk indicators (KRIs).

C.

Schedule ongoing audit reviews.

D.

Implement service level agreements (SLAs)

Question 78

An enterprise-wide strategic plan has been approved by the board of directors. Which of the following would BEST support the planning of IT investments required for the enterprise?

Options:

A.

Service-oriented architecture

B.

Enterprise architecture (EA)

C.

Contingency planning

D.

Enterprise balanced scorecard

Question 79

An IT strategy committee wants to ensure stakeholders understand who owns each strategic objective. To enable this understanding, which of the following should be communicated to stakeholders?

Options:

A.

A RACI chart

B.

The strategic plan

C.

Performance measure

D.

Risk owners

Question 80

What should be an IT steering committee's FIRST course of action when an enterprise is considering establishing a virtual reality store to sell its products?

Options:

A.

Request a resource gap analysis.

B.

Request development of key risk indicators (KRIs).

C.

Request a threat assessment.

D.

Request a cost-benefit analysis.

Question 81

A financial services company has implemented the use of a cloud-based centralized customer relationship management (CRM) system. The company has decided to go multi-national. Which of the following should be the enterprise risk management (ERM) committee's PRIMARY consideration?

Options:

A.

Security issues

B.

Vendor capability

C.

Return on investment (ROI)

D.

Compliance issues

Question 82

Which of the following is the MOST appropriate mechanism for measuring overall IT organizational performance?

Options:

A.

IT portfolio return on investment (ROI)

B.

Maturity model

C.

IT balanced scorecard

D.

Service level metrics

Question 83

Which of the following has PRIMARY responsibility to define the requirements for IT service levels for the enterprise?

Options:

A.

The business manager

B.

The help desk

C.

The CIO

D.

The business continuity vendor

Question 84

A root-cause analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators. Who should be accountable for resolving the situation?

Options:

A.

HR training director

B.

HR recruitment manager

C.

Chief information officer

D.

(CIO) Business process owner

Question 85

Which of the following would be the MOST effective way to ensure IT capabilities are appropriately aligned with business requirements for specific business processes?

Options:

A.

Establishing key performance indicators {KPIs)

B.

Requiring Internal IT architecture and design reviews

C.

Requiring architecture and design reviews with business process stakeholders

D.

Issuing a management mandate that IT and business process stakeholders work together

Question 86

An enterprise has lost an unencrypted backup tape of archived customer data. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?

Options:

A.

Initiate disciplinary proceedings against relevant employees.

B.

Mandate a review of backup tape inventory procedures.

C.

Communicate the breach to customers.

D.

Require an evaluation of storage facility vendors.

Question 87

The CIO of a global technology company is considering introducing a bring your own device (BYOD) program. What should the CIO do FIRST?

Options:

A.

Ensure the infrastructure can meet BYOD requirements.

B.

Establish a business case.

C.

Define a clear and inclusive BYOD policy.

D.

Focus on securing data and access to data.

Question 88

As part of the implementation of IT governance, the board of an enterprise should establish an IT strategy committee to:

Options:

A.

provide input to and ensure alignment of the enterprise and IT strategies.

B.

ensure IT risks inherent in the enterprise strategy implementation are managed

C.

drive IT strategy development and take responsibility for implementing the IT strategy.

D.

assume governance accountability for the business strategy on behalf of the board

Question 89

Which of the following is the MOST important input for designing a development program to help IT employees improve their ability to respond to business needs?

Options:

A.

Capability maturity model

B.

Cost-benefit analysis

C.

Skills competency assessment

D.

Annual performance evaluation

Question 90

To evaluate IT resource management, it is MOST important to define:

Options:

A.

responsibilities for executing resource management.

B.

applicable key goals.

C.

principles for the IT strategy.

D.

IT resource utilization reporting procedures.

Question 91

Which of the following should be established FIRST so that data owners can consistently assess the level of data protection needed across the enterprise?

Options:

A.

Data encryption program

B.

Data risk management program

C.

Data retention policy

D.

Data classification policy

Question 92

Which of the following is the PRIMARY consideration when developing an information asset management program?

Options:

A.

Operational requirements

B.

Industry best practice

C.

Cost benefit

D.

Regulatory requirements

Question 93

When updating an IT governance framework to support an outsourcing strategy, which of the following is MOST important?

Options:

A.

Evaluating the choice of underlying technology platforms used by the service provider

B.

Ensuring the outsource provider's IT function is aligned with its business function

C.

Verifying the vendor has developed standard operation procedures for outsourced functions

D.

