Certified in the Governance of Enterprise IT Exam Questions and Answers
Which of the following is a CIO's BEST approach to ensure IT executes against an approved strategy?
Options:
Ask project management to define the IT activities for accomplishing the strategy.
Request IT senior leaders to collectively plan tactics for execution
Have IT leaders independently develop goals for their teams.
Provide specific direction for execution of the tasks across IT.
Answer:
BExplanation:
The best approach for a CIO to ensure IT executes against an approved strategy is to request IT senior leaders to collectively plan tactics for execution. This collaborative approach leverages the expertise and insights of senior IT leaders to develop a cohesive and aligned plan that supports the strategic objectives. Collective planning fosters ownership and commitment among leaders, ensuring that execution tactics are well-coordinated and aligned with the overall IT strategy. While asking project management to define activities, having leaders independently develop team goals, and providing specific task direction are important, the collective planning by IT senior leaders ensures a strategic and unified approach to execution.
Which of the following would BEST help to prevent an IT system from becoming obsolete before its planned return on investment (ROI)?
Options:
Obtaining independent assurance that the IT system conforms to business requirements
Defining IT and business goals to ensure value delivery as required
Managing the benefit realization through the entire life cycle
Ordering an external audit for the IT system early in the roll out
Answer:
CExplanation:
To prevent an IT system from becoming obsolete before achieving its planned return on investment (ROI), it is crucial to manage the benefit realization throughout the entire lifecycle of the system. This approach involves continuously monitoring and adjusting the system to ensure it delivers the expected value and benefits from inception through decommissioning. This proactive management helps in adapting to changes in technology and business environments, thus extending the relevance and utility of the IT system. Obtaining independent assurance,defining IT and business goals, and ordering an external audit are important practices but do not directly address the ongoing management of the system's value delivery and adaptability over time.
An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?
Options:
Ensure IT has knowledgeable representation and is included in the strategic planning process.
Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.
Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).
Outsource both IT operations and IT development and implement controls based on a standardized framework.
Answer:
AExplanation:
This is because IT is a key enabler and driver of business strategy, and it needs to understand and align with the strategic vision, goals, and priorities of the enterprise1. By ensuring IT has knowledgeable representation and is included in the strategic planning process, the enterprise can:
Leverage IT’s expertise and insights to identify and evaluate the opportunities and challenges of the strategy change1
Ensure IT’s readiness and capability to support and execute the strategy change1
Avoid any gaps or misalignments between IT and business expectations and requirements1
Foster a collaborative and supportive relationship between IT and business stakeholders1
B. Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change. This is not the first step to prepare for the change in the enterprise’s board of directors’ strategy, as it may be premature or unnecessary to do so without a clear understanding and agreement of the scope, impact, and implications of the strategy change. Increasing the IT budget and staff level may also create inefficiencies or wastages if they are not aligned with the actual needs and priorities of the strategy change2.
C. Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs). This is not the first step to prepare for the change in the enterprise’s board of directors’ strategy, as it may not be relevant or effective to do so without a clear definition and communication of the strategy change. Initiating an IT service awareness campaign and implementing SLAs are more related to the delivery and management of IT services, rather than the planning and alignment of IT strategy3.
D. Outsource both IT operations and IT development and implement controls based on a standardized framework. This is not the first step to prepare for the change in the enterprise’s board of directors’ strategy, as it may introduce new risks and challenges for IT governance, such as loss of control, dependency, compatibility, security, compliance, and cost issues4. Outsourcing both IT operations and development may also reduce the involvement and ownership of IT in the strategic planning process, which could affect its alignment and responsiveness to the strategy change4. Outsourcing should be carefully considered and evaluated based on the specific needs and circumstances of the enterprise, and should be complemented by a robust governance and management framework4.
An enterprise's IT department has failed to deliver required solutions on time due to insufficient resource allocation, resulting in a longer time to market. Which of the following is the BEST way for the chief information officer (CIO) to address this situation?
Options:
Implement a new IT change management procedure.
Evaluate the availability and capacity planning process.
Benchmark IT staffing levels against similar organizations in the industry.
Direct the project management office (PMO) to review and prioritize IT projects.
Answer:
BExplanation:
The issue described in the question is the failure to deliver IT solutions on time due to insufficient resource allocation, which points to a problem in resource management, specifically in capacity and availability planning. According to the CGEIT Review Manual 8th Edition, effective IT resource management involves ensuring that IT resources (human, technological, and financial) are allocated efficiently to meet enterprise objectives. The manual emphasizes the importance of capacity planning to align resource availability with project demands, which directly addresses delays caused by resource shortages.
Extract from CGEIT Review Manual 8th Edition (Domain 2: IT Resources):"Capacity planning ensures that IT resources are sufficient to meet current and future business requirements in a cost-effective manner. It involves assessing the availability of resources, forecasting demand, and aligning resource allocation with strategic priorities to avoid bottlenecks and delays in delivery." (Approximate reference: Domain 2, Section on Resource Management)
Evaluating the availability and capacity planning process (option B) is the most direct approach to identifying and resolving resource allocation issues. This process involves reviewing current resource utilization, forecasting future needs, and ensuring that resources are allocated to high-priority projects to reduce time-to-market delays.
Why not the other options?
A. Implement a new IT change management procedure: Change management procedures focus on controlling changes to IT systems and services, not on addressing resource allocation or capacity issues. This option is unrelated to the root cause of the problem.
C. Benchmark IT staffing levels against similar organizations: While benchmarking can provide insights into staffing adequacy, it is a secondary step that does not directly address the immediate issue of resource allocation and capacity planning. It may be useful later but is not the first step.
D. Direct the PMO to review and prioritize IT projects: While project prioritization is important, it does not address the underlying issue of insufficient resource allocation. Prioritization may help focus efforts, but without adequate resources, delays will persist.
Which of the following situations provides the BEST justification for considering the adoption of a qualitative risk assessment method?
Options:
Determining a quantitative risk score would require complex calculations
It is cost prohibitive to obtain relevant historical quantitative data
There are fewer information assets in the risk register
A higher risk tolerance level has been defined by enterprise leadership
Answer:
BExplanation:
Qualitative risk assessmentis most appropriate when reliable quantitative data is unavailable or too costly to gather. In such cases, qualitative methods (like risk matrices or expert judgment) provide valuable input based on impact and likelihood without requiring precise numerical data.
This approach is especially useful in new or evolving domains (e.g., cybersecurity or AI) where historical data may be lacking.
Which of the following will BEST enable an enterprise to convey IT governance direction and objectives?
Options:
Skills and competencies
Principles and policies
Corporate culture
Business processes
Answer:
BExplanation:
Principles and policies are the best way to convey IT governance direction and objectives, as they provide a clear and consistent framework for decision making, behavior, and actions in the organization. Principles are the fundamental statements that guide the IT governance process and reflect the values and beliefs of the organization. Policies are the specific rules and procedures that implement the principles and ensure compliance with the IT governance objectives12.
Skills and competencies are the abilities and knowledge that enable the IT staff to perform their roles and responsibilities effectively. They are important for achieving IT governance objectives, but they do not convey them directly. Skills and competencies are developed through training, education, and experience3.
Corporate culture is the shared set of norms, beliefs, and values that influence the behavior and attitudes of the organization’s members. Corporate culture can support or hinder IT governance, depending on how well it aligns with the IT governance objectives. Corporate culture is influenced by leadership, communication, and incentives4.
Business processes are the activities and tasks that deliver value to the organization’s customers and stakeholders. Business processes are aligned with the IT governance objectives to ensure efficiency, effectiveness, and quality. Business processes are designed, executed, monitored, and improved using various methods and tools5.
Which of the following should be done FIRST when developing an IT strategy to support a new AI business strategy?
Options:
Assess current AI capabilities and infrastructure
Establish guidelines and policies for responsible use of AI
Create use cases to understand the impact of AI
Build a team of AI professionals
Answer:
AExplanation:
Before any strategic direction can be set for AI initiatives,assessing the current AI capabilities and infrastructureis essential. This foundational step provides a baseline of where the organization currently stands, what assets or skills it possesses, and what gaps may exist.
Subsequent actions, such as developing use cases, forming teams, or crafting policies, rely heavily on this understanding. Without a proper assessment, strategic decisions may be misaligned with the organization’s actual readiness or capabilities.
Which of the following is the BEST way for a CIO to ensure that the work of IT employees is aligned with approved IT directives?
Options:
Mandate technical training related to the IT objectives.
Have business leaders present their departments' objectives.
Include relevant IT goals in individual performance objectives.
Request a progress review of IT objectives by internal audit.
Answer:
CExplanation:
The best way for a CIO to ensure that the work of IT employees is aligned with approved IT directives is to include relevant IT goals in individual performance objectives. This means that the CIO should communicate the IT vision, mission, strategy and objectives to the IT staff and link them to their personal and professional development plans. By doing so, the CIO can motivate the IT employees to work toward the desired outcomes, monitor their progress and performance, provide feedback and recognition, and address any issues or gaps. Including relevant IT goals in individual performance objectives can also help to align the IT employees with the business needs and expectations, foster a culture of accountability and collaboration, and improve the quality and value of IT services12. References := How to Align Employee Performance With Organizational Goals, The Importance And Challenges Of Employee Alignment
An enterprise’s IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:
Options:
Business to help define IT goals.
IT and business to define risks.
Business to fund IT services.
IT to define business objectives.
Answer:
AExplanation:
Misalignment between IT and business stems from a lack of collaboration in setting goals. The CGEIT Review Manual 8th Edition emphasizes that business involvement in defining IT goals is the best way to ensure alignment, as it ensures IT supports business priorities.
Extract from CGEIT Review Manual 8th Edition (Domain 4: Strategic Management):"To achieve alignment between IT and business, the business must actively participate in defining IT goals to ensure that IT initiatives support enterprise objectives. This collaborative approach bridges the gap between IT operations and business needs." (Approximate reference: Domain 4, Section on Business-IT Alignment)
Requiring the business to help define IT goals (option A) fosters collaboration and ensures that IT priorities reflect business needs, addressing the misalignment.
Why not the other options?
B. IT and business to define risks: Risk definition is important but does not directly address goal alignment.
C. Business to fund IT services: Funding is a resource issue, not a solution to strategic misalignment.
D. IT to define business objectives: IT defining business objectives reverses the proper alignment, as business objectives should drive IT.
An enterprise will be adopting wearable technology to improve business performance. Which of the following is the BEST way for the CIO to validate IT’s preparedness for this initiative?
Options:
Request an enterprise architecture (EA) review.
Perform a baseline business value assessment.
Request reprioritization of the IT portfolio.
Identify the penalties for noncompliance.
Answer:
AExplanation:
Adopting wearable technology requires ensuring that IT’s infrastructure, processes, and standards can support the new initiative. The CGEIT Review Manual 8th Edition highlights that an enterprise architecture (EA) review is the best method to validate IT’s preparedness, as it assesses the alignment of IT capabilities with the requirements of new technologies.
Extract from CGEIT Review Manual 8th Edition (Domain 4: Strategic Management):"To validate IT’s preparedness for adopting new technologies, the CIO should request an enterprise architecture review. The EA review assesses whether current IT infrastructure, applications, and processes can support the technology initiative, identifying gaps and necessary adjustments." (Approximate reference: Domain 4, Section on Enterprise Architecture and Technology Adoption)
Requesting an enterprise architecture review (option A) ensures that the CIO evaluates IT’s technical and operational readiness for wearable technology, including compatibility with existing systems, scalability, and security requirements.
Why not the other options?
B. Perform a baseline business value assessment: A value assessment focuses on benefits, not IT’s technical preparedness, which is the primary concern here.
C. Request reprioritization of the IT portfolio: Portfolio reprioritization addresses resource allocation, not the technical readiness of IT systems.
D. Identify the penalties for noncompliance: Penalties are a risk management concern, not a direct method to validate IT preparedness.
Which of the following is the BEST way for a CIO to ensure that IT-related training is taken seriously by the IT management team and direct employees?
Options:
Develop training programs based on results of an IT staff survey of preferences.
Embed training metrics into the annual performance appraisal process.
Promote IT-specific training awareness program.
Research and identify training needs based on industry trends.
Answer:
BExplanation:
This is because training metrics are measurable values that indicate the effectiveness and impact of the training programs on the IT staff’s knowledge, skills, and performance1. By embedding training metrics into the annual performance appraisal process, the CIO can:
Communicate the importance and value of IT-related training to the IT management team and direct employees2
Motivate and incentivize the IT management team and direct employees to participate in and complete the IT-related training2
Monitor and evaluate the IT management team and direct employees’ progress, achievement, and improvement in the IT-related training2
Provide feedback and recognition to the IT management team and direct employees who excel in the IT-related training2
Identify and address any gaps or issues in the IT-related training or its outcomes2
Embedding training metrics into the annual performance appraisal process can help to create a culture of learning, development, and accountability for IT-related training within the organization. It can also help to align the individual goals of the IT management team and direct employees with the organizational goals of IT governance.
The other options, developing training programs based on results of an IT staff survey of preferences, promoting IT-specific training awareness program, and researching and identifying training needs based on industry trends are not as effective as embedding training metrics into the annual performance appraisal process for ensuring that IT-related training is taken seriously by the IT management team and direct employees. They are more related to the design and delivery of the IT-related training, rather than its integration and evaluation. They may also not have a significant impact on the behavior and attitude of the IT management team and direct employees towards IT-related training, as they may not provide sufficient motivation, feedback, or recognition for participation or completion.
Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?
Options:
Periodic analyses of logs and databases for unusual activity
A review of the information security and risk management frameworks
The creation of a comprehensive data management and storage policy
The implementation of an intrusion detection and reporting process
Answer:
DExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Risk Optimization domain, addresses the need for proactive detection and response to security incidents to minimize risks. The undetected breach attempt highlights a gap in real-time monitoring and alerting.
Option D: The implementation of an intrusion detection and reporting process is the most important. An intrusion detection system (IDS) monitors network and system activities for unauthorized access, generating alerts for immediate response. This would have ensured the breach attempt was detected and reported in real-time, preventing potential data loss. The manual likely references COBIT 2019’s DSS05-Managed Security Services, which emphasizes intrusion detection as a critical security control.
Option A: Periodic analyses of logs and databases is reactive and may not detect breaches in time, unlike real-time IDS.
Option B: A review of security and risk frameworks is broad and long-term, not addressing the immediate detection gap.
Option C: A comprehensive data management policy focuses on data governance, not real-time breach detection.
Double Verification: The answer aligns with COBIT’s DSS05 and the CGEIT domain’s focus on security incident detection. Intrusion detection is a standard ISACA recommendation for preventing undetected breaches.
ISACA CGEIT Review Manual 8th Edition, Domain 4: Risk Optimization (focus on security incident detection).
COBIT 2019, DSS05-Managed Security Services.
ISACA Glossary (for definitions of intrusion detection), available at
Which of the following provides an enterprise with the BEST understanding of the value proposition for employing a new cloud service?
Options:
Key risk indicators (KRIs).
Service level agreements (SLAs).
Return on investment (ROI).
Customer satisfaction surveys.
Answer:
CExplanation:
The value proposition of a new cloud service is best understood through a financial metric like return on investment (ROI), which quantifies the benefits relative to costs. The CGEIT Review Manual 8th Edition highlights ROI as a key tool for evaluating the value of IT investments.
Extract from CGEIT Review Manual 8th Edition (Domain 5: Benefits Realization):"Return on investment (ROI) is a critical metric for understanding the value proposition of IT initiatives, such as adopting a new cloud service. ROI compares the financial benefits of the initiative to its costs, providing a clear measure of value delivered." (Approximate reference: Domain 5, Section on Value Measurement)
Return on investment (option C) provides a comprehensive view of the cloud service’s financial benefits, operational improvements, and strategic value, making it the best tool for understanding the value proposition.
Why not the other options?
A. Key risk indicators (KRIs): KRIs focus on risk exposure, not value delivery.
B. Service level agreements (SLAs): SLAs define performance expectations but do not quantify overall value.
D. Customer satisfaction surveys: Surveys measure user experience, not the full financial or strategic value.
An organization requires updates to their IT infrastructure to meet business needs. Which of the following will provide the MOST useful information when planning for the necessary IT investments?
Options:
Enterprise architecture (EA)
Risk assessment report
Business user satisfaction metrics
Audit findings
Answer:
AExplanation:
This is because enterprise architecture (EA) is a practice that helps organizations align their IT systems and processes with their business objectives. EA provides a holistic and integrated viewof the current and future state of the organization’s IT infrastructure, as well as the gaps, issues, and opportunities for improvement1. By using EA, the organization can:
Identify and prioritize the IT investments that support the business strategy, goals, and needs1
Optimize the IT spending and maximize the IT value1
Ensure the IT quality, security, and compliance1
Avoid IT duplication, waste, and inefficiency1
Define IT roles and responsibilities and assign accountability1
EA can help the organization plan for the necessary IT investments in a systematic and structured way, and ensure that they are aligned with the business vision and value.
The other options, risk assessment report, business user satisfaction metrics, and audit findings are not as useful as enterprise architecture (EA) for planning for the necessary IT investments. They are more related to the evaluation and monitoring of the IT performance, rather than the planning and alignment of the IT strategy. They may also provide limited or partial information about the IT infrastructure, rather than a comprehensive and integrated view. They may also depend on external factors or standards that may not be relevant or applicable to the organization’s specific context and needs.
An enterprise has launched a digitization effort requiring a single view of customer information across all product lines. Which of the following should be done FIRST to enable this initiative?
Options:
Develop funding estimates for integrating applications
Modify the future state enterprise architecture (EA)
Assess the current data standards that are in use for applications
Audit the infrastructure architecture for integration points
Answer:
CExplanation:
The foundational step in achieving a single customer view is toassess the current data standardsused across applications. Without understanding data definitions, structures, and inconsistencies, any integration or architectural modification would be premature and potentially misaligned.
Future-state planning and funding depend on a clear grasp of the current data landscape and challenges.
Which of the following BEST enables informed IT investment decisions?
Options:
Business case
Technology roadmap
Program plan
Risk classification
Answer:
AExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Benefits Realization domain, emphasizes the importance of structured decision-making for IT investments to ensure they deliver value. A business case provides a comprehensive justification for an investment, including objectives, costs, benefits, risks, and alignment with business goals. It enables stakeholders to make informed decisions by presenting a clear rationale and expected outcomes. For example, a business case for a new CRM system would detail projected revenue increases and implementation costs. The manual likely references COBIT 2019’s APO05-Managed Portfolio, which highlights the business case as a critical tool for investment evaluation.
Option B: Technology roadmap outlines future technology plans but lacks the detailed financial and benefit analysis needed for investment decisions.
Option C: Program plan focuses on execution details, not the justification for investment.
Option D: Risk classification addresses risk but doesn’t encompass the full scope of benefits and costs.
Double Verification: The answer aligns with COBIT’s APO05 and the CGEIT domain’s focus on value-driven investment decisions. The business case is a standard ISACA tool for informed decision-making.
ISACA CGEIT Review Manual 8th Edition, Domain 3: Benefits Realization (focus on investment decision-making).
COBIT 2019, APO05-Managed Portfolio.
ISACA Glossary (for definitions of business case), available at
An enterprise is required to implement several regulatory requirements. Which of the following functions is BEST suited to determine compliance priorities?
Options:
Legal counsel
The IT risk department
The audit department
Business units
Answer:
AExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Governance of Enterprise IT domain, addresses compliance with regulatory requirements as a key governance responsibility. Determining compliance priorities involves understanding legal obligations, assessing their impact, and aligning them with business objectives.
Option A: Legal counsel is best suited to determine compliance priorities. Legal counsel has the expertise to interpret regulatory requirements, assess their applicability, and prioritize them based on legal risks, penalties, and business impact. For example, they can identify which regulations (e.g., GDPR, HIPAA) pose the greatest risk of fines or reputational damage and recommend prioritization. The manual likely references COBIT 2019’s MEA01-Monitor, Evaluate, and Assess Performance and Conformance, which includes legal compliance as a governance responsibility.
Option B: The IT risk department focuses on IT-specific risks, not broader regulatory compliance, and lacks legal expertise.
Option C: The audit department evaluates compliance post-implementation but isn’t responsible for prioritizing regulatory requirements.
Option D: Business units are stakeholders but lack the legal knowledge to prioritize regulations effectively.
Double Verification: The answer aligns with COBIT’s governance processes and the CGEIT domain’s emphasis on compliance management. Legal counsel’s role in regulatory interpretation is a standard practice in ISACA’s frameworks.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on compliance management).
COBIT 2019, MEA01-Monitor, Evaluate, and Assess Performance and Conformance.
ISACA Glossary (for definitions of compliance), available at
Which of the following BEST supports an IT strategy committee’s objective to align employee competencies with planned initiatives?
Options:
Set management goals to hire cooperative work experience students.
Specify minimum training hours required for continuing professional education.
Require balanced scorecard concepts training of all employees.
Add achievement of competencies to employee performance goals.
Answer:
DExplanation:
Adding the achievement of specific competencies to employee performance goals best supports an IT strategy committee's objective to align employee competencies with planned initiatives. This approach directly links employee development and performance evaluation to theacquisition of skills and knowledge required for the organization's strategic initiatives. By embedding competency development into performance goals, employees are incentivized to acquire the necessary skills, ensuring that the workforce is capable of supporting and executing strategic plans. While hiring students, specifying training hours, and requiring balanced scorecard training can contribute to skill development, integrating competency achievement into performance goals ensures a direct and measurable alignment with strategic needs.
An IT governance committee is defining a risk management policy for a portfolio of IT-enabled investments. Which of the following should be the PRIMARY consideration when developing the policy?
Options:
Risk appetite of the enterprise.
Possible investment failures.
Risk management framework.
Value obtained with minimum risk.
Answer:
AExplanation:
The risk management policy for IT-enabled investments must reflect the enterprise’s risk appetite, which defines the level of risk the organization is willing to accept. The CGEIT Review Manual 8th Edition highlights that the risk appetite is the primary consideration in developing risk management policies, as it guides decision-making and resource allocation.