Ensuring the effective management of contracts with third-party providers

Question 94

An enterprise has finalized a major acquisition and a new business strategy in line with stakeholder needs has been introduced to help ensure continuous alignment of IT with the new business strategy the CiO should FIRST

Options:

A.

review the existing IT strategy against the new business strategy

B.

revise the existing IT strategy to align with the new business strategy

C.

establish a new IT strategy committee for the new enterprise

D.

assess the IT cultural aspects of the acquired entity

Question 95

Which of the following provides the BEST evidence of an IT risk-aware culture across an enterprise?

Options:

A.

Business staff report identified IT risks.

B.

IT risks are communicated to the business.

C.

IT risk-related policies are published.

D.

The IT infrastructure is resilient.

Question 96

Individual business units within an enterprise have been designing their own IT solutions without consulting the IT department. From a governance perspective, what is the GREATEST issue associated with this situation?

Options:

A.

Security controls may not meet IT requirements.

B.

The enterprise does not have the skills to manage the solutions.

C.

The solutions conflict with IT goals and objectives.

D.

The solution may conflict with existing enterprise goals.

Question 97

To ensure that information can be traced to the originating event and accountable parties, an enterprise should FIRST:

Options:

A.

capture source information and supporting evidence.

B.

improve business process controls.

C.

review information event logs tor potential incidents.

D.

review retention requirements for source information.

Question 98

An enterprise is planning a transformation initiative by leveraging emerging technology that will have a significant impact on existing products and services Which of the following is the BEST way for IT to prepare for this change?

Options:

A.

Use a balanced scorecard to measure IT outcomes.

B.

Analyze emerging technology products and related training needs.

C.

Procure appropriate resources to support emerging technology

D.

Assess the impact on the existing IT strategy

Question 99

Following the rollout of an enterprise IT software solution that hosts sensitive data it was discovered that the application's role-based access control was not functioning as specified Which of the following is the BEST way to prevent reoccurrence in the future?

Options:

A.

Ensure supplier contracts include penalties if solutions do not meet functional requirements

B.

Ensure the evaluation process requires independent assessment of solutions prior to implementation

C.

Ensure supplier contracts include a provision for the right to audit on an annual basis

D.

Ensure procurement processes require the identification of alternate vendors to ensure business continuity.

Question 100

Which of the following is MOST important to review during IT strategy development?

Options:

A.

Industry best practices

B.

IT balanced scorecard

C.

Current business environment

D.

Data flows that indicate areas requiring IT support

Question 101

An internal audit revealed a widespread perception that the enterprise's IT governance reporting lacks transparency Which of the following should the CIO do FIRST?

Options:

A.

Add stakeholder transparency metrics to the balanced scorecard

B.

Develop a communication and awareness strategy

C.

Meet with key stakeholders to understand their concerns

D.

Adopt an industry-recognized template to standardize reports.

Question 102

Which of the following is the MOST important reason to include internal audit as a stakeholder when establishing clear roles for the governance of IT?

Options:

A.

Internal audit has knowledge and technical expertise to advise on IT infrastructure.

B.

Internal audit is accountable for the overall enterprise governance of IT.

C.

Internal audit implements controls over IT risks and security.

D.

Internal audit provides input on relevant issues and control processes.

Question 103

A health tech enterprise wants to ensure that its in-house developed mobile app for users complies with data privacy regulations. Which of the following should be identified FIRST when creating an inventory of information systems and data related to the mobile app?

Options:

A.

Data maintained by vendors

B.

Vendors and outsourced systems

C.

Application and data owners

D.

Information classification scheme

Question 104

The PRIMARY objective of promoting business ethics within the IT enterprise should be to ensure:

Options:

A.

trust among internal and external stakeholders.

B.

employees act more responsibly.

C.

corporate social responsibility.

D.

legal and regulatory compliance.

Question 105

An enterprise's global IT program management office (PMO) has recently discovered that several IT projects are being run within a specific region without knowledge of the PMO. The projects are on time, on budget, and will deliver the proposed benefits to the specific region. Which of the following should be the PRIMARY concern of the PMO?

Options:

A.

Inability to reduce the impact to the risk level of the global portfolio

B.

Projects may not follow system development life cycle (SDLC)

C.

Lack of control and impact to the overall PMO budget

Question 106

An enterprise has entered into a new market which brings additional regulatory compliance requirements. What should be done FIRST to address these requirements?

Options:

A.

Outsource the compliance process.

B.

Appoint a compliance officer.

C.

Update the organization's risk profile.

D.

Have executive management monitor compliance.

Question 107

Which of the following is the BEST way to maximize the value of an enterprise’s information asset base?

Options:

A.

Seek additional opportunities to leverage existing information assets.

B.

Facilitate widespread user access to all information assets

C.

Regularly purge information assets to minimize maintenance costs

D.

Implement an automated information management platform

Question 108

To develop appropriate measures to improve organizational performance, the measures MUST be:

Options:

A.

a result of benchmarking and comparative analysis.

B.

accepted by and meaningful to the stakeholders.

C.

based on existing and validated data sources.

D.

approved by the IT steering committee.

Question 109

An independent consultant has been hired to conduct an ad hoc audit of an enterprise’s information security office with results reported to the IT governance committee and the board Which of the following is MOST important to provide to the consultant before the audit begins?

Options:

A.

Acceptance of the audit risks and opportunities

B.

The scope and stakeholders of the audit

C.

The organizational structure of the security office

D.

The policies and framework used by the security office

Question 110

Which of the following BEST indicates that a change management process has been implemented successfully?

Options:

A.

Maturity levels

B.

Degree of control

C.

Process performance

D.

Outcome measures

Question 111

An IT risk committee is trying to mitigate the risk associated with a newly implemented bring your own device (BYOD) policy and supporting mobile device management (MDM) tools. Which of the following would be the BEST way to ensure employees understand how to protect sensitive corporate data on their mobile devices?

Options:

A.

Require staff to complete security awareness training

B.

Develop security procedures for mobile devices.

C.

Distribute the BYOD policy on the company Intranet.

D.

Require staff to review and sign nondisclosure agreements (NDAs)

Question 112

Which of the following has the GREATEST influence on data quality assurance?

Options:

A.

Data stewardship

B.

Data encryption

C.

Data classification

D.

Data modeling

Question 113

Which of the following is the BEST indication that information security requirements are taken into consideration when developing IT processes?

Options:

A.

The database is deployed in a distributed processing platform

B.

The information architecture incorporates data classification

C.

Customer profiles are stored with a domestic service provider

D.

The integrity of sensitive information is periodically reviewed

Question 114

Which of the following is MOST important for an IT strategy committee to ensure before initiating the development of an IT strategic plan?

Options:

A.

Committee members are apprised of business needs

B.

A risk assessment has been conducted.

C.

Committee members are independent from business units.

D.

IT initiatives are fully supported by the business.

Question 115

When developing an IT training plan, which of the following is the BEST way to ensure that resource skills requirements are identified?

Options:

A.

Extract training requirements from deficiencies reported in customer service satisfaction surveys.

B.

Ask managers to determine IT training requirements annually.

C.

Determine training needs based on the capabilities to support the IT strategy.

D.

Survey employees for IT skills requirements based upon technology trends.

Question 116

An enterprise is adopting a new governance framework. Of the following, the MOST effective method to help ensure that key activities are performed by appropriate resources is through the use of:

Options:

A.

a RACI chart.

B.

an organizational breakdown structure.

C.

a work breakdown structure.

Question 117

Which of the following is the BEST indication that enterprise value is being derived from IT?

Options:

A.

IT strategy supports continuous improvement initiatives

B.

Metrics are established for IT performance.

C.

Rate of return for projects is achieved.

D.

IT services enable business strategy.

Question 118

What should be done FIRST when feedback indicates recently implemented software products are not meeting business unit expectations?

Options:

A.

Review help desk logs.

B.

Confirm user acceptance testing (UAT) was completed.

C.

Request a gap analysis.

D.

Institute a new software training program

Question 119

Which of the following roles should approve major IT purchases to help prevent conflicts of interest?

Options:

A.

IT steering committee

B.

Chief information officer (CIO)

C.

Chief compliance officer

D.

Project management office (PMO)

Question 120

To enable IT to deliver adequate services and maintain availability of a web-facing infrastructure, an IT governance committee should FIRST establish:

Options:

A.

web operations procedures.

B.

business continuity plans (BCPs).

C.

key performance indicators (KPIs).

D.

customer survey processes.

Question 121

To minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations which of the following is the BEST action to take?

Options:

A.

Update the information architecture

B.

Revise the IT strategic plan

C.

Implement data loss prevention (DLP)

D.

Establish new IT key risk indicators (KRIs)

Question 122

An enterprise's board of directors has determined that IT is not sufficiently supporting its corporate objectives, and has established a committee to address this problem. Which of the following should be the committees FIRST action?

Options:

A.

Implement a continuous improvement plan.

B.

Specify IT human resource performance measures.

C.

Create an IT strategic plan.

D.

Develop a service level management plan.

Question 123

Business management is seeking assurance from the CIO that controls are in place to help minimize the risk of critical IT systems being unavailable during month-end financial processing. What is the BEST way to address this concern?

Options:

A.

Create a communication plan with risk owners.

B.

Outsource infrastructure hosting.

C.

Restrict and monitor user access.

D.

Develop key risk indicators (KRIs) and action plans.

Question 124

Which of the following should be identified FIRST when determining appropriate IT key risk indicators (KRIs)?

Options:

A.

IT-related risk

B.

IT controls

C.

IT threats

D.