Extract from CGEIT Review Manual 8th Edition (Domain 3: Risk Optimization):"The enterprise’s risk appetite is the primary consideration when developing a risk management policy. It defines the acceptable level of risk for IT-enabled investments and ensures that risk management practices align with the enterprise’s strategic objectives and tolerance for uncertainty." (Approximate reference: Domain 3, Section on Risk Management Policy)
The risk appetite of the enterprise (option A) provides the foundation for determining how much risk is acceptable, which investments to pursue, and how to prioritize risk mitigation efforts.
Why not the other options?
B. Possible investment failures: While investment failures are a concern, they are a specific risk scenario, not the primary consideration for the policy, which should focus on the broader risk appetite.
C. Risk management framework: The framework is a tool to implement the policy, not the primary consideration for its development.
D. Value obtained with minimum risk: While value optimization is a goal, the policy must first be grounded in the enterprise’s risk appetite to balance risk and reward.
New legislation requires an enterprise to report cybersecurity incidents to a government agency within a defined timeline. Which of the following should be the FIRST course of action?
Options:
Establish an incident reporting system and hotline.
Require automation of incident reporting to agencies.
Establish a cybersecurity incident manager role.
Understand requirements and definitions for reportable incidents.
Answer:
DExplanation:
New legislation introduces compliance requirements that must be clearly understood before taking action. The CGEIT Review Manual 8th Edition emphasizes that the first step in addressing regulatory changes is to thoroughly understand the requirements, including definitions, scope, and timelines, to ensure compliance and avoid penalties.
Extract from CGEIT Review Manual 8th Edition (Domain 3: Risk Optimization):"When new regulations are introduced, the first step is to understand the specific requirements, including what constitutes a reportable incident, the timeline for reporting, and the format required. This ensures that subsequent actions are aligned with regulatory expectations." (Approximate reference: Domain 3, Section on Regulatory Compliance)
Understanding the requirements and definitions for reportable incidents (option D) is critical to ensure that the enterprise knows what incidents must be reported, within what timeframe, and in what manner. This step informs the design of systems, roles, or processes to meet the legislation’s demands.
Why not the other options?
A. Establish an incident reporting system and hotline: A reporting system is a subsequent step that depends on understanding what incidents need to be reported.
B. Require automation of incident reporting to agencies: Automation is premature without knowing the specific reporting requirements and formats.
C. Establish a cybersecurity incident manager role: While a dedicated role may be needed, it is not the first step, as the role’s responsibilities depend on the regulatory requirements.
An enterprise plans to migrate its applications and data to an external cloud environment. Which of the following should be the ClO's PRIMARY focus before the migration?
Options:
Reviewing the information governance framework
Selecting best-of-breed cloud offerings
Updates the enterprise architecture (EA) repository
Conducting IT staff training to manage cloud workloads
Answer:
AExplanation:
Reviewing the information governance framework should be the CIO’s primary focus before the migration, because it will help the CIO to ensure that the enterprise’s data and applications are secure, compliant, and aligned with the business objectives and policies in the cloud environment. The information governance framework defines the roles, responsibilities, processes, standards, and metrics for managing information assets across the enterprise. It also covers aspects such as data classification, data quality, data protection, data retention, data sovereignty, and data privacy. By reviewing the information governance framework, the CIO can identify the requirements, risks, and gaps that need to be addressed before moving to the cloud. The other options are not as important as reviewing the information governance framework, because they are either dependent on or secondary to it. Selecting best-of-breed cloud offerings is a tactical decision that should be based on the information governance framework and the enterprise architecture. Updating the enterprise architecture repository is a good practice, but not a primary focus before the migration. It can be done after the migration to reflect the changes in the IT landscape. Conducting IT staff training to manage cloud workloads is a necessary step, but not a primary focus before the migration. It can be done in parallel with or after the migration to ensure that the IT staff have the skills and knowledge to operate and optimize the cloud environment. References := Migration environment planning checklist, Practical Guide to Cloud Governance, Governance or compliance strategy
When an enterprise plans to deploy mobile device technologies, it is MOST important for leadership to ensure that:
Options:
Users agree to an acceptable use policy
Appropriate controls are implemented
The IT policy addresses mobile devices
The project management office (PMO) is engaged
Answer:
BExplanation:
Implementing appropriate controlsis the most critical leadership responsibility when deploying mobile technologies. Controls cover access, encryption, monitoring, and loss prevention—addressing core risks such as data leakage and unauthorized access.
Acceptable use and policy alignment are necessary, butcontrols ensure security and compliance in practice.
When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?
Options:
Standardization
Replication
Segregation
Sanitization
Answer:
AExplanation:
Standardization is the process of establishing and applying common rules, formats, definitions, and methods for data collection, storage, processing, and exchange. Standardization is critical for enabling data interoperability, which is the ability of data to be shared and used across different systems, platforms, applications, and organizations. Standardization can help improve data interoperability by:
Enhancing the quality, consistency, and accuracy of data
Reducing the complexity and ambiguity of data
Increasing the compatibility and comparability of data
Facilitating the integration and analysis of data
Promoting the reuse and sharing of data
A regulator has expressed concerns about the timeliness of information reported from an enterprise. Which of the following should be done FIRST to address this issue?
Options:
Assess the reporting delivery process.
Negotiate an exception process with the regulator.
Automate the reporting process.
Evaluate the implications of risk acceptance.
Answer:
AExplanation:
Concerns about the timeliness of reporting indicate a potential issue in the reporting process that must be investigated. The CGEIT Review Manual 8th Edition advises that the first step in addressing process-related issues is to assess the current process to identify bottlenecks, inefficiencies, or gaps.
Extract from CGEIT Review Manual 8th Edition (Domain 3: Risk Optimization):"When issues are raised regarding compliance or reporting, the first step is to assess the existing processes to identify root causes of deficiencies, such as delays or inaccuracies. This assessment provides the basis for designing improvements or corrective actions." (Approximate reference: Domain 3, Section on Compliance and Process Assessment)
Assessing the reporting delivery process (option A) allows the enterprise to pinpoint why reports are delayed, whether due to manual processes, data availability, or other factors, enabling targeted improvements.
Why not the other options?
B. Negotiate an exception process with the regulator: Negotiation is a reactive measure that does not address the root cause of untimely reporting.
C. Automate the reporting process: Automation may be a solution, but it is premature without understanding the current process’s deficiencies.
D. Evaluate the implications of risk acceptance: Risk acceptance is a last resort and does not address the regulator’s concern about timeliness.
Which of the following should be done FIRST when preparing to migrate patient records to a cloud service provider?
Options:
Review the current data governance policy.
Update the enterprise architecture (EA).
Revise the risk management framework.
Define the service level agreement (SLA).
Answer:
AExplanation:
Migrating patient records to a cloud provider involves sensitive data, making data governance a critical first step to ensure compliance and security. The CGEIT Review Manual 8th Edition emphasizes that reviewing the data governance policy is the first action to align migration with data protection and regulatory requirements.
Extract from CGEIT Review Manual 8th Edition (Domain 3: Risk Optimization):"When migrating sensitive data, such as patient records, to a cloud environment, the first step is to review the current data governance policy to ensure that data classification, security, and compliance requirements are addressed. This informs subsequent actions, such as SLAs and risk management." (Approximate reference: Domain 3, Section on Data Governance and Cloud Migration)
Reviewing the current data governance policy (option A) ensures that the migration adheres to policies on data privacy, security, and regulatory compliance, particularly for sensitive patient records.
Why not the other options?
B. Update the enterprise architecture (EA): EA updates may be needed but follow governance review to ensure alignment with data policies.
C. Revise the risk management framework: Risk framework revision is premature without understanding governance requirements.
D. Define the service level agreement (SLA): SLAs are defined after governance and risk considerations are addressed.
Which of the following should be the MOST important consideration when establishing key performance indicators (KPIs) for IT initiatives?
Options:
An owner can be assigned
Processes can be optimized
Data collection can be automated
Quality has been evaluated
Answer:
DExplanation:
The quality of KPIs is the most important consideration. KPIs must be relevant, accurate, aligned with objectives, and capable of driving meaningful decision-making. Without quality evaluation, even automated or well-owned KPIs may mislead or fail to reflect performance accurately.
Assignment and automation enhance implementation, but they do not ensure the KPI's value or appropriateness for measuring success.
When an enterprise outsources to a third-party data center, who is accountable for the governance of data retention controls for the data that has been transferred?
Options:
The enterprise's internal audit team
The third party's data steward
The third party's control operators
The enterprise's data owner
Answer:
DExplanation:
The enterprise’s data owner retains accountabilityfor the governance of data retention, even when the data is transferred to a third party. Outsourcing does not eliminate governance responsibilities; the data owner must ensure compliance with policies, regulations, and contractual terms, including how long data is retained and under what conditions.
While third parties execute controls,the enterprise remains accountable for the data and its governance outcomes.
Which of the following is MOST helpful in determining whether an enterprise’s quality assurance (QA) program is meeting business requirements?
Options:
Review the quality framework.
Perform a SWOT analysis.
Review service outage reports.
Perform a quality audit.
Answer:
DExplanation:
Determining whether a quality assurance (QA) program meets business requirements requires an objective evaluation of its effectiveness in delivering expected outcomes. The CGEIT Review Manual 8th Edition states that a quality audit is the most effective method to assess whether QA processes align with business needs, as it provides a structured review of performance and compliance.
Extract from CGEIT Review Manual 8th Edition (Domain 5: Benefits Realization):"A quality audit is the most effective way to determine whether an enterprise’s quality assurance program meets business requirements. The audit evaluates the QA processes, controls, and outcomes against defined business objectives, identifying gaps and areas for improvement." (Approximate reference: Domain 5, Section on Quality Management and Assurance)
Performing a quality audit (option D) provides a comprehensive assessment of the QA program’s alignment with business requirements, examining processes, metrics, and deliverables to ensure they meet stakeholder expectations.
Why not the other options?
A. Review the quality framework: Reviewing the framework provides insight into design but does not assess actual performance or alignment with business needs.
B. Perform a SWOT analysis: A SWOT analysis identifies strengths, weaknesses, opportunities, and threats but is too broad and not specific to evaluating QA effectiveness.
C. Review service outage reports: Outage reports may indicate issues but are limited to specific incidents and do not provide a holistic view of the QA program’s alignment with business requirements.
An enterprise is planning to upgrade its current enterprise resource planning (ERP) system to remain competitive within the industry. Which of the following would be MOST helpful to facilitate a successful implementation?
Options:
Documenting the current ERP processes and procedures
Reviewing the ERP post-implementation report
Establishing a change and transition planning process
Conducting a comprehensive requirements review
Answer:
DExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Strategic Management domain, emphasizes aligning IT initiatives like ERP upgrades with business objectives through thorough planning and requirements analysis. A successful ERP implementation requires understanding business needs to ensure the system supports competitive goals.
Option D: Conducting a comprehensive requirements review is the most helpful. This involves gathering and analyzing business and functional requirements to ensure the new ERP system meets current and future needs (e.g., scalability, integration). For example, a requirements review identifies critical processes (e.g., supply chain management) and ensures the ERP aligns with industry demands. The manual likely references COBIT 2019’s BAI02-Managed Requirements Definition, which prioritizes requirements analysis for successful IT projects.
Option A: Documenting the current ERP processes and procedures is useful for baseline understanding but doesn’t ensure the new system meets future needs.
Option B: Reviewing the ERP post-implementation report is irrelevant, as it applies to past implementations, not the current upgrade.
Option C: Establishing a change and transition planning process is important but secondary to defining requirements, as change management follows requirements.
Double Verification: The answer aligns with COBIT’s BAI02 and the CGEIT domain’s focus on strategic project planning. Requirements review is a foundational step in ISACA’s project management guidance.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on strategic IT project planning).
COBIT 2019, BAI02-Managed Requirements Definition.
ISACA Glossary (for definitions of ERP and requirements review), available at
An enterprise has an overarching enterprise architecture (EA) document. The CIO is concerned that EA is not leveraged in recent IT-enabled investments. Which of the following would BEST help to address these concerns and enforce the leveraging of EA?
Options:
Form a team to update EA regularly.
Require EA review at key milestones.
Publish and train on the EA document.
Adopt a globally recognized EA framework.
Answer:
BExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Governance of Enterprise IT domain, emphasizes the role of enterprise architecture (EA) in ensuring IT investments align with business strategies. If EA is not being leveraged, governance processes must enforce its use during project execution.
Option B: Require EA review at key milestones is the best approach. Integrating EA reviews into project stage gates (e.g., design, implementation) ensures that IT investments adhere to the EA’s standards, principles, and roadmap. For example, a review might confirm that a new system aligns with the EA’s technology stack. The manual likely references COBIT 2019’s APO03-Managed Enterprise Architecture, which advocates for EA integration in project governance.
Option A: Form a team to update EA regularly is proactive but doesn’t enforce EA use in projects.
Option C: Publish and train on the EA document raises awareness but lacks enforcement.
Option D: Adopt a globally recognized EA framework is unnecessary if an EA exists, as the issue is leverage, not framework choice.
Double Verification: The answer aligns with COBIT’s EA governance processes and the CGEIT domain’s focus on project alignment. Milestone reviews are a standard ISACA practice for EA enforcement.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on enterprise architecture).
COBIT 2019, APO03-Managed Enterprise Architecture.
ISACA Glossary (for definitions of EA), available at
Which of the following is the BEST approach to ensure global regulatory compliance when implementing a new business process?
Options:
Use a balanced scorecard to track the business process.
Ensure the appropriate involvement Of the legal department.
Review and revise the business architecture.
Seek approval from the change management board.
Answer:
BExplanation:
The best approach to ensure global regulatory compliance when implementing a new business process is to ensure the appropriate involvement of the legal department. The legal department is the function that provides legal advice and guidance to the organization on various matters, such as contracts, transactions, disputes, regulations, and compliance. By involving the legal department in the implementation of a new business process, the organization can ensure that the business process complies with the relevant laws, policies, and standards that apply in different countries and jurisdictions. The legal department can also help to identify and mitigate any legal risks or issues that may arise from the new business process, such as liability, litigation, or sanctions.
The other options are not as effective as ensuring the appropriate involvement of the legal department for ensuring global regulatory compliance when implementing a new business process. Using a balanced scorecard to track the business process is a good practice for measuring and evaluating the performance and value of the business process, but it does not guarantee compliance with global regulations. Reviewing and revising the business architecture is a necessary step for designing and aligning the business process with the business strategy and objectives, but it does not address the legal aspects of the business process. Seeking approval from the change management board is a relevant procedure for implementing a new business process, but it does not ensure that the change management board has the expertise or authority to assess and approve the global regulatory compliance of the business process.
Which of the following is the BEST critical success factor (CSF) to use when changing an IT value management program in an enterprise?
Options:
Documenting the process for the board of directors' approval
Adopting the program by using an incremental approach
Implementing the program through the enterprise's change plan
Aligning the program to the business requirements
Answer:
DExplanation:
Aligning the program to the business requirements. IT value management is the process of planning, measuring, and optimizing the value delivered by IT to the business. Changing an IT value management program means introducing new or improved methods, tools, or practices to enhance the IT value management process. The best CSF for this change is to align the program to the business requirements, which means ensuring that the program supports the business strategy, goals, and needs, and delivers the expected benefits and outcomes to the business stakeholders12.
The other options are not as effective as aligning the program to the business requirements to use as a CSF for changing an IT value management program. Documenting the process for the board of directors’ approval is a step that may be required for changing an IT value management program, but it does not guarantee that the program will be successful or effective. Adopting the program by using an incremental approach is a strategy that may help to implement the change more smoothly and gradually, but it does not ensure that the change will meet the business expectations or needs. Implementing the program through the enterprise’s change plan is a tactic that may facilitate the coordination and communication of the change across the enterprise, but it does not ensure that the change will align with the business strategy or goals.
Which of the following should be the CIO’s GREATEST consideration when making changes to the IT strategy?
Options:
Have key stakeholders been consulted?
Has the impact to the enterprise architecture (EA) been assessed?
Have IT risk metrics been adjusted?
Has the investment portfolio been revised?
Answer:
BExplanation:
Changes to the IT strategy must consider their impact on the enterprise architecture (EA), as the EA defines the structure and standards that enable strategy execution. The CGEIT Review Manual 8th Edition highlights that assessing EA impact is the greatest consideration to ensure that strategic changes are feasible and sustainable.
Extract from CGEIT Review Manual 8th Edition (Domain 4: Strategic Management):"When modifying the IT strategy, the CIO’s greatest consideration is assessing the impact on the enterprise architecture, as the EA provides the blueprint for IT capabilities, processes, and standards. Misalignment with EA can lead to implementation challenges and reduced effectiveness." (Approximate reference: Domain 4, Section on Strategy and EA Alignment)
Assessing the impact to the enterprise architecture (option B) ensures that the IT strategy leverages existing capabilities and addresses any architectural gaps, making it the most critical consideration.
Why not the other options?
A. Have key stakeholders been consulted?: Stakeholder consultation is important but secondary to ensuring the strategy is technically feasible via EA alignment.
C. Have IT risk metrics been adjusted?: Risk metrics are adjusted as part of risk management, not the primary concern for strategy changes.
D. Has the investment portfolio been revised?: Portfolio revision follows strategy and EA alignment to ensure investments support the updated strategy.
An IT governance committee realizes there are antiquated technologies in use throughout the enterprise. Which of the following is the BEST group to evaluate the recommendations to address these shortcomings?
Options:
Enterprise architecture (EA) review board
Business process improvement workgroup
Audit committee
Risk management committee
Answer:
AExplanation:
The best group to evaluate recommendations to address the use of antiquated technologies throughout the enterprise is the Enterprise Architecture (EA) review board. This group is responsible for overseeing the architectural framework and ensuring that IT systems and technologies align with the enterprise's strategic objectives. The EA review board has the expertise to assess the impact of current technologies on the business and recommend modernization strategies that align with the enterprise architecture. While business process improvement workgroups, audit committees, and risk management committees play important roles, the EA review board is specifically equipped to address technological shortcomings and alignment with business goals.
Which of the following BEST enables an enterprise to minimize the risks of intellectual property theft and loss of sensitive information when acquiring Internet of Things (IoT) hardware and software components?
Options:
Review the data classification policy and relevant documentation
Terminate contracts with suppliers from sanctioned regions of the world
Require nondisclosure agreements (NDAs) from all suppliers
Integrate supply chain cyber risk management processes
Answer:
DExplanation:
The best way to minimize intellectual property theft and sensitive information loss in IoT acquisitions is to integrate supply chain cyber risk management processes. This holistic approachincludes assessing supplier security posture, monitoring for threats, and ensuring cybersecurity is embedded into procurement, delivery, and operations.
NDAs, sanctions, and data classification are supportive, but only supply chain risk management addresses the full lifecycle risks and modern threats in globally sourced IoT ecosystems.
The GREATEST benefit associated with a decision to implement performance metrics for key IT assets is the ability to:
Options:
establish the span of control during the life cycle of IT assets.
determine the average cost of controls for protection of IT assets.
compare the performance Of IT assets against industry best practices.
determine the contribution of IT assets in achievement of IT goals.
Answer:
DExplanation:
This is because performance metrics are measurable values that indicate how well the IT assets are performing in terms of functionality, quality, efficiency, and effectiveness1. By implementing performance metrics for key IT assets, the organization can:
Monitor and review the IT assets’ progress, performance, quality, and outcomes
Highlight the IT assets’ achievements, challenges, and opportunities
Demonstrate the alignment of the IT assets with the IT strategy, goals, and priorities
Provide recommendations and feedback for the IT assets’ improvement and adjustment
Implementing performance metrics for key IT assets can help the organization determine the contribution of IT assets in achievement of IT goals, and ensure that they deliver value to the business.
The other options, establishing the span of control during the life cycle of IT assets, determining the average cost of controls for protection of IT assets, and comparing the performance of IT assets against industry best practices are not as beneficial as determining the contribution of IT assets in achievement of IT goals for implementing performance metrics for key IT assets. They are more related to specific aspects or outcomes of IT asset management, rather than a holistic and strategic benefit. They may also not be relevant or applicable to all types or categories of IT assets. They may not address the full scope or potential of IT asset improvement and optimization. References := What Is an IT Asset Management KPI? | Filewave, Performance Measurement Metrics for IT Governance - ISACA
A CIO observes that many information assets are hosted on legacy technology that can no longer be patched or updated. The systems are not currently in use, but business units are reluctant to decommission assets due to information retention requirements. Which of the following is the BEST strategic response to this situation?
Options:
Ensure the legacy systems are behind a secure firewall
Isolate the legacy systems and disconnect them from the internet
Apply legacy system surcharges to the business units
Develop and enforce life cycle policies in consultation with business
Answer:
DExplanation:
Thebest strategic responseis todevelop and enforce IT asset life cycle policies in consultation with business units. This approach ensures that legacy systems are managed proactively and collaboratively, balancing risk management, regulatory compliance, and operational needs. Policies should define criteria for decommissioning, archival solutions, and acceptable retention practices.
Firewalls and isolation are tactical mitigations, not strategic solutions. Surcharges may discourage usage but do not resolve governance and retention challenges comprehensively.
When conducting a risk assessment in support of a new regulatory
requirement, the IT risk committee should FIRST consider the:
Options:
cost burden to achieve compliance.
readiness of IT systems to address the risk.
risk profile of the enterprise.
disruption to normal business operations.
Answer:
CExplanation:
When conducting a risk assessment in support of a new regulatory requirement, the IT risk committee should first consider the risk profile of the enterprise. Understanding the overall risk landscape, including existing vulnerabilities, threats, and the impact of potential risks, provides a foundation for evaluating how new regulatory requirements will affect the organization. This initial step ensures that subsequent risk management efforts, including compliance activities, are aligned with the enterprise's risk appetite and strategic objectives. While cost, system readiness, and operational disruption are important considerations, they should be evaluated in the context of the enterprise's risk profile.
Of the following, who is responsible for the achievement of IT strategic objectives?
Options:
IT steering committee
Business process owners
Chief information officer (CIO)
Board of directors
Answer:
CExplanation:
The chief information officer (CIO) is the senior executive who is responsible for the achievement of IT strategic objectives. The IT strategic objectives are the high-level goals and priorities that guide the IT vision, mission, and value creation for the organization. The CIO is responsible for:
Developing and communicating the IT strategy and aligning it with the business strategy and objectives
Managing and delivering the IT solutions, services, and projects that support and enable the business needs, requirements, and value drivers
Leading and overseeing the IT functions, resources, and capabilities, and ensuring their quality, efficiency, and effectiveness
Monitoring and reporting the IT performance and outcomes, and ensuring their alignment with the IT strategic objectives and value drivers
Implementing and maintaining the IT governance framework, policies, standards, and practices
The other options are not correct. The IT steering committee is a group of senior executives and stakeholders who provide guidance, direction, and oversight for the IT strategy and initiatives, but not responsible for their achievement. The business process owners are the individuals or groups who have an interest or influence in the business processes that are supported or enabled by IT, but not responsible for the achievement of IT strategic objectives. The board of directors is the highest governing body of the organization that sets the vision, mission, strategy, and objectives of the organization, as well as oversees its performance and value creation, but not responsible for the achievement of IT strategic objectives.
Which of the following is MOST important for the successful establishment of an ethics program?
Options:
Defined whistleblower processes
Culture of accountability and responsibility
Defined roles and responsibilities
Clear mission and vision statements
Answer:
BExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Governance of Enterprise IT domain, emphasizes that an ethics program requires a culture of accountability and responsibility to succeed. This culture ensures that ethical behavior is embedded in organizational values, encouraging employees to act with integrity. For example, leadership modeling ethical behavior fosters trust and compliance. The manual likely references COBIT 2019’s EDM01-Ensured Governance Framework Setting and Maintenance, which highlights cultural factors in governance.
Option A: Whistleblower processes are important but secondary to culture.
Option C: Roles and responsibilities support the program but are not the most critical.
Option D: Mission and vision statements are foundational but less directly tied to ethics.
Double Verification: The answer aligns with COBIT’s EDM01 and the CGEIT domain’s focus on ethical governance. Culture is a key ISACA factor for ethics programs.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on ethics programs).
COBIT 2019, EDM01-Ensured Governance Framework Setting and Maintenance.
ISACA Glossary (for definitions of ethics program), available at
Which of the following BEST enables an enterprise to determine an appropriate retention policy for its information assets?
Options:
Business and compliance requirements
Business storage and processing needs
Backup and restoration capabilities
External customer data retention requirements
Answer:
AExplanation:
An effective information retention policy must be based onbusiness and compliance requirements.These include legal mandates, industry regulations, and internal operational needs that dictate how long data must be retained and when it should be archived or deleted.
While storage needs, backups, or customer expectations matter,only regulatory and business alignment guarantees legal compliance and operational relevance.
When selecting a cloud provider, which of the following provides the MOST comprehensive information regarding the current status and effectiveness of the provider's controls?
Options:
Globally recognized certification
Third-party audit report
Control self-assessment (CSA)
Maturity assessment
Answer:
BExplanation:
A third-party audit report is the most comprehensive source of information regarding the current status and effectiveness of a cloud provider’s controls. A third-party audit report is an independent and objective assessment of the cloud provider’s security, compliance, and performance by a qualified and reputable auditor. A third-party audit report can provide assurance to the cloud customers that the cloud provider has implemented adequate and effectivecontrols to meet the industry standards and best practices, as well as the contractual obligations and customer expectations12.
A globally recognized certification is a credential that demonstrates that a cloud provider has met certain criteria or standards for security, quality, or performance. A globally recognized certification can provide some level of confidence to the cloud customers that the cloud provider has achieved a minimum level of compliance or competence, but it may not provide enough details or evidence about the current status and effectiveness of the cloud provider’s controls3.
A control self-assessment (CSA) is a process that enables a cloud provider to evaluate its own controls internally, without involving an external auditor. A CSA can help a cloud provider to identify and address any gaps or weaknesses in its controls, as well as to monitor and improve its performance. However, a CSA may not provide sufficient assurance to the cloud customers, as it may lack objectivity, transparency, and validity4.
A maturity assessment is a process that measures the level of maturity or capability of a cloud provider’s processes or practices. A maturity assessment can help a cloud provider to benchmark its performance against industry standards or best practices, as well as to identify areas for improvement or innovation. However, a maturity assessment may not provide enough information about the current status and effectiveness of the cloud provider’s controls, as it may focus more on the process rather than the outcome5.
Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?
Options:
Defined roles.
Replicated systems.
A risk register.
Budget allocation.
Answer:
AExplanation:
A business continuity plan (BCP) relies on clear roles and responsibilities to ensure effective execution during a disruption. The CGEIT Review Manual 8th Edition emphasizes that defined roles are the most critical component for BCP success, as they ensure accountability and coordination.
Extract from CGEIT Review Manual 8th Edition (Domain 3: Risk Optimization):"The most important element for executing a business continuity plan is the definition of roles and responsibilities. Clear roles ensure that all stakeholders know their duties during a disruption, enabling rapid and coordinated response." (Approximate reference: Domain 3, Section on Business Continuity Planning)
Defined roles (option A) are essential to ensure that the BCP is actionable, with individuals assigned to specific tasks, such as communication, recovery, or coordination.
Why not the other options?
B. Replicated systems: Systems are important but useless without people to manage them during a crisis.
C. A risk register: A risk register identifies risks but does not ensure BCP execution.
D. Budget allocation: Funding supports BCP development but is not the most critical for execution.
A newly appointed CIO is concerned that IT is too reactive and wants to ensure IT adds value to the enterprise by proactively anticipating business needs. Which of the following will BEST contribute to meeting this objective?
Options:
Incorporating IT planning into the enterprise strategic planning process
Implementing an IT portfolio management framework
Involving more IT representation in strategic business case reviews
Including IT management within the program management office
Answer:
AExplanation:
Incorporating IT planning into the enterprise strategic planning processensures that IT initiatives are aligned from the beginning with enterprise goals. This proactive alignment allows IT to anticipate future business needs, allocate resources in advance, and reduce reaction time to strategic shifts.
While portfolio management and representation in reviews improve execution and oversight, true proactive value comes fromstrategic integration—ensuring IT is part of the planning conversation rather than reacting post-factum.
Despite an adequate training budget, IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?
Options:
Provide incentives for IT staff to attend outside conferences and training.
Require human resources (HR) to recruit new talent using an established IT skills matrix.
Create a standard-setting center of excellence for IT.
Establish an agreed-upon skills development plan with each employee.
Answer:
DExplanation:
When IT staff fail to keep skills current despite available training, the issue often lies in a lack of targeted, individualized development plans. The CGEIT Review Manual 8th Edition recommends creating personalized skills development plans to ensure that training aligns with both individual and organizational needs.
Extract from CGEIT Review Manual 8th Edition (Domain 2: IT Resources):"To address skill gaps, enterprises should establish individualized skills development plans that align employee training with emerging technologies and business needs. These plans ensure that training is relevant, targeted, and effectively utilized to maintain a skilled workforce." (Approximate reference: Domain 2, Section on Skills Development)
Establishing an agreed-upon skills development plan with each employee (option D) ensures that training is tailored to the specific technologies critical to the business and that employees are accountable for skill development.
Why not the other options?
A. Provide incentives for IT staff to attend outside conferences and training: Incentives may encourage participation but do not ensure that training addresses specific skill gaps.
B. Require human resources (HR) to recruit new talent using an established IT skills matrix: Recruiting is a last resort and does not address the current staff’s skill deficiencies.
C. Create a standard-setting center of excellence for IT: A center of excellence may set standards but does not directly address individual skill development.
What should be the FIRST action of a new CIO when considering an IT governance framework for an enterprise?
Options:
Understand corporate culture and IT'S role in providing business value.
Understand critical IT processes to define the scope of the IT governance framework.
Verify stakeholder sponsorship of the IT governance initiative.
Develop an IT balanced scorecard to monitor and track IT performance.
Answer:
AExplanation:
This action is important because corporate culture is the shared set of norms, beliefs, and values that influence the behavior and attitudes of the organization’s members. Corporate culture can support or hinder IT governance, depending on how well it aligns with the IT governance objectives. IT’s role in providing business value is the extent to which IT contributes to the achievement of the business strategy, goals, and needs. IT’s role in providing business value can vary depending on the industry, market, and competitive environment of the enterprise12.
By understanding corporate culture and IT’s role in providing business value, the new CIO can gain insight into the current state and challenges of IT governance in the enterprise, as well as the expectations and requirements of the stakeholders. The new CIO can also identify the gaps and opportunities for improvement or innovation in IT governance, and develop a vision and strategy for IT governance that is aligned with the corporate culture and business value34.
The other options are not the first action of a new CIO when considering an IT governance framework for an enterprise, but rather subsequent actions that depend on the outcome of understanding corporate culture and IT’s role in providing business value. Understanding critical IT processes to define the scope of the IT governance framework is a step that occurs after the new CIO has established the objectives and priorities for IT governance, and needs to determine which processes are essential for delivering value and managing risk5. Verifying stakeholder sponsorship of the IT governance initiative is a step that occurs after the new CIO has developed a business case and a communication plan for IT governance, and needs to secure the support and commitment of the key decision-makers and influencers6. Developing an IT balanced scorecard to monitor and track IT performance is a step that occurs after the new CIO has implemented and executed the IT governance framework, and needs to measure and report on the outcomes and benefits of IT governance7.
A series of cyber events impacting internet-facing business services has been successfully contained. To minimize future business risk exposure, which of the following should the board require of the IT team?
Options:
Review the internet service provider (ISP) contract.
Purchase cybersecurity insurance.
Conduct a business impact analysis (BIA).
Perform a root cause analysis.
Answer:
DExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Risk Optimization domain, emphasizes proactive risk management to minimize future risks after incidents. After containing cyber events, understanding their causes is critical to prevent recurrence and reduce business exposure.
Option D: Perform a root cause analysis is the best approach. This involves investigating the underlying reasons for the cyber events (e.g., vulnerabilities, misconfigurations) to identify and remediate weaknesses. For example, a root cause analysis might reveal unpatched systems, leading to improved patch management. The manual likely references COBIT 2019’s APO12-Managed Risk, which includes root cause analysis as a key risk response activity.
Option A: Review the ISP contract is narrow and may not address the root causes of cyber events, which are often internal.
Option B: Purchase cybersecurity insurance mitigates financial impact but doesn’t prevent future incidents.
Option C: Conduct a BIA assesses impact but doesn’t identify causes, making it less immediate for risk reduction.
Double Verification: The answer aligns with COBIT’s risk management processes and the CGEIT domain’s focus on addressing incident causes. Root cause analysis is a standard ISACA practice post-incident.
ISACA CGEIT Review Manual 8th Edition, Domain 4: Risk Optimization (focus on incident response and risk mitigation).
COBIT 2019, APO12-Managed Risk.
ISACA Glossary (for definitions of root cause analysis), available at
Which of the following is the GREATEST consideration when evaluating whether to comply with the new carbon footprint regulations impacted by blockchain technology?
Options:
The enterprise's organizational structure
The enterprise's risk appetite
The current IT process capability maturity
The IT strategic plan
Answer:
BExplanation:
The greatest consideration when evaluating whether to comply with new carbon footprint regulations impacted by blockchain technology is the enterprise's risk appetite. This involves understanding the level of risk the organization is willing to accept in relation to the potential environmental impact and regulatory compliance requirements associated with blockchain technology. The organization's risk appetite guides decision-making processes, influencing whether to invest in more sustainable practices or technologies, or to accept the risks associated with non-compliance. While the organizational structure, IT process capability maturity, and the IT strategic plan are relevant, the risk appetite is the key factor in determining the approach to compliance with environmental regulations.
Which of the following BEST facilitates the adoption of an IT governance program in an enterprise?
Options:
Defining clear roles and responsibilities for the participants
Using a comprehensive business case for the initiative
Communicating the planned IT strategy to stakeholders
Addressing the behavioral and cultural aspects of change
Answer:
DExplanation:
Facilitating the adoption of an IT governance program in an enterprise requires addressing the behavioral and cultural aspects of change. This approach recognizes that the success of such a program depends not only on the structural and strategic elements but also on how well the people within the organization accept and adapt to the changes. Addressing cultural aspects involves engaging stakeholders, fostering a governance mindset, and overcoming resistance to change, thereby ensuring a smoother and more effective implementation. While defining roles, building business cases, and communicating strategies are critical, they must be complemented by efforts to manage the human side of change.
Despite an adequate training budget. IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?
Options:
Provide incentives for IT staff to attend outside conferences and training
Create a standard-setting center of excellence for IT.
Require human resources (HR) to recruit new talent using an established IT skills matrix.
Establish an agreed-upon skills development plan with each employee
Answer:
DExplanation:
The best way to address the issue of IT staff not keeping their skills current, despite an adequate training budget, is to establish an agreed-upon skills development plan with each employee. This personalized approach ensures that training and development activities are directly aligned with both the organization's needs and the individual's career goals, thereby increasing the likelihood of participation and the application of new skills. While providing incentives and creating centers of excellence can be supportive, a tailored development plan directly engages each staff member in their growth, ensuring relevance and commitment.
An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:
Options:
a common risk management taxonomy.
a common risk organization.
common key risk indicators (KRIs).
common risk mitigation strategies.
Answer:
AExplanation:
A common risk management taxonomy is a set of terms and definitions that are used consistently across the enterprise to describe, measure, and report on risks. A common risk management taxonomy is essential for integrating IT risk with the ERM framework, as it enables a common understanding of risk concepts, categories, and levels among different stakeholders and functions. A common risk management taxonomy also facilitates the aggregation and comparison of risks across the enterprise, and supports the alignment of risk appetite and tolerance with business objectives12. References: 1: Integrated Enterprise IT Risk Management (ERM) Programs - CohnReznick3 2: Introducing Risk Taxonomy - ISACA4
Which of the following BEST helps to ensure that IT standards will be consistently applied across the enterprise?
Options:
Enterprise risk management (ERM) reviews.
Mandatory systems development training.
Business case reviews by the steering committee.
Established enterprise architecture (EA) practices.
Answer:
DExplanation:
Consistent application of IT standards across the enterprise is best achieved through a well-defined enterprise architecture (EA), which provides a blueprint for IT processes, technologies, and standards. The CGEIT Review Manual 8th Edition emphasizes that EA practices ensure standardization and alignment with enterprise objectives.
Extract from CGEIT Review Manual 8th Edition (Domain 1: Governance of Enterprise IT):"Enterprise architecture provides a structured approach to defining and enforcing IT standards across the organization. By establishing common frameworks, policies, and guidelines, EA ensures consistency in the application of IT standards, reducing variability and enhancing interoperability." (Approximate reference: Domain 1, Section on Enterprise Architecture)
Established enterprise architecture practices (option D) provide a governance mechanism to enforce IT standards, ensuring that all IT initiatives adhere to predefined guidelines, thus promoting consistency.
Why not the other options?
A. Enterprise risk management (ERM) reviews: ERM focuses on identifying and mitigating risks, not on enforcing IT standards.
B. Mandatory systems development training: Training may improve skills but does not directly ensure consistent application of standards across the enterprise.
C. Business case reviews by the steering committee: Business case reviews focus on project approval and alignment, not on enforcing technical standards.
Which of the following is the BEST way for a CIO to provide progress updates on a newly implemented IT strategic plan to the board of directors?
Present an IT summary dashboard.
Present IT critical success factors (CSFs).
Report results Of key risk indicators (KRIs).
Options:
Report results of stage-gate reviews.
Answer:
AExplanation:
An IT summary dashboard is the best way for a CIO to provide progress updates on a newly implemented IT strategic plan to the board of directors, because it can help to communicate the key performance indicators (KPIs), benefits, risks, and issues of the IT strategic plan in a concise, visual, and interactive way. An IT summary dashboard can also help to align the IT strategic plan with the business strategy, value creation, and stakeholder expectations, and demonstrate the value and contribution of IT to the enterprise. Presenting IT critical success factors (CSFs), reporting results of key risk indicators (KRIs), and reporting results of stage-gate reviews are not as effective as presenting an IT summary dashboard, because they are more focused on specific aspects of the IT strategic plan, rather than providing a holistic and comprehensive overview. References:
IT Governance Dashboard, ISACA
What is an IT Dashboard?, Smartsheet
IT Strategy Dashboard, ClearPoint Strategy
An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:
Options:
for robust change management.
for periodic service provider audits.
for enterprise architecture (EA) updates.
to qualify service providers.
Answer:
BExplanation:
A periodic service provider audit is a process of conducting an independent and objective assessment of the service provider’s performance, quality, compliance, and security in relation to the agreed service level agreement (SLA) and the enterprise’s expectations and requirements. A periodic service provider audit can help provide quality of service oversight by:
Verifying and validating the service provider’s claims and credentials, and ensuring that they meet the contractual obligations and standards
Identifying and evaluating the strengths, weaknesses, opportunities, and threats of the service provider’s services, processes, and controls
Detecting and reporting any issues, gaps, or risks that may affect the quality of service delivery or the enterprise’s objectives and value
Recommending and implementing corrective and preventive actions to address and resolve the issues, gaps, or risks
Monitoring and measuring the outcomes and effectiveness of the corrective and preventive actions, and ensuring their alignment with the SLA
The board of an enterprise has decided to implement an emerging technology, and employees are extremely concerned about the unknown future of the company. What should be the CIO’s PRIMARY responsibility in addressing these concerns?
Options:
Develop and communicate new performance measures.
Define new roles and responsibilities for IT staff.
Initiate IT workforce training on the new technology.
Define and communicate a new IT strategy.
Answer:
DExplanation:
Employee concerns about the future due to an emerging technology stem from uncertainty about the organization’s direction. The CGEIT Review Manual 8th Edition emphasizes that the CIO’s primary responsibility in such scenarios is to define and communicate a clear IT strategy to provide direction and reassurance.
Extract from CGEIT Review Manual 8th Edition (Domain 4: Strategic Management):"When adopting emerging technologies, the CIO’s primary responsibility is to define and communicate an IT strategy that aligns with the enterprise’s goals and addresses stakeholder concerns. Clear communication of the strategy reduces uncertainty and fosters confidence in the organization’s direction." (Approximate reference: Domain 4, Section on Strategic Communication)
Defining and communicating a new IT strategy (option D) addresses employee concerns by clarifying how the technology supports business goals, how it will be implemented, and its impact on the workforce.
Why not the other options?
A. Develop and communicate new performance measures: Performance measures are operational and do not directly address concerns about the company’s future.
B. Define new roles and responsibilities for IT staff: Roles may need redefinition, but this is a secondary step after communicating the strategy.
C. Initiate IT workforce training on the new technology: Training is important but does not address broader concerns about the company’s direction.
Which of the following provides the STRONGEST indication that IT governance is well established within an organizational culture?
Options:
Benefits of IT governance are realized throughout the organization.
There is awareness of IT metrics throughout the organization.
IT governance defines how IT projects should be assessed.
IT performance metrics are defined in the balanced scorecard.
Answer:
BExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Governance of Enterprise IT domain, describes well-established IT governance as a culture where IT aligns with business objectives and is embedded in organizational processes. Awareness of IT metrics throughout the organization indicates that governance is ingrained, as employees at all levels understand and use metrics (e.g., KPIs, KRIs) to guide decisions. This reflects a mature governance culture. The manual likely references COBIT 2019’s EDM01-Ensured Governance Framework Setting and Maintenance, which emphasizes cultural integration of governance.
Option A: Benefits realized is an outcome, not an indication of cultural establishment.
Option C: Project assessment definitions are procedural, not cultural.
Option D: Balanced scorecard metrics are specific and not as broad as organization-wide metric awareness.
Double Verification: The answer aligns with COBIT’s EDM01 and the CGEIT domain’s focus on governance culture. Metric awareness is a key ISACA indicator of governance maturity.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on governance culture).
COBIT 2019, EDM01-Ensured Governance Framework Setting and Maintenance.
ISACA Glossary (for definitions of IT governance), available at
Senior management is concerned about the unauthorized use of third-party data that is stored within the enterprise's data repositories. Which of the following is the BEST way to address this concern?
Options:
Communicate consequences for staff who misuse third-party data.
Ensure all third-party data in transit is encrypted.
Establish data ownership with clear accountabilities.
Establish optimal retention periods for third-party data.
Answer:
CExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Governance of Enterprise IT domain, addresses data governance to ensure proper management and protection of data, including third-party data. Establishing data ownership with clear accountabilities ensures that specific individuals or roles are responsible for overseeing third-party data, preventing unauthorized use through defined policies and controls. For example, a data owner can enforce access restrictions and monitor usage. The manual likely references COBIT 2019’s APO14-Managed Data, which emphasizes data ownership for governance.
Option A: Communicate consequences is reactive and less effective than proactive ownership.
Option B: Encrypt data in transit addresses security but not unauthorized internal use.
Option D: Retention periods manage data lifecycle but don’t directly prevent misuse.
Double Verification: The answer aligns with COBIT’s APO14 and the CGEIT domain’s focus on data governance. Data ownership is a core ISACA principle for data protection.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on data governance).
COBIT 2019, APO14-Managed Data.
ISACA Glossary (for definitions of data ownership), available at
Which of the following is the PRIMARY outcome of using a comprehensive architecture framework?
Options:
Key third-party relationships are supported.
Business goal conflicts are identified.
Relevant controls are identified.
Organizational management policies are developed.
Answer:
BExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Strategic Management domain, describes a comprehensive architecture framework (e.g., enterprise architecture) as a tool to align IT with business strategies. The primary outcome is identifying business goal conflicts, as the framework maps business processes, systems, and strategies, revealing misalignments (e.g., conflicting departmental objectives). This enables resolution to ensure cohesive strategy execution. The manual likely references COBIT 2019’s APO03-Managed Enterprise Architecture, which highlights conflict identification as a key benefit.