IT objectives

Question 125

The PRIMARY reason for implementing an IT governance program in an enterprise is to

Options:

A.

balance the demand for information and the ability to deliver.

B.

complies with regulatory requirements

C.

reduce risks due to improved compensating controls.

D.

decrease the scale of investment in information systems due to budgetary controls.

Question 126

When assessing the impact of a new regulatory requirement, which of the following should be the FIRST course of action?

Options:

A.

Update affected IT policies.

B.

Assess the budget impact of the new regulation.

C.

Map the regulation to business processes.

D.

Implement new regulatory requirements.

Question 127

Which of the following would be MOST helpful to an enterprise that wants to standardize how sensitive corporate data is handled?

Options:

A.

Information classification framework

B.

Enterprise risk policy

C.

Enterprise risk management (ERM) framework

D.

Information security policy

Question 128

Which of the following is MOST important to consider when planning to implement a cloud-based application for sharing documents with internal and external parties?

Options:

A.

Cloud implementation model

B.

User experience

C.

Information ownership

D.

Third-party access rights

Question 129

Which of the following should be the PRIMARY goal of implementing service level agreements (SLAs) with an outsourcing vendor?

Options:

A.

Gaining a competitive advantage

B.

Establishing penalties for not meeting service levels

C.

Achieving operational objectives

D.

Complying with regulatory requirements

Question 130

An enterprise has identified potential environmental disasters that could occur in the area where its data center is located. Which of the following should be done NEXT?

Options:

A.

Implement an early warning detection and notification system.

B.

Assess the likelihood and impact on the data center.

C.

Relocate the data center to minimize the threat.

D.

Assess how the data center is protected against the threat.

Question 131

The MAIN responsibility of the board of directors regarding the management of enterprise risk is to:

Options:

A.

ensure a risk process exists which addresses the risk appetite.

B.

sustain investment in staff training regarding IT risk.

C.

promote a benefits-driven culture throughout the enterprise.

D.

maintain awareness of IT risk to the business.

Question 132

The FIRST step in aligning resource management to the enterprise's IT strategic plan would be to

Options:

A.

develop a responsible, accountable, consulted and informed (RACI) chart

B.

assign appropriate roles and responsibilities

C.

perform a gap analysis

D.

identify outsourcing opportunities

Question 133

The risk committee is overwhelmed by the number of false positives included in risk reports. What action would BEST address this situation?

Options:

A.

Conduct a risk assessment

B.

Evaluate key risk indicators (KRIs).

C.

Change the reporting format.

D.

Adjust the IT balanced scorecard

Question 134

Which of the following is a responsibility of an IT strategy committee?

Options:

A.

Providing oversight on enterprise strategy implementation

B.

Approving the business strategy and its IT implications

C.

Advising the board on the development of IT goals

D.

Tracking projects in the IT investment portfolio

Question 135

A new chief information officer (CIO) of an enterprise recommends implementing portfolio management after realizing there is no process in place for evaluating investments prior to selection. What should be the PRIMARY strategic goal driving this decision?

Options:

A.

Maximize value from the combined investments.

B.

Standardize processes for investment evaluation.

C.

Align investments to the enterprise architecture (EA).

D.

Enable transparency within the investment process.

Question 136

Which of the following is the GREATEST benefit of using a quantitative risk assessment method?

Options:

A.

It uses resources more efficiently

B.

It can be used to assess risks against non-tangible assets

C.

It reduces subjectivity

D.

It helps in prioritizing risk response action plans

Question 137

The CIO in a large enterprise is seeking assurance that significant IT risk is being proactively monitored and does not exceed agreed risk tolerance levels. The BEST way to provide this ongoing assurance is to require the development of:

Options:

A.

an IT risk appetite statement.

B.

a risk management policy.

C.

key risk indicators (KRIs).

D.

a risk register.

Question 138

The CIO of an enterprise learns the payroll server of a competitor has been the victim of ransomware. To help plan for the possibility of ransomed corporate data, what should be the ClO's FIRST course of action?

Options:

A.

Require development of key risk indicators (KRls).

B.

Develop a policy to address ransomware.

C.

Request a targeted risk assessment.

D.

Back up corporate data to a secure location.

Question 139

An enterprise has had the same IT governance framework in place for several years. Currently, large and small capital projects go through the same architectural governance reviews. Despite repeated requests to streamline the review process for small capital projects, business units have received no response from IT. The business units have recently escalated this issue to the newly appointed GO. Which of the following should be done FIRST to begin addressing business needs?

Options:

A.

Create a central repository for the business to submit requests.

B.

Explain the importance of the IT governance framework.

C.

Assess the impact of the proposed change.

D.

Assign a project team to implement necessary changes.

Question 140

To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?

Options:

A.

IT staff morale

B.

Core IT processes

C.