Option A: Third-party relationships are secondary and not the primary focus.
Option C: Relevant controls are an outcome but not the primary one, as controls follow alignment.
Option D: Management policies are unrelated to architecture frameworks.
Double Verification: The answer aligns with COBIT’s APO03 and the CGEIT domain’s focus on strategic alignment. Conflict identification is a core outcome of EA in ISACA’s frameworks.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on enterprise architecture).
COBIT 2019, APO03-Managed Enterprise Architecture.
ISACA Glossary (for definitions of architecture framework), available at
A newly established IT steering committee is concerned whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?
Options:
Critical success factors (CSFs)
Performance indicators
Capability maturity levels
Balanced scorecard
Answer:
BExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Governance of Enterprise IT domain, emphasizes monitoring system performance against defined objectives, such as availability. Performance indicators, often tied to service level agreements (SLAs), provide specific, measurable data (e.g., system uptime percentage) to assess whether availability objectives are met. For example, a performance indicator showing 99.8% uptime directly informs the committee. The manual likely references COBIT 2019’s APO09-Managed Service Agreements, which prioritizes performance indicators for service monitoring.
Option A: Critical success factors (CSFs) define conditions for success but are less specific than performance metrics.
Option C: Capability maturity levels assess process maturity, not system availability.
Option D: Balanced scorecard provides a broad performance overview but is less focused on specific availability metrics.
Double Verification: The answer aligns with COBIT’s APO09 and the CGEIT domain’s focus on service performance. Performance indicators are the primary ISACA tool for availability assessment.
ISACA CGEIT Review Manual 8th Edition, Domain 1: Governance of Enterprise IT (focus on service monitoring).
COBIT 2019, APO09-Managed Service Agreements.
ISACA Glossary (for definitions of performance indicators), available at
What is the BEST way for IT to achieve compliance with regulatory requirements?
Options:
Enforce IT policies and procedures.
Create an IT project portfolio.
Review an IT performance dashboard.
Report on IT audit findings and action plans.
Answer:
AExplanation:
The best way for IT to achieve compliance with regulatory requirements is to enforce IT policies and procedures that align with the compliance standards and guidelines. IT policies andprocedures are the documents that define the roles, responsibilities, rules, and expectations for the IT function and its activities. They help to ensure that the IT systems and processes are secure, reliable, efficient, and consistent with the business objectives and legal obligations. By enforcing IT policies and procedures, IT can demonstrate its compliance with regulatory requirements and avoid violations, penalties, or reputational damage. The other options are not as effective as enforcing IT policies and procedures for achieving compliance with regulatory requirements. Creating an IT project portfolio is a good practice for managing IT investments and resources, but it does not guarantee compliance with regulatory requirements. Reviewing an IT performance dashboard is a useful technique for monitoring and measuring IT performance and value delivery, but it does not ensure compliance with regulatory requirements. Reporting on IT audit findings and action plans is a necessary step for improving IT governance and control processes, but it does not achieve compliance with regulatory requirements. References := What is IT Compliance? - Checklist, Guidelines & More | Proofpoint US, 6 Common IT Compliance Standards (A Guide to the Basics), Here’s Why Regulatory Compliance is Important - Reciprocity
Which of the following would BEST help assess the effectiveness of a newly established IT governance framework?
Options:
Develop a business case for the program portfolio.
Evaluate key performance indicator (KPI) results.
Benchmark the IT governance framework to industry best practice.
Review results of IT audit reports.
Answer:
BExplanation:
This is because KPIs are measurable values that indicate how well the IT governance framework is achieving its objectives and delivering value to the business1. By evaluating KPI results, the organization can:
Monitor and review the IT governance framework’s progress, performance, quality, and outcomes
Highlight the IT governance framework’s achievements, challenges, and opportunities
Demonstrate the alignment of the IT governance framework with the business strategy, goals, and priorities
Provide recommendations and feedback for the IT governance framework’s improvement and adjustment
Evaluating KPI results can provide a comprehensive and objective overview of the IT governance framework’s effectiveness and impact.
The other options, developing a business case for the program portfolio, benchmarking the IT governance framework to industry best practice, and reviewing results of IT audit reports are not as effective as evaluating KPI results for assessing the effectiveness of a newly established IT governance framework. They are more related to the design and implementation of the IT governance framework, rather than its evaluation. They may also be too narrow or subjective for assessing the IT governance framework’s effectiveness, as they may not cover all aspects or perspectives of the IT governance framework. They may also depend on external factors or standards that may not be relevant or applicable to the organization’s specific context and needs.
Which of the following BEST enables an enterprise to determine whether a current program for IT infrastructure migration to the cloud is continuing to provide benefits?
Options:
Key performance indicators (KPls)
Total cost of ownership (TCO)
Key risk indicators (KRIS)
Net present value (NPV)
Answer:
AExplanation:
Key performance indicators (KPIs) are metrics that measure the performance of a project, program, or investment against a set of targets, objectives, or benchmarks. KPIs can help an enterprise to determine whether a current program for IT infrastructure migration to the cloud is continuing to provide benefits by tracking the progress, efficiency, quality, and outcomes of the program. KPIs can also help to identify any gaps, issues, or risks that may affect the program’s success and enable timely corrective actions12.
Total cost of ownership (TCO) is the purchase price of an asset plus the costs of operation over its life span. TCO can help an enterprise to compare the costs and benefits of different IT infrastructure options, such as cloud versus on-premise, but it does not measure the ongoing performance or benefits of a chosen option3.
Key risk indicators (KRIs) are metrics that monitor and predict potential risks that may negatively impact an enterprise’s objectives or operations. KRIs can help an enterprise to identify and mitigate any risks associated with IT infrastructure migration to the cloud, such as security breaches, data loss, or service disruptions, but they do not measure the benefits or value of the program45.
Net present value (NPV) is the difference between the present value of cash inflows and the present value of cash outflows over a period of time. NPV is used to evaluate the profitability or return on investment of a project or investment by discounting the future cash flows to their present value. NPV can help an enterprise to decide whether to undertake an IT infrastructuremigration to the cloud based on its expected net value, but it does not measure the actual performance or benefits of the program16. References :=
3: Total Cost of Ownership: How It’s Calculated With Example - Investopedia
4: Key Risk Indicators (KRIs) - National Treasury
2: How to Develop Key Risk Indicators (KRIs) to Fortify Your Business | AuditBoard
5: How to Develop Effective Key Risk Indicators - Secureframe
1: Net Present Value (NPV) - Definition, Examples, How to Do NPV Analysis
6: NPV Formula - Learn How Net Present Value Really Works, Examples
An enterprise wants to establish key risk indicators (KRIs) in an effort to better manage IT risk. Which of the following should be identified FIRST?
Options:
The enterprise risk appetite
Key performance metrics
Risk mitigation strategies
Enterprise architecture (EA) components
Answer:
AExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Risk Optimization domain, emphasizes the importance of aligning IT risk management with the enterprise’s overall risk management strategy. Key risk indicators (KRIs) are metrics used to monitor potential risks and provide early warnings. To establish effective KRIs, the enterprise must first understand its risk tolerance and priorities.
Option A: The enterprise risk appetite should be identified first. Risk appetite defines the level of risk the enterprise is willing to accept in pursuit of its objectives, guiding the selection of KRIs. For example, if the enterprise has a low risk appetite for data breaches, KRIs might focus on metrics like unauthorized access attempts. Identifying risk appetite ensures KRIs are relevant and aligned with strategic goals. The manual likely references COBIT 2019’s APO12-Managed Risk, which highlights risk appetite as a foundational element of risk management.
Option B: Key performance metrics relate to performance, not risk, and are not directly relevant to KRIs.
Option C: Risk mitigation strategies are developed after identifying risks and KRIs, not before.
Option D: Enterprise architecture (EA) components may inform risk identification but are secondary to defining risk appetite.
Double Verification: The answer aligns with COBIT’s APO12 and the CGEIT domain’s focus on risk management foundations. Risk appetite is a prerequisite for KRI development in ISACA’s frameworks.
ISACA CGEIT Review Manual 8th Edition, Domain 4: Risk Optimization (focus on risk management and KRIs).
COBIT 2019, APO12-Managed Risk.
ISACA Glossary (for definitions of risk appetite and KRIs), available at
To define the risk management strategy, which of the following MUST be set by the board of directors?
Options:
Risk management process
Risk identification plan
Risk treatment plan
Risk appetite
Answer:
DExplanation:
Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Risk Optimization domain, states that the board of directors is responsible for setting the risk appetite, which defines the level of risk the enterprise is willing to accept to achieve its objectives. This guides the risk management strategy, ensuring alignment with business goals. For example, a conservative risk appetite might prioritize cybersecurity investments. The manual likely references COBIT 2019’s EDM03-Ensured Risk Optimization, which assigns risk appetite to the board.
Option A: Risk management process is operational and defined by management.
Option B: Risk identification plan is tactical and not a board responsibility.
Option C: Risk treatment plan follows risk appetite setting.
Double Verification: The answer aligns with COBIT’s EDM03 and the CGEIT domain’s focus on board responsibilities. Risk appetite is a core ISACA board duty.
ISACA CGEIT Review Manual 8th Edition, Domain 4: Risk Optimization (focus on board roles).
COBIT 2019, EDM03-Ensured Risk Optimization.
ISACA Glossary (for definitions of risk appetite), available at
Which of the following is the PRIMARY responsibility of a data steward at an enterprise with mature data management programs?
Options:
Implementing processes for data collection and use
Ensuring compliance with data privacy laws and regulations
Establishing data quality requirements and metrics
Developing data-related policies and procedures
Answer:
CExplanation:
A data steward is a functional role in data management and governance, with responsibility for ensuring that data policies and standards turn into practice within the steward’s domain. Data stewards assist the enterprise in leveraging domain data assets to full capacity1. One of the primary responsibilities of a data steward is to establish data quality requirements and metrics, which define the criteria and measures for assessing the fitness of data for its intended use. Data quality requirements and metrics are based on the business needs and expectations of the data consumers, and they cover various dimensions of data quality, such as accuracy, completeness, consistency, timeliness, validity, and reliability23. Data stewards also monitor and report on the data quality performance, identify and resolve data quality issues, and implement continuous improvement initiatives to enhance the data quality4.
The other options are not the primary responsibility of a data steward, especially at an enterprise with mature data management programs. Implementing processes for data collection and use is a responsibility of a data engineer or a data analyst, who design and execute the technical aspects of data acquisition, transformation, storage, and analysis5. Ensuring compliance with data privacy laws and regulations is a responsibility of a data protection officer or a data privacy officer, who oversee the legal and ethical aspects of data processing, security, and consent. Developing data-related policies and procedures is a responsibility of a data governance committee or a data governance officer, who set the strategic direction and objectives for data management and governance across the enterprise.
From a governance perspective, which of the following functions MUST approve the agreed-upon criteria for a new technology-enabled service before submitting the final high-level design to project stakeholders?
Options:
Information security
Project management office (PMO)
Quality assurance (QA)
Internal audit
Answer:
AExplanation:
Information security must approve the criteria for technology-enabled services to ensure that all security-related considerations, including compliance, risk mitigation, and data protection, are addressed. This step aligns the service design with the enterprise's security policies and regulatory requirements before it progresses to stakeholders. Other functions such as QA and PMO contribute to execution and oversight, but the responsibility for security approvals rests with information security. References: COBIT 2019, ISACA Security Guidance.
Which of the following has the GREATEST impact on the design of an IT governance framework?
Options:
IT performance metrics
Resource allocation
Business leadership
Business risk
Answer:
DExplanation:
Business risk has the greatest impact on the design of an IT governance framework, as it determines the level of control, oversight, and alignment that is required for the IT function to support the business objectives and mitigate the potential threats and vulnerabilities. Business risk is influenced by various factors, such as the industry, market, customer, competitor, regulatory, and environmental context of the enterprise. Therefore, the IT governance framework should be tailored to suit the specific risk profile and appetite of the enterprise, and to address the key risk areas and scenarios that could affect the business performance and value. According to COBIT 2019, one of the design factors that can influence the design of an enterprise’s governance system is the risk profile1. This design factor reflects the degree of risk exposure and tolerance that the enterprise has in relation to its use of information and technology1. The risk profile can be assessed by considering various aspects, such as the likelihood and impact of risk events, the sources and types of risks, the risk appetite and thresholds, the risk management capabilities and maturity, and the risk culture and awareness1. Based on the risk profile, the enterprise can decide on the appropriate governance objectives, components, enablers, practices, and activities that are needed to manage and mitigate the risks effectively1. The other options, IT performance metrics, resource allocation, and business leadership, are also important for the design of an IT governance framework, but they are not as impactful as business risk. IT performance metrics are used to measure and monitor the effectiveness and efficiency of the IT function in delivering value to the business2. Resource allocation is a process that optimizes the use of IT resources across multiple programs and projects in alignment with the business goalsand priorities3. Business leadership is a role that provides strategic direction, guidance, and support for the IT function in achieving its objectives4. However, these factors are more related to the implementation and execution of the IT governance framework, rather than its design. They are also influenced by the business risk factor, as they depend on the level of risk exposure and tolerance that the enterprise has. References := IT Governance: Definitions, Frameworks and Planning - ProjectManager, Resource Allocation Done Right: Best Practices for 2022 & Beyond, The Role of Business Leadership in Effective IT Governance, COBIT Design Factors: A Dynamic Approach to Tailoring Governance in … - ISACA
The BEST way for a CIO to justify maintaining and supporting social media platforms is by demonstrating:
Options:
how social media technology fits into the IT investment management process.
that service level agreements (SLAs) for social media technologies have been met.
the IT performance Of social media technologies.
the value derived from investment in social media technologies.
Answer:
DExplanation:
The best way for a CIO to justify maintaining and supporting social media platforms is by demonstrating the value derived from investment in social media technologies. Social media platforms are not just tools for communication and entertainment, but also strategic assets that can create and deliver value to the organization and its stakeholders. Some of the potential benefits of social media platforms are:
Enhancing customer engagement, loyalty, and satisfaction by providing timely, personalized, and interactive content and feedback
Increasing brand awareness, reputation, and trust by showcasing the organization’s values, achievements, and social responsibility
Improving innovation and collaboration by facilitating the exchange of ideas, knowledge, and feedback among employees, customers, partners, and experts
Supporting decision making and problem solving by providing access to relevant data, insights, and analytics
Reducing costs and increasing efficiency by streamlining processes, automating tasks, and optimizing resources
Which of the following is the BEST approach to assist an enterprise in planning for iT-enabled investments?
Options:
Enterprise architecture (EA).
IT process mapping
Task management
Service level management
Answer:
AExplanation:
The best approach to assist an enterprise in planning for IT-enabled investments is enterprise architecture (EA). EA is a holistic and integrated view of the current and future state of the business, IT, and their alignment1. EA helps to identify and prioritize the business needs andobjectives, and to design and deliver the IT solutions that support them2. EA also helps to optimize the IT resources and processes, and to ensure that they are aligned with the business strategy and goals3. EA also helps to measure and monitor the IT performance and outcomes, and to evaluate the value and benefits of the IT investments4. EA also helps to manage the risks, costs, and complexity of the IT investments, and to ensure that they comply with the legal and regulatory requirements5.
IT process mapping, task management, and service level management are not as comprehensive or effective as EA in assisting an enterprise in planning for IT-enabled investments. IT process mapping is a visual representation of a process that shows the steps and their relationships6. It can help to understand how a process works, but it does not provide a strategic or architectural view of the business or IT. Task management is a process of managing individual or group tasks to achieve goals7. It can help to track and delegate work, but it does not address the alignment or optimization of IT with the business. Service level management is a process of defining, documenting, and agreeing on service levels within an IT service management system8. It can help to ensure that services are delivered at an agreed level, but it does not cover the design or delivery of IT solutions that meet the business needs. Therefore, EA is the best approach to assist an enterprise in planning for IT-enabled investments.
Which of the following BEST supports the implementation of an effective data classification policy?
Options:
Monitoring with key performance indicators (KPIs)
Implementation of data loss prevention (DLP) tools
Clear guidelines adopted by the business
Classification policy approval by the board
Answer:
CExplanation:
A data classification policy is a set of rules and standards that define how data is categorized and labeled according to its sensitivity, value, and criticality for the organization1. An effective data classification policy helps to ensure that data is properly protected, accessed, and managed throughout its lifecycle2. The best way to support the implementation of an effective data classification policy is to have clear guidelines adopted by the business, because they provide a common understanding and framework for data owners, stewards, and users to classify and handle data according to the business context and requirements3. Clear guidelines also help to ensure consistency, compliance, and accountability for data classification across the organization4.
References :=
Data Classification Policy | Information Security Office
Data Governance and Classification Policy - University of Cincinnati
Data governance processes - Cloud Adoption Framework
Data classification in the Microsoft Purview governance portal
Which of the following is the BEST way to implement effective IT risk management?
Options:
Align with business risk management processes.
Establish a risk management function.
Minimize the number of IT risk management decision points.
Adopt risk management processes.
Answer:
AExplanation:
Effective IT risk management is not a standalone process, but rather a part of the overall business risk management framework. IT risks are interrelated with business risks, and they can affect the achievement of business objectives and strategies. Therefore, IT risk management should align with business risk management processes, such as identifying, assessing, prioritizing, treating, monitoring, and reporting risks. Aligning IT risk management with business risk management processes can help ensure that IT risks are considered in the context of the business environment, that IT risk appetite and tolerance are consistent with the business risk appetite and tolerance, that IT risk responses are aligned with the business risk responses, and that IT risk performance is communicated to the relevant stakeholders. Aligning IT risk management with business risk management processes can also help optimize the use of resources, enhance the value of IT investments, and improve the governance and accountability of IT risks.
Following a re-prioritization of business objectives by management, which of the following should be performed FIRST to allocate resources to IT processes?
Options:
Perform a maturity assessment.
Implement a RACI model.
Refine the human resource management plan.
Update the IT strategy.
Answer:
DExplanation:
The IT strategy is the document that defines how IT will be used to support and achieve the business objectives of the organization. It aligns the IT investments, resources, and activities with the business priorities and direction. When there is a change in the business objectives, such as a re-prioritization by management, the IT strategy should be updated accordingly to ensure that IT remains relevant and aligned with the new business goals. Updating the IT strategy should be done first before allocating resources to IT processes, because it provides the basis for determining which IT processes are most critical and valuable for the organization. The other options are not the best actions to perform first in this scenario. Performing a maturity assessment, implementing a RACI model, and refining the human resource management plan are all useful activities for improving the IT processes, but they are not directly related to the change in business objectives. They should be done after updating the IT strategy, based on the new strategic direction and priorities. References:
1:
2:
3:
4:
5:
The PRIMARY reason a CIO and IT senior management should stay aware of the business environment is to:
Options:
revisit prioritization of IT projects.
adjust IT strategy as needed.
measure efficiency of IT resources.
re-assess the IT investment portfolio.
Answer:
BExplanation:
According to the CGEIT exam guide, the primary reason a CIO and IT senior management should stay aware of the business environment is to adjust IT strategy as needed. IT strategy is the plan that defines how IT will support and enable the business strategy and objectives of the enterprise. The business environment is the external and internal factors that affect theenterprise’s performance and success, such as market trends, customer demands, competitor actions, regulatory changes, technological innovations, etc. The CIO and IT senior management should stay aware of the business environment to identify and anticipate the opportunities and threats that may arise, and to align and adapt the IT strategy accordingly. This will help to ensure that IT delivers value, benefits and competitive advantage to the enterprise, and that IT risks are managed and mitigated effectively. References: CGEIT Exam Candidate Guide, page 13. CGEIT Certification, What is IT Strategy?, What is Business Environment?
In which of the following situations is it MOST appropriate to use a quantitative risk assessment?
Options:
There is a lack of accurate and reliable past and present risk data.
The risk assessment needs to be completed in a short period of time.
The objectivity of the risk assessment is of primary importance.
The risk assessment is needed for an IT project business case.
Answer:
CExplanation:
Quantitative risk assessment is more objective than qualitative risk assessment because it uses numeric values and calculations to estimate the likelihood and impact of risks. Quantitative risk assessment is more appropriate when the risk assessment needs to be unbiased and consistent. References := ISACA, CGEIT Review Manual, 7th Edition, 2019, p. 90-91.
An enterprise is approaching the escalation date of a major IT risk. The IT steering committee wants to ascertain who is responsible for the risk response. Where should the committee find this information?
Options:
Resource management plan
RACl chart
Risk management plan
Risk register
Answer:
BExplanation:
The committee should find the information about who is responsible for the risk response in the RACI chart, as this is a tool that assigns the roles and responsibilities of the stakeholders for each task or activity in a project or process. RACI stands for Responsible, Accountable, Consulted,and Informed, which are the four types of involvement or participation that a stakeholder can have in a task or activity. A RACI chart is a matrix that shows the tasks or activities as rows and the stakeholders as columns, and indicates their roles and responsibilities using the RACI codes. A RACI chart can help clarify and communicate who is doing what, who is making decisions, who is providing input, and who is being updated in a project or process1.
A resource management plan, a risk management plan, and a risk register are also important documents for managing IT risks, but they do not provide the information about who is responsible for the risk response. A resource management plan is a document that defines how the resources, such as human, financial, physical, or technological resources, will be acquired, allocated, managed, and controlled in a project or process. A resource management plan can help ensure that the resources are available and sufficient for the risk response activities. A risk management plan is a document that defines how the risks will be identified, analyzed, evaluated, treated, monitored, and communicated in a project or process. A risk management plan can help ensure that the risks are managed effectively and efficiently according to the enterprise’s objectives and policies. A risk register is a document that records the risks that may affect the achievement of an objective or the performance of an activity, as well as their likelihood, impact, mitigation strategies, and status. A risk register can help identify and prioritize the risks that need to be addressed or monitored.