Outsourcer's reputation

D.

New service level agreements (SLAs)

Question 141

An enterprise decides to accept the IT risk of a subsidiary located in another country even though it exceeds the enterprise's risk appetite. Which of the following would be the BEST justification for this decision?

Options:

A.

Risk framework alignment

B.

Local market common practices

C.

Compliance with local regulations

D.

Technical gaps among subsidiaries

Question 142

Acceptance of an enterprise's newly implemented IT governance initiatives has been resisted by a functional group requesting more autonomy over technology choices. Which of the following is MOST important to accommodate this need for autonomy?

Options:

A.

Continuous improvement processes

B.

Documentation of key management practices

C.

An exception management process

D.

A change control process

Question 143

An enterprise's service center is experiencing long delays in fulfilling! T service requests and very low customer satisfaction. The BEST way to determine if staff competency is the root cause of these performance problems is to compare required staff competencies with:

Options:

A.

certification requirements.

B.

current skills inventory.

C.

training program completions.

D.

hiring and staffing practices.

Question 144

Prior to setting IT objectives, an enterprise MUST have established its:

Options:

A.

architecture.

B.

policies.

C.

strategies.

D.

controls.

Question 145

An enterprise can BEST assess the benefits of a new IT project through its life cycle by:

Options:

A.

calculation of the total cost of ownership.

B.

periodic review of the business case.

C.

periodic measurement of the project slip rate.

D.

calculation of the net present value (NPV).

Question 146

A marketing enterprise is considering procuring customer information to more accurately target customer communications and increase sales. The data has a very high cost to the enterprise. Which of the following would provide the MOST comprehensive view into the potential value to the organization?

Options:

A.

Investment services board review

B.

Net present value {NPV) calculation

C.

Risk assessment results

D.

Cost-benefit analysis results

Question 147

An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?

Options:

A.

Revising the business $ balanced store card

B.

Updating the business risk profile

C.

Changing the IT steering committee charter

D.

Calculating the cost of the current solution

Question 148

Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?

Options:

A.

Poor desktop service delivery

B.

Data retention

C.

Redundant systems

D.

Poor business decisions

Question 149

An enterprise's internal audit group has scheduled a control review of a payroll system project but has been told to wait until the system is implemented. Which of the following is the GREATEST risk associated with the delay?

Options:

A.

delay in the development of new key performance indicators (KPIs)

B.

Continued dependency on compliant legacy systems

C.

Increased cost to mitigate deficiencies

D.

Lack of adherence to industry best practices

Question 150

It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?

Options:

A.

Enterprise architecture (EA)

B.

Enterprise risk framework

C.

IT service management

D.

IT project roadmap

Question 151

Senior management wants to expand offshoring to include IT services as other types of business offshoring have already resulted in significant financial benefits for the enterprise. The CIO is currently midway through a successful five-year strategy that relies heavily on internal IT resources. What should the CIO do NEXT?

Options:

A.

Reevaluate the offshoring strategy.

B.

Abandon the current IT strategy.

C.

Continue with the existing IT strategy.

D.

Reevaluate the current IT strategy.

Question 152

An enterprise considering implementing IT governance should FIRST develop the scope of the IT governance program and:

Options:

A.

initiate the program using an implementation roadmap.

B.

establish initiatives for business and managers.

C.

acquire the resources that will be required.

D.

communicate the program to stakeholders to gain consensus.

Question 153

Which of the following BEST reflects the ethical values adopted by an IT organization?

Options:

A.

IT principles and policies

B.

IT balanced scorecard

C.

IT governance framework

D.

IT goals and objectives

Question 154

An enterprise's board of directors can BEST manage enterprise risk by:

Options:

A.

mandating board-approved enterprise risk management (ERM) modifications.

B.

requiring the establishment of an enterprise risk management (ERM) framework.

C.

requiring the establishment of an enterprise-wide program management office.

D.

ensuring the cost-effectiveness of the internal control system.

Question 155

Which of the following is the BEST way to demonstrate that IT strategy supports a new enterprise strategy?

Options:

A.

Monitor new key risk indicators (KRIs).

B.

Measure return on IT investments against balanced scorecards.

C.

Review and update the portfolio management process.

D.

Map IT programs to business goals.

Question 156

Which of the following is the MOST effective approach to ensure senior management sponsorship of IT risk management?

Options:

A.

Benchmark risk framework against best practices.

B.

Calculate financial impact for each IT risk finding.

C.

Periodically review the IT risk register entries.

D.

Integrate IT risk into enterprise risk management (ERM).

Question 157

A CIO believes that a recent mission-critical IT decision by the board of directors is not in the best financial interest of all stakeholders. Which of the following is the MOST ethical course of action?

Options:

A.

Share concerns with the legal department.

B.

Request a meeting with the board.