Communicating which of the following to staff BEST demonstrates senior management's commitment to IT governance?
Options:
Legal and regulatory requirements
Approved IT investment opportunities
Objectives and responsibilities
Need for enterprise architecture (EA)
Answer:
CExplanation:
Communicating the objectives and responsibilities to staff is the BEST way to demonstrate senior management’s commitment to IT governance. IT governance is the process of ensuring that IT supports the achievement of the organization’s goals and objectives, and delivers value to its stakeholders1. IT governance involves aligning the IT strategy, policies, processes, and resources with the business strategy, needs, and expectations2. However, implementing and sustaining IT governance requires a significant amount of change in the organization, such as introducing new technologies, standards, roles, and responsibilities3. Therefore, communicating the objectives and responsibilities to staff is essential for demonstrating senior management’s commitment to IT governance, as it can:
Provide the direction and mandate for the IT governance initiative on an ongoing basis
Communicate the vision, mission, goals, and objectives of the IT function to all stakeholders
Allocate the necessary resources and capabilities to enable the IT governance processes and activities
Monitor and evaluate the performance and outcomes of the IT function and provide feedback and recognition
Foster a positive and collaborative culture that values IT as a strategic partner and enabler of the business
The other options are not as good as option C. While it is important to communicate the legal and regulatory requirements, the approved IT investment opportunities, and the need for enterprise architecture (EA), these are not sufficient to demonstrate senior management’s commitment to IT governance. They are rather means to achieve the end goal of implementing and sustaining IT governance. They do not necessarily reflect the level of commitment, involvement, and support from the management toward IT governance. References :=
What is IT Governance? Definition & Examples | ASQ2
What is IT governance? A formal way to align IT & business strategy1
How to Involve Senior Management in the Information Security Governance …3
Which of the following would be the BEST way for an IT steering committee to monitor the adoption of a new enterprise IT strategy?
Options:
Establish key performance indicators (KPIs).
Establish key risk indicators (KRIs).
Schedule ongoing audit reviews.
Implement service level agreements (SLAs)
Answer:
AExplanation:
The best way for an IT steering committee to monitor the adoption of a new enterprise IT strategy is to establish key performance indicators (KPIs), because they are metrics that measure the progress and achievement of the IT strategic objectives and goals, and provide feedback and guidance for improvement. KPIs can help the IT steering committee to track and evaluate the performance and outcomes of the IT function, and to ensure that the IT activities and resources are aligned with the business needs and expectations12. KPIs can also help to communicate and report the IT value delivery and innovation to the board and other stakeholders12. References := ISACA, CGEIT Review Manual, 7th Edition, 2019, page 43-44.
An enterprise-wide strategic plan has been approved by the board of directors. Which of the following would BEST support the planning of IT investments required for the enterprise?
Options:
Service-oriented architecture
Enterprise architecture (EA)
Contingency planning
Enterprise balanced scorecard
Answer:
BExplanation:
Enterprise architecture (EA) is the best option to support the planning of IT investments required for the enterprise, because EA is a practice and a discipline that describes and documents the current and future state of the enterprise’s business processes, applications, data, infrastructure, and security, and how they align with the enterprise’s vision, mission, goals, and objectives. EA can help the enterprise to plan IT investments by providing a holistic view of the enterprise’s IT architecture, identifying the gaps, needs, and opportunities for improvement, innovation, or transformation, and prioritizing and selecting the IT projects, programs, and portfolios that deliver the most value to the stakeholders and customers. According to ISACA’s CGEIT Domain 2: IT Resources1, “EA is a key enabler for IT investment planning and decision making. EA helps to ensure that IT investments are aligned with business strategy and support business outcomes.” Furthermore, according to ISACA’s article on EA2, “EA can help to optimize IT spending by reducing complexity, duplication, and waste, and by increasing efficiency, agility, and interoperability.” Therefore, EA is the best way to support the planning of IT investments required for the enterprise.
An IT strategy committee wants to ensure stakeholders understand who owns each strategic objective. To enable this understanding, which of the following should be communicated to stakeholders?
Options:
A RACI chart
The strategic plan
Performance measure
Risk owners
Answer:
AExplanation:
A RACI chart is a tool that assigns roles and responsibilities for each strategic objective, using the acronym RACI to denote who is Responsible, Accountable, Consulted, and Informed for each objective. A RACI chart can help stakeholders understand who owns each strategic objective, who is involved in its execution, and who needs to be updated on its progress and outcomes. A RACI chart can also help avoid confusion, duplication, or conflict among stakeholders, and ensure clear communication and accountability for each objective.
What should be an IT steering committee's FIRST course of action when an enterprise is considering establishing a virtual reality store to sell its products?
Options:
Request a resource gap analysis.
Request development of key risk indicators (KRIs).
Request a threat assessment.
Request a cost-benefit analysis.
Answer:
DExplanation:
A cost-benefit analysis (CBA) is a process that evaluates the costs and benefits of a project or investment to determine its feasibility and profitability for an organization. A CBA can help the IT steering committee to compare different options for establishing a virtual reality store, such as the required hardware, software, data center, security, marketing, maintenance, etc. A CBA can also help estimate the potential revenues, customer satisfaction, competitive advantage, and social impact of the virtual reality store. A CBA can provide a rational basis for decision-making and prioritization of the project. A CBA should be requested before other actions such as a resource gap analysis, a key risk indicator (KRI) development, or a threat assessment, as they depend on the scope and objectives of the project that are defined by the CBA. References: ISACA, Performance Measurement Metrics for IT Governance, page 11. ProjectManager, Cost-Benefit Analysis: A Quick Guide with Examples and Templates2. HBS Online, Cost-Benefit Analysis: What It Is & How to Do It
A financial services company has implemented the use of a cloud-based centralized customer relationship management (CRM) system. The company has decided to go multi-national. Which of the following should be the enterprise risk management (ERM) committee's PRIMARY consideration?
Options:
Security issues
Vendor capability
Return on investment (ROI)
Compliance issues
Answer:
DExplanation:
Compliance issues should be the primary consideration for the ERM committee because using a cloud-based CRM system in a multi-national context may involve different legal and regulatory requirements regarding data privacy, protection, localization, and transfer. The ERM committee should ensure that the company and the cloud service provider comply with the applicable laws and standards of each country where they operate, as well as the industry-specific regulations such as PCI DSS or GDPR. Compliance issues may also affect the security, vendor capability, and ROI of the cloud-based CRM system, as non-compliance may result in fines, penalties, reputational damage, or loss of customers. References:
CGEIT Review Manual 2021, Chapter 2: IT Risk Management, Section 2.3: Risk Response, page 751
CGEIT Review Questions, Answers & Explanations Manual 2021, Question 4, page 162
Cloud Compliance: What It Is + 8 Best Practices for Improving It2
Overcoming Compliance Issues in Cloud Computing | Tripwire3
Which of the following is the MOST appropriate mechanism for measuring overall IT organizational performance?
Options:
IT portfolio return on investment (ROI)
Maturity model
IT balanced scorecard
Service level metrics
Answer:
CExplanation:
An IT balanced scorecard is the most appropriate mechanism for measuring overall IT organizational performance, because it is a framework that translates the enterprise’s vision and strategy into a set of performance measures that cover four perspectives: financial, customer, internal business process, and learning and growth12. An IT balanced scorecard can help to communicate and monitor the IT strategy and goals, and align the IT activities and resources with the business needs and expectations. An IT balanced scorecard can also provide a balanced and comprehensive view of the IT performance and value delivery, and highlight the strengths, weaknesses, opportunities, and threats for improvement12. References := ISACA, CGEIT Review Manual, 7th Edition, 2019, page 43-44.
Which of the following has PRIMARY responsibility to define the requirements for IT service levels for the enterprise?
Options:
The business manager
The help desk
The CIO
The business continuity vendor
Answer:
AExplanation:
The business manager has the primary responsibility to define the requirements for IT service levels for the enterprise, as they are the ones who understand the business needs, objectives, and expectations from the IT services. The business manager should communicate these requirements to the IT service provider, who should then design, deliver, and monitor the IT services according to the agreed service levels. The help desk, the CIO, and the business continuity vendor are not primarily responsible for defining the IT service level requirements, although they may have roles in supporting, implementing, or ensuring them. References := CGEIT Review Manual, 27th Edition, Domain 1: Governance of Enterprise IT, page 20-21.
A root-cause analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators. Who should be accountable for resolving the situation?
Options:
HR training director
HR recruitment manager
Chief information officer
(CIO) Business process owner
Answer:
CExplanation:
The CIO is responsible for the overall IT governance and ensuring that IT supports the business objectives and strategy. The CIO should also ensure that IT staff have the necessary skills and competencies to perform their roles effectively and efficiently. The CIO should address the root cause of the service disruption and take corrective actions to prevent recurrence. References := CGEIT Review Manual, 27th Edition, Domain 1: Governance of Enterprise IT, page 17-18.
Which of the following would be the MOST effective way to ensure IT capabilities are appropriately aligned with business requirements for specific business processes?
Options:
Establishing key performance indicators {KPIs)
Requiring Internal IT architecture and design reviews
Requiring architecture and design reviews with business process stakeholders
Issuing a management mandate that IT and business process stakeholders work together
Answer:
CExplanation:
Architecture and design reviews are an effective way to ensure that IT solutions are aligned with the business requirements and objectives for specific business processes. By involving the business process stakeholders in these reviews, IT can gain a better understanding of the business needs, expectations, and constraints, as well as receive feedback and validation from the end users. This can help to avoid miscommunication, gaps, or conflicts between IT and business, and ensure that the IT capabilities are fit for purpose and deliver value to the business. References := CGEIT Review Manual, 27th Edition, Domain 1: Governance of Enterprise IT, page 20-21.
An enterprise has lost an unencrypted backup tape of archived customer data. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?
Options:
Initiate disciplinary proceedings against relevant employees.
Mandate a review of backup tape inventory procedures.
Communicate the breach to customers.
Require an evaluation of storage facility vendors.
Answer:
CExplanation:
From an ethical standpoint, the enterprise should communicate the breach to customers, because they have a right to know that their personal data has been compromised and may be at risk of identity theft, fraud, or other malicious activity. Even if the data breach report is not mandatory in the relevant jurisdiction, the enterprise has a moral duty to respect the privacy and dignity of its customers, and to be transparent and accountable for its actions. Communicating the breach to customers can also help to preserve the trust and reputation of the enterprise, and to mitigate the potential legal and financial consequences of the breach. According to some data ethics experts, data breaches should be treated as public health issues, and organizations should adopt a proactive and responsible approach to inform and protect their customers12. Some examples of data breach communication best practices are: notifying customers as soon as possible, providing clear and accurate information about the nature and extent of the breach, explaining what actions the enterprise is taking to remedy the situation and prevent future incidents, offering assistanceand support to affected customers, such as identity protection services or credit monitoring, and apologizing sincerely and expressing commitment to data ethics34.
References :=
Data ethics: What it means and what it takes | McKinsey
The Skeleton of a Data Breach: The Ethical and Legal Concerns
Data breaches: A public health issue? | TheHill
How to Communicate a Data Breach Effectively - IT Governance Blog
The CIO of a global technology company is considering introducing a bring your own device (BYOD) program. What should the CIO do FIRST?
Options:
Ensure the infrastructure can meet BYOD requirements.
Establish a business case.
Define a clear and inclusive BYOD policy.
Focus on securing data and access to data.
Answer:
BExplanation:
The CIO should first establish a business case for the BYOD program, because a business case is a document that outlines the rationale, objectives, benefits, costs, risks, and feasibility of a proposed project or initiative1. A business case can help the CIO to justify the need and value of the BYOD program to the senior management and stakeholders, and to secure the necessary funding and resources for its implementation. A business case can also help the CIO to define the scope, requirements, and success criteria of the BYOD program, and to align it with the enterprise’s strategy, goals, and governance framework2. According to ISACA’s CGEIT Domain 2: IT Resources3, “the enterprise should have a clear business case for each IT investment decision that includes expected benefits, costs, risks and alignment with strategic objectives.” Furthermore, according to ISACA’s article on BYOD, “a business case is essential for any BYOD initiative as it helps to determine whether the benefits outweigh the costs and risks.” Therefore, establishing a business case is the best first step for the CIO who is considering introducing a BYOD program.
As part of the implementation of IT governance, the board of an enterprise should establish an IT strategy committee to:
Options:
provide input to and ensure alignment of the enterprise and IT strategies.
ensure IT risks inherent in the enterprise strategy implementation are managed
drive IT strategy development and take responsibility for implementing the IT strategy.
assume governance accountability for the business strategy on behalf of the board
Answer:
AExplanation:
As part of the implementation of IT governance, the board of an enterprise should establish an IT strategy committee to provide input to and ensure alignment of the enterprise and IT strategies, because this would enable the board to oversee and direct the IT function in a way that supports the enterprise’s vision, mission, goals, and objectives. The IT strategy committee should consist of board members and senior executives who have a stake in the IT performance and value delivery, and who can communicate and coordinate with other board committees and business units. The IT strategy committee should also review and approve the IT strategic plan, monitor the IT performance and outcomes, and ensure the alignment of IT resources and capabilities with the enterprise’s needs and expectations1 . References := ISACA, CGEIT Review Manual, 7th Edition, 2019, page 19-20.
Which of the following is the MOST important input for designing a development program to help IT employees improve their ability to respond to business needs?
Options:
Capability maturity model
Cost-benefit analysis
Skills competency assessment
Annual performance evaluation
Answer:
CExplanation:
According to the CGEIT exam guide, a skills competency assessment is a process of identifying and measuring the skills, knowledge and abilities of IT employees. It helps to determine the current and desired levels of proficiency for each skill, as well as the gaps and needs for improvement. A skills competency assessment is the most important input for designing a development program to help IT employees improve their ability to respond to business needs, as it provides a clear picture of the strengths and weaknesses of the IT workforce, and the areas where training, coaching, mentoring or other interventions are required. References: CGEIT Exam Candidate Guide, page 14. CGEIT Certification, Skills Competency Assessment
To evaluate IT resource management, it is MOST important to define:
Options:
responsibilities for executing resource management.
applicable key goals.
principles for the IT strategy.
IT resource utilization reporting procedures.
Answer:
BExplanation:
According to the CGEIT exam guide, IT resource management is the process of planning, acquiring, allocating, monitoring and optimizing the IT resources of an enterprise to support its strategy, objectives and goals. To evaluate IT resource management, it is most important to define the applicable key goals that the IT resources are expected to achieve or contribute to. These key goals should be aligned with the enterprise’s vision, mission and values, as well as the stakeholder needs and expectations. The key goals should also be specific, measurable, achievable, relevant and time-bound (SMART), and should be communicated and agreed upon by all relevant parties. Defining the applicable key goals will help to assess the performance, value and impact of IT resource management, as well as to identify the gaps, issues and opportunities for improvement. The other options are not as important as defining the applicable key goals, as they are more related to the implementation and execution of IT resourcemanagement, rather than its evaluation. References: CGEIT Exam Candidate Guide, page 14. CGEIT Certification, IT Resource Management
Which of the following should be established FIRST so that data owners can consistently assess the level of data protection needed across the enterprise?
Options:
Data encryption program
Data risk management program
Data retention policy
Data classification policy
Answer:
DExplanation:
A data classification policy is a plan that helps an organization determine the risk tolerance and security requirements for its data assets. A data classification policy separates data into different categories based on its sensitivity, such as public, private, or restricted. A data classification policy should be established first so that data owners can consistently assess the level of data protection needed across the enterprise, as it helps them to identify the types and locations of data they own, the potential threats and impacts of data breaches, and the appropriate security controls and measures to safeguard their data. A data classification policy also helps to ensure compliance with regulatory and legal obligations, as well as to optimize data management and governance practices. References: CGEIT Exam Content Outline | ISACA1, CGEIT Review Manual (Digital Version), Data Classification Policy: Benefits, Examples, and Techniques2, Why data classification is important for security | Infosec3
Which of the following is the PRIMARY consideration when developing an information asset management program?
Options:
Operational requirements
Industry best practice
Cost benefit
Regulatory requirements
Answer:
DExplanation:
Regulatory requirements are the rules and standards that an organization must follow to comply with the laws and regulations that apply to its industry, sector, or jurisdiction. Regulatory requirements can affect how an organization manages its information assets, such as data, documents, records, and reports. Information assets are valuable and sensitive resources that need to be protected from unauthorized access, use, disclosure, modification, or destruction1. Regulatory requirements can specify how information assets should be classified, labeled, handled, stored, transmitted, retained, disposed, and audited23. Failing to comply with regulatory requirements can result in legal penalties, reputational damage, financial losses, or operational disruptions for the organization3. Therefore, regulatory requirements are the primary consideration when developing an information asset management program. The other options are not the primary consideration when developing an information asset management program, although they may be relevant or important factors. Operational requirements are the needs and expectations of the organization and its stakeholders for how information assets should support its business processes and objectives4. Industry best practice are the methods and techniques that have proven to be effective and efficient in managing information assets in a similar context or domain5. Cost benefit is the analysis of the advantages and disadvantages of investing in an information asset management program in terms of resources, time, and money6. These options are all secondary or subordinate to regulatory requirements, because they do not have the same legal or mandatory force. An organization can choose to adapt or modify its operational requirements, industry best practice, or cost benefit analysis based on its situation and preferences, but it cannot ignore or violate its regulatory requirements without consequences. References:
1:
5:
4:
2:
3:
6:
When updating an IT governance framework to support an outsourcing strategy, which of the following is MOST important?
Options:
Evaluating the choice of underlying technology platforms used by the service provider
Ensuring the outsource provider's IT function is aligned with its business function
Verifying the vendor has developed standard operation procedures for outsourced functions
Ensuring the effective management of contracts with third-party providers
Answer:
DExplanation:
When updating an IT governance framework to support an outsourcing strategy, the most important aspect is to ensure the effective management of contracts with third-party providers. Contracts are the legal documents that define the scope, terms, conditions, and expectations of the outsourcing relationship, as well as the roles, responsibilities, and obligations of both parties. Contracts also specify the service level agreements (SLAs), key performance indicators (KPIs), and reporting mechanisms that are used to measure and monitor the quality and performance of the outsourced services. Contracts also provide the mechanisms for resolving disputes, enforcing compliance, and managing changes and risks. Therefore, ensuring the effective management of contracts with third-party providers is essential for achieving the desired outcomes and benefits of outsourcing, as well as for mitigating the potential challenges and issues that may arise from outsourcing. References: Outsourcing Governance Framework1, Guidelines on outsourcing arrangements2, IT governance -managing the outsourcing relationship3
An enterprise has finalized a major acquisition and a new business strategy in line with stakeholder needs has been introduced to help ensure continuous alignment of IT with the new business strategy the CiO should FIRST
Options:
review the existing IT strategy against the new business strategy
revise the existing IT strategy to align with the new business strategy
establish a new IT strategy committee for the new enterprise
assess the IT cultural aspects of the acquired entity
Answer:
AExplanation:
The first step that the CIO should do to help ensure continuous alignment of IT with the new business strategy is to review the existing IT strategy against the new business strategy. A review is a process of evaluating and comparing the current state and performance of the IT strategy with the desired state and expectations of the new business strategy. A review can help identify the strengths, weaknesses, opportunities, and threats of the IT strategy, as well as the gaps, risks, and issues that need to be addressed. A review can also provide insights and recommendations for improving and aligning the IT strategy with the new business strategy. According to COBIT 5, one of the seven enablers of IT governance is performance management, which includes reviewing and monitoring the achievement of IT-related goals and objectives1. The review is also part of the IT governance domain 2: Strategic Alignment2.
The other options are not the first steps that the CIO should do to ensure continuous alignment of IT with the new business strategy. Revising the existing IT strategy to align with the new business strategy is a step that follows after reviewing the existing IT strategy, as it involves making changes and adjustments to the IT strategy based on the findings and recommendations of the review. Establishing a new IT strategy committee for the new enterprise is a step that may or may not be necessary depending on the existing governance structure and processes, and it does not directly address the alignment issue. Assessing the IT cultural aspects of the acquired entity is a step that may be relevant for integrating and harmonizing the IT functions and practices of both entities, but it does not ensure alignment with the new business strategy. References := 1: COBIT 5: A Business Framework for the Governance and Management of Enterprise IT, ISACA, page 312: CGEIT Review Manual 2023, ISACA, page 69.
Which of the following provides the BEST evidence of an IT risk-aware culture across an enterprise?
Options:
Business staff report identified IT risks.
IT risks are communicated to the business.
IT risk-related policies are published.
The IT infrastructure is resilient.
Answer:
AExplanation:
An IT risk-aware culture is one that promotes a shared understanding of risk and supports the organization’s strategy, business model, operational practices, and competitive advantage1. It works to strengthen the core of an organization’s operations and protects customers, the brand, and the bottom line1. An IT risk-aware culture also involves the participation and collaboration of all stakeholders in identifying, assessing, and managing IT risks2. Therefore, the BEST evidence of an IT risk-aware culture across an enterprise is when business staff report identified IT risks. This indicates that the business staff are aware of the potential threats and impacts that IT risks can pose to the organization, and that they are willing and able to communicate and escalate them to the appropriate authorities3.
The other options are not as good as option A. While it is important to communicate IT risks to the business, publish IT risk-related policies, and ensure the resilience of the IT infrastructure, these are not sufficient to demonstrate an IT risk-aware culture across an enterprise. They are rather means to achieve the end goal of managing and mitigating IT risks. They do not necessarily reflect the level of awareness, attitude, and behavior of the organization’s employees toward risk and how risk is managed within the organization. References :=
Cultivating a Risk Intelligent Culture - Deloitte US1
Building an Effective Risk-Aware Culture - Magazine4
7 Steps to Create a Risk-Aware Culture | Treasury & Risk3
Individual business units within an enterprise have been designing their own IT solutions without consulting the IT department. From a governance perspective, what is the GREATEST issue associated with this situation?
Options:
Security controls may not meet IT requirements.
The enterprise does not have the skills to manage the solutions.