C.

Engage an independent cost-benefit analysis.

D.

Request an internal audit review of the board's decision.

Question 158

An IT governance committee wants to ensure there is a clear description of the "data owner" in the enterprise data policy. Which of the following would BEST define the owner of data stored in an external cloud?

Options:

A.

The business leader who is most impacted by the loss of data.

B.

The risk manager who is responsible for protecting data stored in the cloud.

C.

The contract manager who monitors the security of the cloud provider.

D.

The vendor who submits the data to the organization via online forms

Question 159

An enterprise's information security function is making changes to its data retention and backup policies. Which of the following presents the GREATEST risk?

Options:

A.

Business data owners were not consulted.

B.

The new policies Increase the cost of data backups.

C.

Data backups will be hosted at third-party locations.

D.

The retention period for data backups is Increased.

Question 160

IT has launched new portfolio management policies and processes to improve the alignment of IT projects with enterprise goals. The latest audit report indicates that no improvement has been made due to confusion in the decision-making process. Which of the following is the BEST course of action for the CIO?

Options:

A.

Deliver prioritization and facilitation training.

B.

Implement a performance management framework.

C.

Create an IT portfolio management risk framework.

D.

Develop and communicate an accountability matrix.

Question 161

Which of the following should be the MAIN governance focus when implementing a newly approved bring your own device (BYOD) policy?

Options:

A.

Recommending mobile applications that will increase business productivity

B.

Training employees on the enterprise's chosen mobile device management system

C.

Educating employees on the increased IT security risk to the enterprise

D.

Understanding knowledge gaps of IT employees to support different mobile platforms

Question 162

Which of the following MOST effectively prevents an IT system from becoming technologically obsolete before its planned return on investment (ROi)?

Options:

A.

Requesting periodic third-party assessments of the system throughout its life

B.

Obtaining long-term support commitments from the system platform vendors)

C.

Obtaining independent assurance that the system will conform to future business requirements

D.

Ensuring that the system is maintained in compliance with enterprise architecture (EA) standards

Question 163

Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?

Options:

A.

Significant gaps are present m the incident documentation.

B.

The incident was not logged in the ticketing system.

C.

Response decisions were made without consulting the appropriate authority.

D.

Response efforts had to be outsourced due to insufficient internal resources.

Question 164

While monitoring an enterprise's IT projects portfolio, it is discovered that a project is 75% complete, but all budgeted resources have been expended. Which of the following is the MOST important task to perform?

Options:

A.

Review the IT investments.

B.

Reorganize the IT projects portfolio.

C.

Re-evaluate the business case.

D.

Review the IT governance structure.

Question 165

Which of the following BEST lowers costs and improves scalability from an IT enterprise architecture (EA) perspective?

Options:

A.

Cost management

B.

IT strategic sourcing

C.

Standardization

D.

Business agility

Question 166

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

Options:

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Question 167

The MOST important aspect of an IT governance framework to ensure that IT supports repeatable business processes is:

Options:

A.

earned value management.

B.

quality management,

C.

resource management.

D.

risk management

Question 168

Which of the following is the MOST effective means for IT management to report to executive management regarding the value of IT?

Options:

A.

IT process maturity level

B.

Cost-benefit analysis

C.

Resource assessment

D.

Balanced scorecard

Question 169

Which of the following would be of MOST concern regarding the effectiveness of risk management processes?

Options:

A.

Key risk indicators (KRIs) are not established.

B.

Risk management requirements are not included in performance reviews.

C.

The plans and procedures are not updated on an annual basis.

D.

There is no framework to ensure effective reporting of risk events.

Question 170

Which of the following MUST be established before implementing an information architecture that restricts access to data based on sensitivity?

Options:

A.

Risk and control frameworks

B.

Probability and impact analysis

C.

Classification and ownership

D.

Security and privacy policies

Question 171

From a governance perspective, the PRIMARY goal of an IT risk optimization process should be to ensure:

Options:

A.

IT risk thresholds are defined in the enterprise architecture (EA).

B.

the IT risk mitigation strategy is approved by management.

C.

IT risk is mapped to the balanced scorecard.

D.

the impact of IT risk to the enterprise is managed.

Question 172

Of the following, who should approve the criteria for information quality within an enterprise?

Options:

A.

Information architect

B.

Information analyst

C.

Information steward

D.

Information owner

Question 173

Which of the following is the MOST effective way to manage risks within the enterprise?

Options:

A.

Assign individuals responsibilities and accountabilities for management of risks.

B.

Make staff aware of the risks in their area and risk management techniques.

C.

Provide financial resources for risk management systems.

D.

Document procedures and reporting processes.

Question 174

When evaluating benefits realization of IT process performance, the analysis MUST be based on;

Options:

A.

key business objectives.

B.

industry standard key performance indicators (KPIs).

C.

portfolio prioritization criteria.

D.

IT risk policies.

Question 175

A large retail chain realizes that while there has not been any loss of data, IT security has not been a priority and should become a key goal for the enterprise. What should be the FIRST high-level initiative for a newly created IT strategy committee in order to support this business goal?

Options:

A.

Identifying gaps in information asset protection

B.

Defining data archiving and retrieval policies

C.

Recruiting and training qualified IT security staff

D.

Modernizing internal IT security practices

Question 176

The PRIMARY reason for an enterprise to adopt an IT governance framework is to:

Options:

A.

assure IT sustains and extends the enterprise strategies and objectives.

B.

expedite IT investments among other competing business investments.

C.

establish IT initiatives focused on the business strategy.

D.

allow IT to optimize confidentiality, integrity, and availability of information assets.

Question 177

Which of the following should be the MAIN reason for an enterprise to implement an IT risk management framework?

Options:

A.

The need to enable IT risk-aware decisions by executives

B.

The results of an external audit report concerning IT risk management processes.

C.

The need to address market regulations and internal compliance in IT risk

D.

The ability to benchmark IT risk policies against major competitors

Question 178

Which of the following BEST reflects mature risk management in an enterprise?

Options:

A.

A regularly updated risk register

B.

Ongoing risk assessment

C.

Ongoing investment in risk mitigation

D.

Responsive risk awareness culture

Question 179

Which of the following is MOST important to effectively initiate IT-enabled change?

Options:

A.

Establish a change management process.

B.

Obtain top management support and ownership.

C.

Ensure compliance with corporate policy.

D.

Benchmark against best practices.

Question 180

Which of the following components of a policy BEST enables the governance of enterprise IT?

Options:

A.

Disciplinary actions

B.

Regulatory requirements

C.

Roles and responsibilities

D.

Terms and definitions

Question 181

Which of the following would BEST enable business innovation through IT?

Options:

A.

Outsourcing of IT to a strategic business partner

B.

Business participation in IT strategy development

C.

Adoption of a standardized business development life cycle

D.

IT participation in business strategy development

Question 182

An audit report has revealed that data scientists are analyzing sensitive "big data" files using an offsite cloud because corporate servers do not have the necessary processing capabilities. A review of policies indicates this practice is not prohibited. Which of the following should be the FIRST strategic action to address the report?

Options:

A.

Authorize a risk analysis of the practice.

B.

Update data governance practices.

C.

Revise the information security policy.

D.

Recommend the use of a private cloud.

Question 183

Which of the following is the MOST important consideration for data classification to be successfully implemented?

Options:

A.

Users should be provided with clear instructions that are easy to follow and understand.

B.

The data classification tools integrate with other tools that help manage the data.

C.

The classification scheme should be closely aligned with the IT strategic plan.

D.

Senior management should be properly trained in monitoring compliance.

Question 184

A healthcare enterprise that is subject to strict compliance requirements has decided to outsource several key IT services to third-party providers. Which of the following would be the BEST way to assess compliance and avoid reputational damage?

Options:

A.

Require quarterly reports from the providers demonstrating compliance.

B.

Require documentation that the providers have adequate controls in place.

C.

Exercise the right to perform an audit.

D.

Impose monetary penalties for noncompliance.

Question 185

The board of a start-up company has directed the CIO to develop a technology resource acquisition and management policy. Which of the following should be the MOST important consideration during the development of this policy?

Options:

A.

Enterprise growth plans

B.

Industry best practices

C.

Organizational knowledge retention

D.

IT staff competencies

Question 186

Which of the following aspects of the transition from X-rays to digital images would be BEST addressed by implementing information security policy and procedures?

Options:

A.

Establishing data retention procedures

B.

Training technicians on acceptable use policy

C.

Minimizing the impact of hospital operation disruptions on patient care

D.

Protecting personal health information

Question 187

The MOST successful IT performance metrics are those that:

Options:

A.

measure financial results.

B.

measure all areas.

C.

are approved by the stakeholders.

D.

contain objective measures.

Question 188

The CIO of a financial services company is tasked with ensuring IT processes are in compliance with recently instituted regulatory changes. The FIRST course of action should be to:

Options:

A.

align IT project portfolio with regulatory requirements.

B.

create an IT balanced scorecard.

C.

identify the penalties for noncompliance.

D.

perform a current state assessment.

Question 189

A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?

Options:

A.

Mitigate and track data-related issues and risks.

B.

Modify legal and regulatory data requirements.

C.

Define data protection and privacy practices.

D.

Assess the information governance framework.

Question 190

Which of the following groups should approve the implementation of new technology?

Options:

A.

IT steering committee

B.

IT audit department

C.

Portfolio management office

D.