The solutions conflict with IT goals and objectives.
The solution may conflict with existing enterprise goals.
Answer:
DTo ensure that information can be traced to the originating event and accountable parties, an enterprise should FIRST:
Options:
capture source information and supporting evidence.
improve business process controls.
review information event logs tor potential incidents.
review retention requirements for source information.
Answer:
AExplanation:
This should be the first step to ensure that information can be traced to the originating event and accountable parties, as it helps to establish the authenticity, integrity, and reliability of the information. Source information and supporting evidence are the data and documents that provide the context, details, and proof of an information event, such as who, what, when, where, why, and how1. By capturing source information and supporting evidence, an enterprise can link the information to its source and originator, verify its accuracy and completeness, and identify its owner and custodian1. Capturing source information and supporting evidence can also help to comply with the legal and regulatory requirements for information traceability, such as data protection, privacy, audit, and e-discovery2. Capturing source information and supporting evidence is a prerequisite for the other options, such as improving business process controls, reviewing information event logs for potential incidents, and reviewing retention requirements for source information, as these activities depend on the availability and quality of the source information and supporting evidence.
An enterprise is planning a transformation initiative by leveraging emerging technology that will have a significant impact on existing products and services Which of the following is the BEST way for IT to prepare for this change?
Options:
Use a balanced scorecard to measure IT outcomes.
Analyze emerging technology products and related training needs.
Procure appropriate resources to support emerging technology
Assess the impact on the existing IT strategy
Answer:
DExplanation:
The best way for IT to prepare for a transformation initiative by leveraging emerging technology that will have a significant impact on existing products and services is to assess the impact on the existing IT strategy. An IT strategy is a plan that defines how IT will support the business strategy and objectives, and how IT will deliver value to the enterprise1. By assessing the impact of the emerging technology on the existing IT strategy, IT can determine whether the current IT vision, mission, goals, and capabilities are aligned with the transformation initiative, and whether they need to be revised or updated2. Assessing the impact of the emerging technology on the existing IT strategy also helps IT to identify and prioritize the opportunities, challenges, and risks that the emerging technology may bring, and to develop appropriate solutions and responses3. Assessing the impact of the emerging technology on the existing IT strategy also helps IT to communicate and collaborate with the business stakeholders, and to ensure that the IT investments are aligned with the business needs and expectations4.
References := IT Strategy: What is it?, How to create an effective IT strategy in 2022, Emerging Technology Strategy: A Guide for CIOs, Maximizing Emerging Technology Adoption Benefits - Gartner
Following the rollout of an enterprise IT software solution that hosts sensitive data it was discovered that the application's role-based access control was not functioning as specified Which of the following is the BEST way to prevent reoccurrence in the future?
Options:
Ensure supplier contracts include penalties if solutions do not meet functional requirements
Ensure the evaluation process requires independent assessment of solutions prior to implementation
Ensure supplier contracts include a provision for the right to audit on an annual basis
Ensure procurement processes require the identification of alternate vendors to ensure business continuity.
Answer:
BExplanation:
An independent assessment is a review by a third party of an authorization decision, a product, a service, or a system to verify its quality, functionality, compliance, or performance. An independent assessment can help identify and mitigate potential risks, errors, or defects before they cause problems or failures. An independent assessment can also provide an objective and unbiased opinion on the suitability and effectiveness of a solution for a specific purpose or context.
By requiring an independent assessment of solutions prior to implementation, the enterprise can ensure that the solutions meet the functional requirements and specifications, as well as the security and privacy standards and policies. This can prevent issues such as the malfunctioning of role-based access control, which could compromise the confidentiality, integrity, and availability of sensitive data. An independent assessment can also help evaluate the compatibility and interoperability of solutions with existing systems and processes, and provide recommendations for improvement or optimization.
Some examples of independent assessment methods are:
Independent verification and validation (IV&V): A process that checks whether a system meets its defined requirements and specifications, and whether it fulfills its intended purpose and functions.
Independent technical review (ITR): A process that evaluates the technical aspects of a system, such as its design, architecture, performance, reliability, security, usability, maintainability, and scalability.
Independent security assessment (ISA): A process that assesses the security posture of a system, such as its vulnerability to threats, its compliance with security standards and regulations, its implementation of security controls and measures, and its response to security incidents.
Which of the following is MOST important to review during IT strategy development?
Options:
Industry best practices
IT balanced scorecard
Current business environment
Data flows that indicate areas requiring IT support
Answer:
CExplanation:
The most important thing to review during IT strategy development is the current business environment, as it reflects the internal and external factors that affect the enterprise’s performance, objectives, and needs. The current business environment includes the analysis of the enterprise’s strengths, weaknesses, opportunities, and threats (SWOT), as well as the assessment of the market trends, customer demands, competitor actions, and regulatory requirements. Reviewing the current business environment can help align the IT strategy with the business strategy, as well as identify and prioritize the IT initiatives and investments that can support and enable the enterprise’s goals and value proposition.
Industry best practices, IT balanced scorecard, and data flows that indicate areas requiring IT support are also important things to review during IT strategy development, but they are not the most important thing. Industry best practices are the methods or techniques that have been proven to be effective or efficient in achieving a desired outcome or result in a specific domain or context. Industry best practices can help benchmark and improve the IT strategy, as well as adopt or adapt the best solutions or innovations from other enterprises or sectors. IT balanced scorecard is a set of metrics that measure the performance of IT in relation to the enterprise’s vision, strategy, and goals. IT balanced scorecard can help evaluate and communicate the effectiveness and efficiency of IT strategy, as well as its contribution to customer satisfaction, business value, and innovation. Data flows that indicate areas requiring IT support are the diagrams or models that show how data is collected, processed, stored, and distributed within or across the enterprise’s processes or systems. Data flows can help identify and address the gaps or issues in IT service delivery or data management, as well as optimize or integrate the data systems or tools.
An internal audit revealed a widespread perception that the enterprise's IT governance reporting lacks transparency Which of the following should the CIO do FIRST?
Options:
Add stakeholder transparency metrics to the balanced scorecard
Develop a communication and awareness strategy
Meet with key stakeholders to understand their concerns
Adopt an industry-recognized template to standardize reports.
Answer:
CExplanation:
The CIO should first meet with key stakeholders to understand their concerns about the IT governance reporting transparency. This will help the CIO to identify the root causes of the perception, the expectations and needs of the stakeholders, and the gaps and issues in the current reporting process. Meeting with key stakeholders will also help to build trust and rapport, and to solicit feedback and suggestions for improvement. The CIO can then use this information to develop a communication and awareness strategy, adopt a standard template, and add transparency metrics to the balanced scorecard. These actions will help to enhance the transparency, consistency, and quality of the IT governance reporting, and to address the stakeholder concerns effectively. References := How Boards Realise IT Governance Transparency: A Study Into Current Practice of the COBIT EDM05 Process, Page 1.
Which of the following is the MOST important reason to include internal audit as a stakeholder when establishing clear roles for the governance of IT?
Options:
Internal audit has knowledge and technical expertise to advise on IT infrastructure.
Internal audit is accountable for the overall enterprise governance of IT.
Internal audit implements controls over IT risks and security.
Internal audit provides input on relevant issues and control processes.
Answer:
DExplanation:
Internal audit is an independent and objective function that provides assurance and consulting services to the enterprise on the effectiveness and efficiency of its governance, risk management,and control processes1. By including internal audit as a stakeholder, the enterprise can benefit from its knowledge, expertise, and perspective on IT-related issues and risks, such as IT strategy alignment, IT performance measurement, IT value delivery, IT resource management, IT risk management, and IT compliance2. Internal audit can also provide input on the design, implementation, and evaluation of the IT governance framework, policies, standards, and procedures, as well as recommend improvements and best practices2. Therefore, internal audit provides input on relevant issues and control processes, which is the most important reason to include it as a stakeholder when establishing clear roles for the governance of IT.
The other options are not as important or accurate as option D. Internal audit does not have knowledge and technical expertise to advise on IT infrastructure, as this is not its primary role or responsibility. Internal audit is not accountable for the overall enterprise governance of IT, as this is the responsibility of the board of directors and senior management3. Internal audit does not implement controls over IT risks and security, as this is the responsibility of the IT function and other business units4.
A health tech enterprise wants to ensure that its in-house developed mobile app for users complies with data privacy regulations. Which of the following should be identified FIRST when creating an inventory of information systems and data related to the mobile app?
Options:
Data maintained by vendors
Vendors and outsourced systems
Application and data owners
Information classification scheme
Answer:
CExplanation:
This should be identified first when creating an inventory of information systems and data related to the mobile app, as they are the individuals or groups who have the authority and responsibility to define, classify, protect, and manage the data assets of the enterprise1. By identifying the application and data owners, the enterprise can ensure that the data is properly accounted for, categorized, and secured according to its value, sensitivity, and risk. Application and data owners can also establish data policies, standards, and procedures, as well as monitor and report on data quality, usage, and compliance1. Identifying the application and data owners is a prerequisite for identifying the other options, such as data maintained by vendors, vendors and outsourced systems, and information classification scheme, as these depend on the accurate identification and assignment of data ownership roles and responsibilities.
The PRIMARY objective of promoting business ethics within the IT enterprise should be to ensure:
Options:
trust among internal and external stakeholders.
employees act more responsibly.
corporate social responsibility.
legal and regulatory compliance.
Answer:
AExplanation:
Business ethics is the application of ethical values to business behaviour. It encompasses the people, processes, and technologies required to manage and protect data assets1. Promoting business ethics within the IT enterprise should be the primary objective because it ensures trust among internal and external stakeholders, such as customers, employees, suppliers, regulators, and society234. Trust is important because it makes cooperation possible, enhances performance, fosters engagement, and creates long-term value21. While the other options are also desirable outcomes of business ethics, they are not the primary objective. Employees acting more responsibly, corporate social responsibility, and legal and regulatory compliance are all consequences of trust-building rather than the main goal. References:
2:
1:
3:
4:
An enterprise's global IT program management office (PMO) has recently discovered that several IT projects are being run within a specific region without knowledge of the PMO. The projects are on time, on budget, and will deliver the proposed benefits to the specific region. Which of the following should be the PRIMARY concern of the PMO?
Options:
Inability to reduce the impact to the risk level of the global portfolio
Projects may not follow system development life cycle (SDLC)
Lack of control and impact to the overall PMO budget
Answer:
AExplanation:
According to the CGEIT exam guide, a global IT program management office (PMO) is responsible for overseeing and coordinating the IT projects and programs across the enterprise, ensuring alignment with the enterprise’s strategy, objectives and governance framework. A PMO also helps to identify, assess, monitor and mitigate the risks associated with IT projects and programs, and to optimize the benefits and value delivered by IT investments. Therefore, the primary concern of the PMO should be the inability to reduce the impact to the risk level of the global portfolio, as this could jeopardize the overall performance and success of the enterprise’s IT initiatives. If several IT projects are being run within a specific region without knowledge of the PMO, this could create potential risks such as duplication of efforts, lack of integration, inconsistency of standards and practices, misalignment of expectations and requirements, and conflicts of interests or resources. These risks could negatively affect the quality, efficiency and effectiveness of the IT projects and programs, as well as their alignment with the enterprise’s strategy, objectives and governance framework. The PMO should be aware of all IT projects and programs within the enterprise, and ensure that they follow a consistent and transparent process of planning, execution, monitoring and control. The PMO should also ensure that the IT projects and programs are aligned with the enterprise’s risk appetite and tolerance, and that they are regularly assessed for their risks, benefits and value. References: CGEIT Exam Candidate Guide, page 14. CGEIT Certification, The Role of Program Management Offices (PMOs) in Driving Business Strategy Execution
An enterprise has entered into a new market which brings additional regulatory compliance requirements. What should be done FIRST to address these requirements?
Options:
Outsource the compliance process.
Appoint a compliance officer.
Update the organization's risk profile.
Have executive management monitor compliance.
Answer:
CExplanation:
According to the CGEIT exam guide, the organization’s risk profile is a representation of the current and potential risks that the organization faces, as well as the likelihood and impact of those risks. The risk profile helps to inform the risk management strategy, policies and processes, as well as the risk appetite and tolerance of the organization. When an enterprise enters into a new market that brings additional regulatory compliance requirements, the first thing that should be done is to update the organization’s risk profile to reflect the new sources, types and levels of risk that the enterprise may encounter. This will help to identify and assess the compliance risks, as well as to plan and implement appropriate risk responses and controls. The other options are not the first things that should be done, as they are more related to the execution and monitoring of compliance, rather than the identification and assessment of compliance risks. References: CGEIT Exam Candidate Guide, page 15. CGEIT Certification, How to Develop a Risk Profile
Which of the following is the BEST way to maximize the value of an enterprise’s information asset base?
Options:
Seek additional opportunities to leverage existing information assets.
Facilitate widespread user access to all information assets
Regularly purge information assets to minimize maintenance costs
Implement an automated information management platform
Answer:
AExplanation:
The value of an enterprise’s information asset base is the amount of benefits or advantages that the enterprise can derive from its information assets, such as data, documents, records, and reports. Information assets are valuable and sensitive resources that need to be protected, managed, and used effectively and efficiently to support and achieve the enterprise’s objectives and goals1. To maximize the value of an enterprise’s information asset base, the best way is to seek additional opportunities to leverage existing information assets. This means finding new or innovative ways to use or reuse the information assets to create more value for the enterprise, such as improving performance, quality, customer satisfaction, innovation, or competitive advantage23. For example, an enterprise can leverage its existing information assets by analyzing them to generate insights, combining them to create new products or services, sharing them with partners or stakeholders to enhance collaboration, or monetizing them to generate revenue23.
The other options are not the best ways to maximize the value of an enterprise’s information asset base. Facilitating widespread user access to all information assets may increase the availability and utilization of the information assets, but it may also compromise their confidentiality and integrity. Not all information assets are appropriate or relevant for all users, and some may contain sensitive or confidential data that need to be restricted or protected1 . Therefore, facilitating widespread user access to all information assets may not maximize their value, but rather increase their risk. Regularly purging information assets to minimize maintenance costs may reduce the storage and management expenses of the information assets, but it may also eliminate their potential value or usefulness. Not all information assets are obsolete or redundant, and some may have long-term or strategic value for the enterprise1 . Therefore, regularly purging information assets to minimize maintenance costs may not maximize their value, but rather decrease their availability. Implementing an automated information management platform may improve the efficiency and effectiveness of the information asset management process, but it may not necessarily increase the value of the information asset base. An automated information management platform is a tool or system that helps to collect, store, process, analyze, and distribute information assets. However, it does not guarantee that the information assets are used or leveraged in optimal ways to create more value for the enterprise23. Therefore, implementing an automated information management platformmay not maximize the value of the information asset base, but rather facilitate its management. References:
2:
1:
3:
To develop appropriate measures to improve organizational performance, the measures MUST be:
Options:
a result of benchmarking and comparative analysis.
accepted by and meaningful to the stakeholders.
based on existing and validated data sources.
approved by the IT steering committee.
Answer:
BExplanation:
To develop appropriate measures to improve organizational performance, the measures must be accepted by and meaningful to the stakeholders, because they are the ones who will use the measures to monitor and evaluate the achievement of the enterprise’s objectives and goals. Themeasures should be relevant, reliable, valid, and understandable for the stakeholders, and aligned with their expectations and needs . References := ISACA, CGEIT Review Manual, 7th Edition, 2019, page 43-44.
An independent consultant has been hired to conduct an ad hoc audit of an enterprise’s information security office with results reported to the IT governance committee and the board Which of the following is MOST important to provide to the consultant before the audit begins?
Options:
Acceptance of the audit risks and opportunities
The scope and stakeholders of the audit
The organizational structure of the security office
The policies and framework used by the security office
Answer:
BExplanation:
The scope and stakeholders of the audit are the most important information to provide to the consultant before the audit begins, because they define the objectives, boundaries, and expectations of the audit. The scope and stakeholders of the audit are also part of the IT governance domain 1: Framework for the Governance of Enterprise IT1. References := 1: CGEIT Review Manual 2023, ISACA, page 23.
Which of the following BEST indicates that a change management process has been implemented successfully?
Options:
Maturity levels
Degree of control
Process performance
Outcome measures
Answer:
DExplanation:
Outcome measures are tools used to assess the effect, both positive and negative, of an intervention or treatment1. Outcome measures can indicate whether a change management process has been implemented successfully by comparing the actual results of the change with the expected or desired results2. Outcome measures can also help evaluate the impact of the change on the organization’s performance, quality, and value3. The other options are not the best indicators of successful change management implementation. Maturity levels are a way of assessing the degree of development and sophistication of a process, but they do not necessarily reflect the outcomes or benefits of the process4. Degree of control is a measure of how well aprocess is managed and monitored, but it does not capture the effectiveness or efficiency of the process. Process performance is a measure of how well a process meets its objectives and requirements, but it does not account for the outcomes or consequences of the process. References:
3:
2:
1:
4:
An IT risk committee is trying to mitigate the risk associated with a newly implemented bring your own device (BYOD) policy and supporting mobile device management (MDM) tools. Which of the following would be the BEST way to ensure employees understand how to protect sensitive corporate data on their mobile devices?
Options:
Require staff to complete security awareness training
Develop security procedures for mobile devices.
Distribute the BYOD policy on the company Intranet.
Require staff to review and sign nondisclosure agreements (NDAs)
Answer:
AExplanation:
Security awareness training is the best way to ensure employees understand how to protect sensitive corporate data on their mobile devices, as it can educate them on the risks, policies, and best practices of BYOD and MDM. Security awareness training can also help employees recognize and avoid common threats, such as phishing, malware, and data leakage. Security procedures, BYOD policy, and NDAs are also important, but they are not sufficient to ensure employees have the knowledge and skills to secure their mobile devices. Security procedures and BYOD policy need to be communicated and enforced effectively, and NDAs only protect the legal rights of the organization, not the actual data on the devices. References := The Ultimate Guide to BYOD Security: Definition & More - Digital Guardian; What is BYOD? | IBM; How to have secure remote working with a BYOD policy; 5 Best Practices in BYOD Policy for Small Business - Scalefusion; BYOD Reignited: How To Get It Right This Time - Forbes.
Which of the following has the GREATEST influence on data quality assurance?
Options:
Data stewardship
Data encryption
Data classification
Data modeling
Answer:
AExplanation:
Data stewardship is the process of defining, implementing, and enforcing policies, standards, roles, and responsibilities for the quality, security, privacy, and usage of data within an enterprise1. Data stewardship has the greatest influence on data quality assurance, as it ensures that the data is accurate, complete, consistent, timely, and fit for its intended purpose1. Data stewardship also helps to identify and resolve data quality issues, monitor and measure data quality performance, and improve data quality over time1. The other options are not as influential as data stewardship, as they are specific aspects or techniques of data management, but not comprehensive processes. Data encryption is the process of transforming data into an unreadable format to protect it from unauthorized access or modification2. Data encryption can enhance data security and privacy, but it does not directly affect data quality assurance. Data classification is the process of categorizing data based on its value, sensitivity, and risk to the enterprise. Data classification can help to apply appropriate controls and policies for data protection and compliance, but it does not directly affect data quality assurance. Data modeling is the process of creating a representation of the structure, relationships, and meaning of data within a specific domain or context. Data modeling can help to design and optimize databases and applications that use data, but it does not directly affect data quality assurance.
Which of the following is the BEST indication that information security requirements are taken into consideration when developing IT processes?
Options:
The database is deployed in a distributed processing platform
The information architecture incorporates data classification
Customer profiles are stored with a domestic service provider
The integrity of sensitive information is periodically reviewed
Answer:
BExplanation:
Data classification is a process of organizing and categorizing data based on its characteristics, confidentiality, and sensitivity. Data classification helps to determine the level of access and protection that data requires. Data classification also makes data easier to understand, compare, and analyze. Data classification is an essential part of information security, as it helps to align the security measures and policies with the data’s value and risk. By incorporating data classification into the information architecture, the IT processes can ensure that information security requirements are taken into consideration from the design stage to the implementation stage. References :=
What is Data Classification? A Data Classification Definition
What is Sensitive Data? Definition, Examples, and More
Which of the following is MOST important for an IT strategy committee to ensure before initiating the development of an IT strategic plan?
Options:
Committee members are apprised of business needs
A risk assessment has been conducted.
Committee members are independent from business units.
IT initiatives are fully supported by the business.
Answer:
AExplanation:
According to the CGEIT exam guide, the IT strategy committee should ensure that the IT strategic plan is aligned with the business needs and goals of the enterprise. Therefore, before initiating the development of an IT strategic plan, the committee members should be apprised of the business needs and understand the expectations and requirements of the stakeholders. References: CGEIT Exam Candidate Guide, page 13. CGEIT Certification
When developing an IT training plan, which of the following is the BEST way to ensure that resource skills requirements are identified?
Options:
Extract training requirements from deficiencies reported in customer service satisfaction surveys.
Ask managers to determine IT training requirements annually.
Determine training needs based on the capabilities to support the IT strategy.
Survey employees for IT skills requirements based upon technology trends.
Answer:
CExplanation:
An IT training plan is a document that outlines the learning objectives, activities, and resources for developing the skills and competencies of IT staff and stakeholders1. The best way to ensure that resource skills requirements are identified is to determine training needs based on the capabilities to support the IT strategy. The IT strategy is a document that defines the vision, mission, goals, and objectives of IT in alignment with the business strategy2. The IT strategy also identifies the current and future IT capabilities that are needed to deliver value and achieve the desired outcomes3. By assessing the gap between the current and future IT capabilities, the training needs can be derived and prioritized according to the IT strategy. This way, the IT training plan can ensure that the resource skills requirements are relevant, consistent, and effective for supporting the IT strategy.
References :=
How to Create an Effective IT Training Plan | Simplilearn
What is an IT Strategy? - Definition from Techopedia
IT Strategy: A 3-step Process To Creating Your Own
[How to Conduct a Training Needs Analysis: A Template & Example]
An enterprise is adopting a new governance framework. Of the following, the MOST effective method to help ensure that key activities are performed by appropriate resources is through the use of:
Options:
a RACI chart.
an organizational breakdown structure.
a work breakdown structure.
Answer:
AExplanation:
A RACI chart is a matrix that defines the roles and responsibilities of different stakeholders in a project or process. RACI stands for Responsible, Accountable, Consulted and Informed. A RACI chart can help ensure that key activities are performed by appropriate resources by clarifying who is responsible for doing the work, who is accountable for the outcome, who needs to be consulted for input or feedback, and who needs to be informed of the progress or results. References: ISACA, Reporting Cybersecurity Risk to the Board of Directors, page 8.
Which of the following is the BEST indication that enterprise value is being derived from IT?
Options:
IT strategy supports continuous improvement initiatives
Metrics are established for IT performance.
Rate of return for projects is achieved.
IT services enable business strategy.
Answer:
DExplanation:
Enterprise value is being derived from IT when IT services enable business strategy, meaning that IT supports and enhances the enterprise’s vision, mission, goals and objectives. IT services enable business strategy by aligning with the enterprise’s needs and expectations, delivering value to the stakeholders and customers, and facilitating innovation and transformation. According to the COBIT 5 framework1, one of the principles of governance of enterprise IT (GEIT) is “meeting stakeholder needs”, which implies that enterprises exist to create value for their stakeholders by maintaining a balance between the realization of benefits, optimization of risk and use of resources1. Therefore, IT services should be designed, delivered and monitored in a way that contributes to the creation of value for the enterprise.
What should be done FIRST when feedback indicates recently implemented software products are not meeting business unit expectations?
Options:
Review help desk logs.
Confirm user acceptance testing (UAT) was completed.
Request a gap analysis.
Institute a new software training program
Answer:
CExplanation:
A gap analysis is a method of assessing the differences in performance between a business’ information systems or software applications to determine whether business requirements are being met and, if not, what steps should be taken to ensure they are met successfully1. A gap analysis typically involves identifying non-compliant processes or activities; assessing their risklevels; determining potential corrective actions that can be taken to address them; and implementing those corrective measures1. Once completed, organizations can then measure their progress toward achieving full compliance over time1.
A gap analysis should be done first when feedback indicates recently implemented software products are not meeting business unit expectations, as it can help identify the root causes of the dissatisfaction, the gaps between the current and desired state of the software products, and the actions needed to close those gaps. A gap analysis can also help align the software products with the business strategy, goals, and expectations, as well as ensure compliance with regulations and policies.
Reviewing help desk logs, confirming user acceptance testing (UAT) was completed, and instituting a new software training program are also important steps to take when software products are not meeting expectations, but they are not the first step. Reviewing help desk logs can help gather feedback and identify issues or errors with the software products, but it does not provide a comprehensive analysis of the gaps and solutions. Confirming UAT was completed can help verify that the software products were tested by the end users before implementation, but it does not address the reasons why the feedback was negative after implementation. Instituting a new software training program can help improve the user’s skills and knowledge of the software products, but it does not guarantee that the software products will meet their needs and expectations.
References := What is Gap Analysis in Compliance | Scytale; How to Perform an IT Gap Analysis - Systems X; IT Gap Analysis – First Step to ITIL Success | Invensis Learning.
Which of the following roles should approve major IT purchases to help prevent conflicts of interest?
Options:
IT steering committee
Chief information officer (CIO)
Chief compliance officer
Project management office (PMO)
Answer:
AExplanation:
because this is a role that should approve major IT purchases to help prevent conflicts of interest. An IT steering committee is a group of senior executives and board members who are responsible for overseeing and directing the IT function and ensuring that it aligns with the enterprise’s vision, mission, goals, and strategy12. An IT steering committee should approve major IT purchases, such as hardware, software, services, or projects, to ensure that they are justified, prioritized, and aligned with the business needs and expectations, and that they deliver value and performance to the enterprise12. An IT steering committee should also ensure that the IT procurement process is transparent, fair, and ethical, and that there are no conflicts of interest or undue influence from the IT vendors or suppliers1
To enable IT to deliver adequate services and maintain availability of a web-facing infrastructure, an IT governance committee should FIRST establish:
Options:
web operations procedures.
business continuity plans (BCPs).
key performance indicators (KPIs).
customer survey processes.
Answer:
CExplanation:
Key performance indicators (KPIs) are metrics that help measure the performance of IT service delivery and align it with the business goals and stakeholder expectations. KPIs can help the IT governance committee to monitor, evaluate and improve the availability, quality and efficiency of the web-facing infrastructure. KPIs can also help identify and address any issues or risks that may affect the service level agreements (SLAs) or customer satisfaction. KPIs should be established before implementing other measures such as web operations procedures, business continuity plans (BCPs) or customer survey processes, as they provide the basis for setting objectives, targets and benchmarks for these measures. References: ISACA, Performance Measurement Metrics for IT Governance, page 11. datapine, Top 20 IT KPIs - Explore The Best IT KPI Examples & IT Metrics
To minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations which of the following is the BEST action to take?
Options:
Update the information architecture
Revise the IT strategic plan
Implement data loss prevention (DLP)
Establish new IT key risk indicators (KRIs)
Answer:
CExplanation:
Data loss prevention (DLP) is a set of tools and processes that aim to prevent the unauthorized disclosure, misuse, or theft of sensitive data. DLP can help to minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations by detecting and blocking any attempts to access, copy, or transfer the data without proper authorization or consent. References := CGEIT Review Manual, Chapter 4: Risk Optimization, Section 4.2: IT Risk Management Processes, Subsection 4.2.3: Risk Response, Page 155.
An enterprise's board of directors has determined that IT is not sufficiently supporting its corporate objectives, and has established a committee to address this problem. Which of the following should be the committees FIRST action?
Options:
Implement a continuous improvement plan.
Specify IT human resource performance measures.
Create an IT strategic plan.
Develop a service level management plan.
Answer:
CExplanation:
This should be the committee’s first action, as it will help to define how the IT function supports and enables the overall business strategy and objectives of the enterprise1. An IT strategic plan is a document that outlines the vision, mission, goals, and initiatives of the IT function, as well as the resources, processes, and metrics required to achieve them1. By creating an IT strategic plan, the committee can align IT with business needs and expectations, optimize IT investments andresources, manage IT risks and opportunities, and deliver value to the stakeholders1. Creating an IT strategic plan can also help to communicate and demonstrate the role and contribution of IT to the enterprise’s success, and to gain the support and commitment of the board of directors and senior management1.
The other options are not as important or effective as creating an IT strategic plan, as they are either specific solutions or outcomes of the IT strategic plan, but not comprehensive steps. Implementing a continuous improvement plan may help to enhance the quality and efficiency of IT services and processes, but it may not address the root cause or causes of IT not sufficiently supporting the corporate objectives, which could be related to other factors, such as strategy alignment, value delivery, resource management, or risk optimization2. Specifying IT human resource performance measures may help to evaluate and improve the skills and productivity of IT staff, but it may not address the root cause or causes of IT not sufficiently supporting the corporate objectives, which could be related to other factors, such as stakeholder engagement, communication, collaboration, or feedback3. Developing a service level management plan may help to define and monitor the expectations and agreements for IT service delivery between IT providers and customers, but it may not address the root cause or causes of IT not sufficiently supporting the corporate objectives, which could be related to other factors, such as business requirements, customer satisfaction, innovation, or agility.
Business management is seeking assurance from the CIO that controls are in place to help minimize the risk of critical IT systems being unavailable during month-end financial processing. What is the BEST way to address this concern?
Options:
Create a communication plan with risk owners.
Outsource infrastructure hosting.
Restrict and monitor user access.
Develop key risk indicators (KRIs) and action plans.
Answer:
DExplanation:
because this would help to address the concern of business management that controls are in place to help minimize the risk of critical IT systems being unavailable during month-end financial processing. Key risk indicators (KRIs) are metrics that measure the potential impact and likelihood of the risks that may affect the IT performance and outcomes, and provide early warning signals for taking corrective actions12. Action plans are specific steps and tasks that are designed to implement the risk response strategies, such as avoiding, reducing, transferring, or accepting the risks12. Developing KRIs and action plans can help the CIO to monitor and manage the risks of IT system unavailability, and to ensure that the expected benefits and value are realized. Developing KRIs and action plans can also help to communicate and report the risk scenarios and their consequences to business management, and to demonstrate the effectiveness and efficiency of the IT controls12.
Which of the following should be identified FIRST when determining appropriate IT key risk indicators (KRIs)?
Options:
IT-related risk
IT controls
IT threats
IT objectives
Answer:
AExplanation:
IT key risk indicators (KRIs) are metrics that measure the likelihood and impact of IT-related risks on the enterprise’s objectives and goals. Therefore, the first step in determining appropriate IT KRIs is to identify the IT-related risks that are relevant and significant for the enterprise. IT controls, IT threats and IT objectives are also important factors in developing IT KRIs, but they are not the first step. IT controls are the measures that mitigate or reduce IT risks, IT threats are the sources of potential harm or loss to IT assets or processes, and IT objectives are the desired outcomes or results of IT activities that support the enterprise’s strategy and goals. References := ISACA, CGEIT Review Manual, 7th Edition, 2019, p. 90-91; Integrating KRIs and KPIs for Effective Technology Risk Management; Performance Measurement Metrics for IT Governance; State and Impact of Governance of Enterprise IT in Organizations: Key Findings of an International Study.
The PRIMARY reason for implementing an IT governance program in an enterprise is to
Options:
balance the demand for information and the ability to deliver.
complies with regulatory requirements
reduce risks due to improved compensating controls.
decrease the scale of investment in information systems due to budgetary controls.
Answer:
AExplanation:
IT governance is a formal framework that provides a structure for organizations to ensure that IT investments support business objectives. IT governance helps align IT and business strategies, manage IT risks and benefits, and deliver value to key stakeholders. One of the main objectives of IT governance is to balance the demand for information and the ability to deliver it in an effective and efficient manner. References :=
CGEIT Review Manual 2023, Chapter 1: Framework for the Governance of Enterprise IT, page 8
CGEIT Review Questions, Answers & Explanations Manual 2023, Question 277, page 65
When assessing the impact of a new regulatory requirement, which of the following should be the FIRST course of action?
Options:
Update affected IT policies.
Assess the budget impact of the new regulation.
Map the regulation to business processes.
Implement new regulatory requirements.
Answer:
CExplanation:
The first course of action when assessing the impact of a new regulatory requirement is to map the regulation to business processes. This means identifying and analyzing which business processes are affected by the new regulation, how they are affected, and what changes are needed to comply with the regulation1. Mapping the regulation to business processes helps to understand the scope, complexity, and priority of the regulatory compliance project, and to align the IT and business objectives and strategies1. It also helps to identify the stakeholders, roles, responsibilities, and risks involved in the compliance process, and to communicate and coordinate with them effectively1. The other options are not as important as mapping the regulation to business processes, as they are dependent on the outcome of this step. Updatingaffected IT policies, assessing the budget impact of the new regulation, and implementing new regulatory requirements are subsequent steps that should be done after mapping the regulation to business processes2. References: How to Map Regulations to Business Processes. CGEIT Certification | Certified in Governance of Enterprise IT | ISACA.
Which of the following would be MOST helpful to an enterprise that wants to standardize how sensitive corporate data is handled?
Options:
Information classification framework
Enterprise risk policy
Enterprise risk management (ERM) framework
Information security policy
Answer:
AExplanation:
An information classification framework would be the most helpful to an enterprise that wants to standardize how sensitive corporate data is handled, because it provides a systematic and consistent way to identify, label, and protect the data according to its level of sensitivity and the impact of its exposure. An information classification framework helps to define the criteria and methods for classifying data into different categories, such as public, internal, confidential, or secret1. It also helps to specify the roles and responsibilities, policies and procedures, standards and expectations, and tools and techniques for handling data securely and appropriately throughout its life cycle2. An information classification framework also helps to comply with the legal and regulatory requirements, and to reduce the risks, costs, and complexity associated with data management3.
References := Information classification – How to do it according to ISO 27001, Create a well-designed data classification framework, Information classification framework diagram.
Which of the following is MOST important to consider when planning to implement a cloud-based application for sharing documents with internal and external parties?
Options:
Cloud implementation model
User experience
Information ownership
Third-party access rights
Answer:
CExplanation:
Information ownership is the right and responsibility to define, classify, protect, and manage the data assets of an enterprise. When using a cloud-based application, the enterprise should ensure that it retains the ownership and control of its information, and that it complies with the relevant laws and regulations regarding data privacy, security, and sovereignty12. The enterprise should also establish clear policies and agreements with the cloud service provider and the internal and external parties regarding the access, usage, storage, transfer, retention, and disposal of the information12. By considering information ownership, the enterprise can mitigate the risks and challenges of using a cloud-based application, such as data breaches, unauthorized access, vendor lock-in, legal disputes, or reputational damage12.
The other options are not as important as information ownership, as they are secondary or dependent factors. Cloud implementation model is the type of cloud service that the enterprise chooses to use, such as software as a service (SaaS), platform as a service (PaaS), or infrastructure as a service (IaaS)3. Cloud implementation model can affect the cost, performance, scalability, and flexibility of the cloud-based application, but it does not directly affect the ownership and governance of the information3. User experience is the perception and satisfaction of the users when interacting with the cloud-based application. User experience can affect the adoption, engagement, and productivity of the users, but it does not directly affect the ownership and governance of the information. Third-party access rights are the permissions and restrictions that the enterprise grants to external parties to access and use its information through the cloud-based application. Third-party access rights can affect the security and privacy of the information, but they are determined by the information ownership policies and agreements that the enterprise establishes with the cloud service provider and the external parties12.
Which of the following should be the PRIMARY goal of implementing service level agreements (SLAs) with an outsourcing vendor?
Options:
Gaining a competitive advantage
Establishing penalties for not meeting service levels
Achieving operational objectives
Complying with regulatory requirements
Answer:
CExplanation:
The primary goal of implementing service level agreements (SLAs) with an outsourcing vendor is to achieve operational objectives, such as improving service quality, efficiency, effectiveness, and value. SLAs are contracts that define the scope, standards, and expectations of the service delivery, as well as the roles, responsibilities, and rights of both parties. SLAs can help align the outsourcing vendor’s services with the enterprise’s strategy, goals, and needs, as well as monitor and measure their performance and outcomes. SLAs can also help manage the risks, costs, and benefits of outsourcing, as well as resolve any issues or disputes that may arise.
Gaining a competitive advantage, establishing penalties for not meeting service levels, and complying with regulatory requirements are possible benefits or outcomes of implementing SLAs with an outsourcing vendor, but they are not the primary goal. Gaining a competitive advantage is a strategic objective that may result from outsourcing some IT functions or processes to a vendor that can provide better or cheaper services than the enterprise itself or its competitors. Establishing penalties for not meeting service levels is a mechanism that can be included in SLAs to enforce accountability and compliance, as well as to compensate for any losses or damages caused by poor service delivery. Complying with regulatory requirements is a legal obligation that may affect the design and implementation of SLAs, especially when outsourcing involves sensitive or personal data or cross-border transactions.
References := 12 Service Level Agreement (SLA) best practices for IT leaders; Contents The Complete Guide To IT Service Level Agreements - IT Governance; Service level management and service level agreements - IT Governance; Service Level Agreements: A Legal and Practical Guide.
An enterprise has identified potential environmental disasters that could occur in the area where its data center is located. Which of the following should be done NEXT?
Options:
Implement an early warning detection and notification system.
Assess the likelihood and impact on the data center.
Relocate the data center to minimize the threat.
Assess how the data center is protected against the threat.
Answer:
BExplanation:
An enterprise that has identified potential environmental disasters that could occur in the area where its data center is located should next assess the likelihood and impact on the data center, because this would help to evaluate the level of risk and prioritize the appropriate risk response strategies. The likelihood and impact assessment should consider the frequency, severity, duration, and scope of the potential disasters, and the potential consequences for the data center’s availability, integrity, confidentiality, and performance12. References := ISACA, CGEIT Review Manual, 7th Edition, 2019, page 75-76.
The MAIN responsibility of the board of directors regarding the management of enterprise risk is to:
Options:
ensure a risk process exists which addresses the risk appetite.
sustain investment in staff training regarding IT risk.
promote a benefits-driven culture throughout the enterprise.
maintain awareness of IT risk to the business.
Answer:
AExplanation:
The main responsibility of the board of directors regarding the management of enterprise risk is to ensure a risk process exists which addresses the risk appetite, because this would help the board to oversee and direct the enterprise’s risk management activities and ensure that they are aligned with the enterprise’s strategic objectives and value creation. The risk process should include identifying, assessing, responding, monitoring, and reporting the risks that may affect the enterprise’s performance and outcomes, and ensuring that the risks are within the acceptable level that the enterprise is willing and able to tolerate12. The other options are not the main responsibility of the board of directors, because they are either part of or dependent on the risk process.
The FIRST step in aligning resource management to the enterprise's IT strategic plan would be to
Options:
develop a responsible, accountable, consulted and informed (RACI) chart
assign appropriate roles and responsibilities
perform a gap analysis
identify outsourcing opportunities
Answer:
CExplanation:
The first step in aligning resource management to the enterprise’s IT strategic plan would be to perform a gap analysis. A gap analysis is a process of comparing the current state and performance of the IT resources with the desired state and expectations of the IT strategic plan. IT resources include people, processes, technology, and information that support the delivery and management of IT services and solutions1. A gap analysis can help identify the strengths, weaknesses, opportunities, and threats of the IT resources, as well as the gaps, risks, and issues that need to be addressed. A gap analysis can also provide insights and recommendations for improving and aligning the IT resources with the IT strategic plan. According to 2, one of the steps in developing an IT strategic plan is to conduct a gap analysis to assess the current capabilities and resources of the IT organization and determine the gaps between the current and future states.
The other options are not the first steps in aligning resource management to the enterprise’s IT strategic plan. Developing a responsible, accountable, consulted and informed (RACI) chart is a step that may be done after performing a gap analysis, as it involves defining and clarifying the roles and responsibilities of the IT stakeholders for each task or activity in the IT strategic plan3. Assigning appropriate roles and responsibilities is a step that may be done after performing a gap analysis, as it involves allocating and delegating the IT resources to the relevant tasks or activities in the IT strategic plan. Identifying outsourcing opportunities is a step that may be done after performing a gap analysis, as it involves evaluating and selecting external vendors or partners that can provide IT services or solutions that are not available or feasible internally4. References := 1: What are IT Resources? Definition & Examples - BMC Software13: RACI Chart: Definition & Example - Project Management34: Outsourcing: Definition & Examples - Investopedia42: How to Create an Effective IT Strategy - Smartsheet2
The risk committee is overwhelmed by the number of false positives included in risk reports. What action would BEST address this situation?
Options:
Conduct a risk assessment
Evaluate key risk indicators (KRIs).
Change the reporting format.
Adjust the IT balanced scorecard
Answer:
BExplanation:
The best action to address the situation of the risk committee being overwhelmed by the number of false positives in risk reports is to evaluate key risk indicators (KRIs). KRIs are metrics that measure the likelihood and impact of IT-related risks on the enterprise’s objectives and goals. Evaluating KRIs can help the risk committee to identify and prioritize the most significant and relevant risks, as well as to adjust the thresholds or values that trigger the risk alerts or warnings. Evaluating KRIs can also help reduce the number of false positives, which are the cases where the risk reports indicate a high level of risk, but the actual risk is low or negligible. Reducing false positives can help improve the accuracy and reliability of risk reports, as well as save time and resources for the risk committee.
Conducting a risk assessment, changing the reporting format, and adjusting the IT balanced scorecard are also possible actions to take to address the situation of the risk committee being overwhelmed by false positives, but they are not the best action. Conducting a risk assessment is a process that involves identifying, analyzing, evaluating, and treating the IT risks that may affect the enterprise’s objectives and operations. Conducting a risk assessment can help update and validate the risk information and data, as well as implement appropriate controls and mitigation strategies. However, conducting a risk assessment may not be sufficient or feasible to address the issue of false positives, as it may require a lot of time and effort, and it may not address the root causes of false positives, such as inaccurate or outdated KRIs. Changing the reporting format is a measure that involves modifying or improving the way that risk information and data are presented or communicated in risk reports. Changing the reporting format can help enhance and simplify the readability and usability of risk reports, as well as highlight or emphasize the key points or findings. However, changing the reporting format may not solve the problem of false positives, as it may only affect the appearance or style of risk reports, not their content or quality. Adjusting the IT balanced scorecard is a task that involves revising or updating the metrics that track the performance of IT in relation to the enterprise’s vision, strategy, and goals. Adjusting the IT balanced scorecard can help evaluate and communicate the effectiveness and efficiency of IT operations, services, and projects, as well as their contribution to customer satisfaction, business value, and innovation. However, adjusting the IT balancedscorecard may not directly address the issue of false positives, as it may focus on different aspects or dimensions of IT performance than KRIs.
Which of the following is a responsibility of an IT strategy committee?
Options:
Providing oversight on enterprise strategy implementation
Approving the business strategy and its IT implications
Advising the board on the development of IT goals
Tracking projects in the IT investment portfolio
Answer:
CExplanation:
One of the responsibilities of an IT strategy committee is to advise the board on the development of IT goals that are aligned with the enterprise strategy and objectives. The IT strategy committee is a high-level governance body that provides guidance and direction on IT matters to the board and management. The IT strategy committee does not approve the business strategy or its IT implications, as this is the role of the board. The IT strategy committee also does not provide oversight on enterprise strategy implementation or track projects in the IT investment portfolio, as these are the roles of the management and the IT steering committee, respectively123. References := 1: PART 2 – CISA Domain 2 – Governance and Management of IT12: TO STEER OR TO STRATEGIZE –DIFFERENCES BETWEEN IT STEERING COMMITTEES AND IT STRATEGY COMMITTEES43: Building an IT Governance Committee - HBS Working Knowledge
A new chief information officer (CIO) of an enterprise recommends implementing portfolio management after realizing there is no process in place for evaluating investments prior to selection. What should be the PRIMARY strategic goal driving this decision?