Program management office

Question 191

An IT audit report indicates that a lack of IT employee risk awareness is creating serious security issues in application design and configuration. Which of the following would be the BEST key risk indicator (KRI) to show progress in IT employee behavior?

Options:

A.

Number of IT employees attending security training sessions

B.

Results of application security testing

C.

Number of reported security incidents

D.

Results of application security awareness training quizzes

Question 192

A global financial institution has decided to integrate data from branch locations into a common database to address regulatory reporting requirements. Analysis of data flows and the full data life cycle should be conducted at which level?

Options:

A.

Transaction level

B.

Enterprise level

C.

Branch level

D.

Department level

Question 193

A global enterprise is experiencing an economic downturn and is rapidly losing market share. IT senior management is reassessing the core activities of the business, including IT, and the associated resource implications. Management has decided to focus on its local market and to close international operations. A critical issue from a resource management perspective is to retain the most capable staff. This is BEST achieved by:

Options:

A.

reviewing current goals-based performance appraisals across the enterprise.

B.

ranking employees across the enterprise based on their compensation.

C.

ranking employees across the enterprise based on length of service.

D.

retaining capable staff exclusively from the local market.

Question 194

The BEST way to manage continuous improvement of governance-related processes is to:

Options:

A.

assess existing process resource capacities.

B.

define accountability based on roles and responsibilities.

C.

apply effective quality management practices.

D.

require third-party independent reviews.

Question 195

The use of new technology in an enterprise will require specific expertise and updated system development processes. There is concern that IT is not properly sourced. Which of the following should be the FIRST course of action?

Options:

A.

Perform a risk assessment on potential outsourcing.

B.

Update the enterprise architecture (EA) with the new technology.

C.

Review the IT balanced scorecard for sourcing opportunities.

D.

Assess the gap between current and required staff competencies.

Question 196

An enterprise learns that a new privacy regulation was recently published to protect customers in the event of a breach involving personally identifiable information (Pll). The IT risk management team's FIRST course of action should be to:

Options:

A.

evaluate the risk appetite for the new regulation.

B.

define the risk tolerance for the new regulation.

C.

determine if the new regulation introduces new risk.

D.

assign a risk owner for the new regulation.

Question 197

Which of the following is an ADVANTAGE of using strategy mapping?

Options:

A.

It provides effective indicators of productivity and growth.

B.

It depicts the maturity levels of processes that support organizational strategy.

C.

It identifies barriers to strategic alignment and links them to specific outcomes.

D.

It depicts the cause-and-effect linked relationships between strategic objectives.

Question 198

The PRIMARY benefit of integrating IT resource planning into enterprise strategic planning is that it enables the enterprise to:

Options:

A.

allocate resources efficiently to achieve desired goals.

B.

adjust business goals depending upon resource availability.

C.

prioritize resource allocation based on sourcing strategy.

D.

develop tactical plans to achieve resource optimization.

Question 199

An IT strategy committee wants to ensure that a risk program is successfully implemented throughout the enterprise. Which of the following would BEST support this goal?

Options:

A.

A risk management framework

B.

Mandatory risk awareness courses for staff

C.

A risk recognition and reporting policy

D.

Commitment from senior management

Question 200

A chief technology officer (CTO) wants to ensure IT governance practices adequately address risk management specific to mobile applications. To create the appropriate risk policies for IT, it is MOST important for the CTO to:

Options:

A.

understand the enterprise's risk tolerance.

B.

create an IT risk scorecard.

C.

map the business goals to IT risk processes.

D.

identify the mobile technical requirements.

Question 201

Which of the following responsibilities should be retained within an enterprise when outsourcing a project management office (PMO) function?

Options:

A.

Selecting projects

B.

Managing projects

C.

Tracking project cost

D.

Defining project methodology

Question 202

Which of the following would BEST help to improve an enterprise's ability to manage large IT investment projects?

Options:

A.

Creating a change management board

B.

Reviewing and evaluating existing business cases

C.

Implementing a review and approval process for each phase

D.

Publishing the IT approval process online for wider scrutiny

Question 203

Results of an enterprise's customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise's mobile applications are considered inferior compared to legacy browser-based applications. Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?

Options:

A.

Establish service level agreements (SLAs) with the development team.

B.

Identify key risks and mitigation strategies for mobile applications.

C.

Implement key performance indicators (KPIs) that include application quality.

D.

Identify business requirements concerning mobile applications.

Question 204

Establishing a uniform definition for likelihood and impact through risk management standards PRIMARILY addresses which of the following concerns?

Options:

A.

Inconsistent categories of vulnerabilities

B.

Conflicting interpretations of risk levels

C.

Inconsistent data classification

D.

Lack of strategic IT alignment

Page: 1 / 68
Total 682 questions