Options:
Maximize value from the combined investments.
Standardize processes for investment evaluation.
Align investments to the enterprise architecture (EA).
Enable transparency within the investment process.
Answer:
AExplanation:
Portfolio management is the process of selecting, prioritizing, monitoring and controlling the projects, programs and other related work that best align with the enterprise’s strategic objectives and deliver the most value to the stakeholders. The primary strategic goal of implementing portfolio management is to maximize value from the combined investments by ensuring that they are aligned with the enterprise’s vision, mission, goals and values, and that they are optimized in terms of risk, return and resource allocation. References: CGEIT Domain 2: IT Resources
Which of the following is the GREATEST benefit of using a quantitative risk assessment method?
Options:
It uses resources more efficiently
It can be used to assess risks against non-tangible assets
It reduces subjectivity
It helps in prioritizing risk response action plans
Answer:
CExplanation:
A quantitative risk assessment method uses numerical values and mathematical models to estimate the likelihood and consequences of risks. This reduces the subjectivity and bias that may arise from qualitative methods that rely on personal judgment and experience. A quantitative method also allows for more objective comparison and prioritization of risks based on their impact and probability. References :=
Quantitative Risk Analysis (Definition, Benefits and Steps) - Indeed
Risk Assessment and Analysis Methods: Qualitative and Quantitative - ISACA
The CIO in a large enterprise is seeking assurance that significant IT risk is being proactively monitored and does not exceed agreed risk tolerance levels. The BEST way to provide this ongoing assurance is to require the development of:
Options:
an IT risk appetite statement.
a risk management policy.
key risk indicators (KRIs).
a risk register.
Answer:
CExplanation:
According to the CGEIT certification guide, key risk indicators (KRIs) are the best way to provide ongoing assurance that significant IT risk is being proactively monitored and does not exceed agreed risk tolerance levels. KRIs are metrics that measure the likelihood or impact of potential or actual risks, and provide early warning signals of increasing risk exposures1. KRIs can help IT management to track and report the status and trends of IT risks, and to trigger timely responses and actions when the risk levels approach or exceed the predefined thresholds2. The other options are less suitable than option C, as they do not provide ongoing assurance or proactive monitoring of IT risk. An IT risk appetite statement is a document that expresses the amount and type of risk that an organization is willing to take in order to meet their strategic objectives3. A risk management policy is a document that defines the principles, framework, and processes for managing risks in an organization. A risk register is a tool that records and tracks the identified risks, their causes, impacts, likelihood, responses, and owners.
References :=
CGEIT certification guide, domain 3: Risk Optimization, section 3.4: Risk Monitoring and Assurance, page 98.
Key Risk Indicators (KRIs) - Definition from KWHS
Risk Appetite - an overview | ScienceDirect Topics
Risk Management Policy - an overview | ScienceDirect Topics
Risk Register - an overview | ScienceDirect Topics
The CIO of an enterprise learns the payroll server of a competitor has been the victim of ransomware. To help plan for the possibility of ransomed corporate data, what should be the ClO's FIRST course of action?
Options:
Require development of key risk indicators (KRls).
Develop a policy to address ransomware.
Request a targeted risk assessment.
Back up corporate data to a secure location.
Answer:
CExplanation:
The first course of action for the CIO of an enterprise to help plan for the possibility of ransomed corporate data should be to request a targeted risk assessment. This is because a targeted risk assessment can help to identify and evaluate the specific threats, vulnerabilities, and impacts of ransomware attacks on the enterprise’s data and systems. A targeted risk assessment can also help to determine the likelihood and severity of ransomware incidents, as well as the appropriate controls and mitigation strategies to reduce the risk to an acceptable level.
Requiring development of key risk indicators (KRIs) is not the first course of action, as it is a monitoring tool for measuring the risk exposure and performance. KRIs are metrics that provide information on the current level and trend of risk in relation to the risk appetite and tolerance of the enterprise. KRIs can help to track and report the progress and effectiveness of the risk management activities, as well as alert the management of any potential issues or changes that may affect the risk profile. However, requiring development of KRIs does not provide a comprehensive analysis or improvement plan for ransomed corporate data.
Developing a policy to address ransomware is not the first course of action, as it is a result of conducting a targeted risk assessment. A policy to address ransomware is a document that defines the rules, guidelines, and responsibilities for preventing, detecting, responding to, and recovering from ransomware attacks. Developing a policy to address ransomware can help to communicate the expectations and requirements for ransomware protection and compliance, as well as enforce accountability and governance for ransomware incidents. However, developing a policy to address ransomware does not provide a detailed assessment or guidance for ransomed corporate data.
Backing up corporate data to a secure location is not the first course of action, as it is an implementation step after conducting a targeted risk assessment and developing a policy to address ransomware. Backing up corporate data to a secure location can help to preserve the availability, integrity, and confidentiality of the data in case of a ransomware attack. Backing up corporate data to a secure location can also help to restore the data and resume normal operations after a ransomware attack. However, backing up corporate data to a secure location does not provide a thorough risk analysis or governance framework for ransomed corporate data.
References := Ransomware Risk Management: NISTIR 8374, 3 Risk Management Process section. Managing the Risks of Ransomware - SEI Blog, Assess Your Risk section. Ransomware Risk Management - NIST, 4 Ransomware Risk Management Profile section. NIST Releases Tips and Tactics for Dealing With Ransomware, Back Up Your Data section.
An enterprise has had the same IT governance framework in place for several years. Currently, large and small capital projects go through the same architectural governance reviews. Despite repeated requests to streamline the review process for small capital projects, business units have received no response from IT. The business units have recently escalated this issue to the newly appointed GO. Which of the following should be done FIRST to begin addressing business needs?
Options:
Create a central repository for the business to submit requests.
Explain the importance of the IT governance framework.
Assess the impact of the proposed change.
Assign a project team to implement necessary changes.
Answer:
CExplanation:
Assessing the impact of the proposed change is the first step to begin addressing business needs, as it helps to understand the current state of the IT governance framework, the gaps and issues that need to be resolved, and the potential benefits and risks of the change. An impact assessment can also provide a basis for prioritizing and planning the change, and for engaging and communicating with the stakeholders12. References := CGEIT Exam Content Outline, Domain 1, Subtopic A: Governance Framework, Task 4: Ensure that a continual improvement process is in place to maintain and enhance the performance and maturity of IT governance.
To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?
Options:
IT staff morale
Core IT processes
Outsourcer's reputation
New service level agreements (SLAs)
Answer:
BExplanation:
The most important consideration during the decision-making process of outsourcing some IT services is to identify the core IT processes that are critical for the organization’s strategic objectives and competitive advantage. Core IT processes are those that provide unique value to the organization and differentiate it from its competitors. Outsourcing core IT processes may result in loss of control, innovation, and differentiation, as well as increased dependency and risk. Therefore, core IT processes should be retained in-house, while non-core IT processes can be outsourced to benefit from economies of scale, cost reduction, and access to specialized skills and technologies. References := CGEIT Exam Content Outline, Domain 3: Benefits Realization1; COBIT 5: Enabling Processes, chapter 4, section 4.2.32; IT governance -managing the outsourcing relationship
An enterprise decides to accept the IT risk of a subsidiary located in another country even though it exceeds the enterprise's risk appetite. Which of the following would be the BEST justification for this decision?
Options:
Risk framework alignment
Local market common practices
Compliance with local regulations
Technical gaps among subsidiaries
Answer:
CExplanation:
The best justification for the enterprise’s decision to accept the IT risk of a subsidiary located in another country even though it exceeds the enterprise’s risk appetite would be compliance with local regulations. This is because local regulations may impose different or stricter requirements on the subsidiary’s IT operations, such as data protection, cybersecurity, or privacy laws. Compliance with local regulations may be mandatory or beneficial for the subsidiary to operate legally and effectively in the foreign market. Therefore, the enterprise may decide to accept the IT risk of the subsidiary as a trade-off for complying with local regulations and avoiding potential penalties or reputational damage12.
The other options are less convincing than option C, as they do not provide a strong rationale for accepting the IT risk of the subsidiary. Risk framework alignment is the process of ensuring that the subsidiary’s IT risk management practices are consistent and compatible with the enterprise’s IT risk management framework. While this may help to improve the communication and coordination of IT risk management across the enterprise, it does not justify accepting the IT risk of the subsidiary that exceeds the enterprise’s risk appetite. Local market common practices are the norms and standards that prevail in the foreign market where the subsidiary operates. While these may influence the subsidiary’s IT risk management decisions, they do not necessarily override the enterprise’s risk appetite or strategy. Technical gaps among subsidiaries are the differences or discrepancies in the IT systems, processes, or capabilities of different subsidiaries within the enterprise. While these may pose challenges or risks for the enterprise’s IT governance and performance, they do not explain why the enterprise would accept the IT risk of a subsidiary that exceeds its risk appetite.
Acceptance of an enterprise's newly implemented IT governance initiatives has been resisted by a functional group requesting more autonomy over technology choices. Which of the following is MOST important to accommodate this need for autonomy?
Options:
Continuous improvement processes
Documentation of key management practices
An exception management process
A change control process
Answer:
CExplanation:
An exception management process is a method for documenting and approving an exception to compliance with established IT governance policies, standards, and practices. An exception management process can accommodate the need for autonomy over technology choices by allowing a functional group to request and justify a deviation from the IT governance requirements, based on the business needs, risks, costs, and benefits. An exception management process can also help to ensure that the exceptions are reviewed and approved by the appropriate authorities, that the exceptions are monitored and reported, and that the exceptions are aligned with the IT strategy and objectives123. References: Exception Management Process Flow. IT/Information Security Exception Request Process. Strategies, Governance, Policies, Standards and Resources.
An enterprise's service center is experiencing long delays in fulfilling! T service requests and very low customer satisfaction. The BEST way to determine if staff competency is the root cause of these performance problems is to compare required staff competencies with:
Options:
certification requirements.
current skills inventory.
training program completions.
hiring and staffing practices.
Answer:
BExplanation:
The best way to determine if staff competency is the root cause of the performance problems is to compare the required staff competencies with the current skills inventory of the service center staff. This will help identify any gaps or mismatches between what is expected and what is available in terms of skills and knowledge. References: CGEIT Review Manual, 7th Edition, page 113.
Prior to setting IT objectives, an enterprise MUST have established its:
Options:
architecture.
policies.
strategies.
controls.
Answer:
CExplanation:
Prior to setting IT objectives, an enterprise must have established its strategies. Strategies are the high-level plans that define the direction and goals of the enterprise and how it will achieve them. Strategies provide the context and guidance for setting IT objectives, which are the specific and measurable outcomes that IT will deliver to support the strategies. IT objectives should be aligned with and derived from the enterprise strategies, as well as the enterprise vision, mission, and values
An enterprise can BEST assess the benefits of a new IT project through its life cycle by:
Options:
calculation of the total cost of ownership.
periodic review of the business case.
periodic measurement of the project slip rate.
calculation of the net present value (NPV).
Answer:
BExplanation:
A business case is a document that outlines the rationale, objectives, benefits, costs, risks and alternatives of a proposed IT project. A business case should be reviewed periodically throughout the project life cycle to ensure that the project is still aligned with the enterprise’s strategy and goals, and that the expected benefits are still achievable and realistic. A periodic review of the business case can also help to identify any changes or issues that may affect the project’s scope, schedule, budget or quality, and to take corrective actions accordingly. References: ISACA, CGEIT Review Manual, 7th Edition, 2019, page 77. A guide to measuring benefits effectively. Cost-Benefit Analysis: A Quick Guide with Examples and Templates.
A marketing enterprise is considering procuring customer information to more accurately target customer communications and increase sales. The data has a very high cost to the enterprise. Which of the following would provide the MOST comprehensive view into the potential value to the organization?
Options:
Investment services board review
Net present value {NPV) calculation
Risk assessment results
Cost-benefit analysis results
Answer:
DExplanation:
The most comprehensive view into the potential value of procuring customer information for a marketing enterprise would be provided by the cost-benefit analysis results. A cost-benefit analysis is a method of comparing the costs and benefits of a project or decision in monetary terms. It helps to evaluate the feasibility, profitability, and efficiency of the project or decision, and to identify the best alternative among different options. A cost-benefit analysis can also incorporate non-monetary factors, such as social and environmental impacts, by assigning them monetary values or weights. A cost-benefit analysis can show the net benefit (or net cost) of procuring customer information, as well as the benefit-cost ratio, the payback period, and the internal rate of return. These indicators can help the marketing enterprise to assess how well the procurement of customer information aligns with its objectives, strategies, and budget, and how much value it can create for the enterprise and its customers
An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?
Options:
Revising the business $ balanced store card
Updating the business risk profile
Changing the IT steering committee charter
Calculating the cost of the current solution
Answer:
BExplanation:
A business risk profile is a document that identifies and evaluates the potential risks that can affect the performance, objectives, and strategy of an organization. A business risk profile can help to prioritize and mitigate the risks, as well as to align the risk management activities with the business goals and needs12.
If an enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider, the IT steering committee’s primary concern should be updating the business risk profile. This is because using an external cloud service provider may introduce new or increased risks for the enterprise, such as security, privacy, compliance, availability, performance, or vendor lock-in risks3 . Updating the business risk profile can help the IT steering committee to assess the impact and likelihood of these risks, to evaluate the effectiveness and adequacy of the existing controls and safeguards, to identify and implement any additional measures or actions to address the gaps or issues, and to monitor and report the risk status and outcomes12. References: Business Risk Profile: Definition & Examples. How to Create a Business Risk Profile. A risk assessment model for selecting cloud service providers. Cloud Computing Security for Cloud Service Providers.
Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?
Options:
Poor desktop service delivery
Data retention
Redundant systems
Poor business decisions
Answer:
DExplanation:
Information architecture (IA) is the practice of structuring and presenting the parts of something — whether that’s a website, mobile app, blog post, book, or brick-and-mortar store — to users so that it’s easy to understand. IA can help users find information and complete tasks1.
An enterprise that has ineffective information architecture may suffer from poor business decisions, because it may not be able to access, analyze, or use the data and information that are relevant, accurate, consistent, and timely for decision making. Poor business decisions can lead to negative consequences, such as losing customers, market share, revenue, or competitive advantage, or facing legal, financial, reputational, or operational risks23.
Some examples of how ineffective information architecture can impact business decisions are:
If the enterprise’s website has a confusing or inconsistent navigation system, users may not be able to find the information they need or want, such as product details, prices, reviews, or contactinformation. This can result in lower customer satisfaction, engagement, conversion, and retention14.
If the enterprise’s data is stored in multiple systems or platforms that are not integrated or interoperable, users may not be able to access or share the data across different departments or functions. This can result in data silos, duplication, inconsistency, or incompleteness25.
If the enterprise’s data is not labeled or categorized properly, users may not be able to search or filter the data effectively. This can result in data overload, irrelevance, or obscurity25.
If the enterprise’s data is not governed or managed properly, users may not be able to trust or verify the data quality or integrity. This can result in data errors, inaccuracies, or biases25.
Therefore, an enterprise that has ineffective information architecture may have poor business decisions as its greatest impact. References: Information Architecture Basics | Usability.gov. The Importance of Information Architecture to UX Design. How Enterprise Architecture Can Help You Eliminate Technical Debt. What Is Information Architecture & Why Does It Matter? - HubSpot Blog. Why Do We Need Information Architecture - Architecture.
An enterprise's internal audit group has scheduled a control review of a payroll system project but has been told to wait until the system is implemented. Which of the following is the GREATEST risk associated with the delay?
Options:
delay in the development of new key performance indicators (KPIs)
Continued dependency on compliant legacy systems
Increased cost to mitigate deficiencies
Lack of adherence to industry best practices
Answer:
CExplanation:
Delaying the control review of a payroll system project until after its implementation increases the risk of discovering control weaknesses or errors that could have been prevented or corrected earlier. This would result in increased cost to mitigate the deficiencies and ensure the system’s reliability and compliance. References: CGEIT Domain 4: Risk Optimization
It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?
Options:
Enterprise architecture (EA)
Enterprise risk framework
IT service management
IT project roadmap
Answer:
AExplanation:
Enterprise architecture (EA) is a discipline that defines and organizes the components, relationships, principles, and standards of an organization’s IT environment. EA can help to align IT with business strategy and objectives, optimize IT performance and value, and manage IT complexity and change12.
One of the benefits of EA is that it can help to address the concern of duplicate IT applications and services across an enterprise. EA can help to identify and eliminate the redundancies, inconsistencies, and inefficiencies in the IT landscape, by providing a holistic and integrated view of the current and future state of IT. EA can also help to rationalize and consolidate the IT applications and services, by establishing a common framework, taxonomy, and governance for IT decision making. EA can also help to improve the integration and interoperability of IT applications and services, by defining the interfaces, protocols, and standards for data exchange123.
Some examples of how EA can help to address the concern of duplicate IT applications and services are:
EA can help to conduct an inventory and assessment of the existing IT applications and services, to determine their purpose, scope, functionality, quality, cost, and value. EA can also help to compare and contrast the IT applications and services across different business units, to identify the overlaps, gaps, or conflicts among them4.
EA can help to define and prioritize the business needs and requirements for IT applications and services, to ensure that they support the business goals and processes. EA can also help to evaluate and select the best IT solutions for each business need, based on criteria such as feasibility, suitability, scalability, security, compliance, etc5.
EA can help to design and implement a target IT architecture that eliminates or minimizes the duplicate IT applications and services, by using approaches such as application portfolio management (APM), service-oriented architecture (SOA), or cloud computing. EA can also help to plan and execute a migration strategy that ensures a smooth transition from the current to the target state .
EA can help to monitor and control the IT applications and services, by using metrics, indicators, and reports to measure their performance, availability, reliability, quality, and value. EA can also help to review and update the IT applications and services regularly, by using feedback mechanisms and continuous improvement practices .
Senior management wants to expand offshoring to include IT services as other types of business offshoring have already resulted in significant financial benefits for the enterprise. The CIO is currently midway through a successful five-year strategy that relies heavily on internal IT resources. What should the CIO do NEXT?
Options:
Reevaluate the offshoring strategy.
Abandon the current IT strategy.
Continue with the existing IT strategy.
Reevaluate the current IT strategy.
Answer:
DExplanation:
The CIO should reevaluate the current IT strategy in light of the senior management’s decision to expand offshoring to include IT services. This means that the CIO should assess the impact of offshoring on the existing IT objectives, plans, resources, capabilities, risks, and performance. The CIO should also consider the potential benefits and challenges of offshoring IT services,such as cost reduction, access to talent, quality assurance, communication, coordination, and security. The CIO should then revise the current IT strategy to align with the enterprise’s offshoring strategy and goals, and communicate the changes to the relevant stakeholders
An enterprise considering implementing IT governance should FIRST develop the scope of the IT governance program and:
Options:
initiate the program using an implementation roadmap.
establish initiatives for business and managers.
acquire the resources that will be required.
communicate the program to stakeholders to gain consensus.
Answer:
DExplanation:
Communicating the program to stakeholders to gain consensus is the first step after developing the scope of the IT governance program, as it helps to ensure that the program is aligned with the enterprise goals and objectives, and that it has the support and commitment of the key parties who have an interest or influence in the IT governance. Communication also helps to overcome resistance, address concerns, and foster collaboration among the stakeholders12. References := CGEIT Exam Content Outline, Domain 1, Subtopic A: Governance Framework, Task 3: Ensure that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance against agreed-on direction and objectives.
Which of the following BEST reflects the ethical values adopted by an IT organization?
Options:
IT principles and policies
IT balanced scorecard
IT governance framework
IT goals and objectives
Answer:
AExplanation:
IT principles and policies are the documents that best reflect the ethical values adopted by an IT organization. IT principles are the high-level statements that express the fundamental beliefs and values of the organization regarding the use and management of IT. IT policies are the specific rules and guidelines that implement the IT principles and ensure compliance with ethical standards and regulations. IT principles and policies help to align IT with business objectives, foster a culture of trust and responsibility, and promote good governance practices. References := CGEIT Exam Content Outline, Domain 1: Governance of Enterprise IT, Subtopic A: Governance Framework, Task 2: Ensure that a framework is in place to support the alignment of IT with enterprise objectives, enabling value creation. Ethics for IT Professionals/ProfessionalCode of Ethics, Ethical Code section. Values and Ethics in Information Systems, Introduction section. Purpose, Ethical Values, Culture and Behaviours, Ethical Values section.
An enterprise's board of directors can BEST manage enterprise risk by:
Options:
mandating board-approved enterprise risk management (ERM) modifications.
requiring the establishment of an enterprise risk management (ERM) framework.
requiring the establishment of an enterprise-wide program management office.
ensuring the cost-effectiveness of the internal control system.
Answer:
BExplanation:
An enterprise’s board of directors can best manage enterprise risk by requiring the establishment of an ERM framework. An ERM framework is a methodology that looks at risk management strategically from the perspective of the entire firm or organization. It is a top-down strategy that aims to identify, assess, and prepare for potential losses, dangers, hazards, and other potentialsfor harm that may interfere with an organization’s operations and objectives and/or lead to losses. An ERM framework provides structured feedback and guidance to business units, executive management, and board members implementing and managing ERM programs. An ERM framework helps establish a consistent risk management culture, regardless of employee turnover or industry standards. It also often involves making the risk plan of action available to all stakeholders as part of an annual report
Which of the following is the BEST way to demonstrate that IT strategy supports a new enterprise strategy?
Options:
Monitor new key risk indicators (KRIs).
Measure return on IT investments against balanced scorecards.
Review and update the portfolio management process.
Map IT programs to business goals.
Answer:
DExplanation:
The best way to demonstrate that IT strategy supports a new enterprise strategy is to map IT programs to business goals. This will show how IT initiatives are aligned with and contribute to the achievement of the enterprise vision, mission, and objectives. Mapping IT programs to business goals will also help to prioritize, monitor, and evaluate the performance and value of IT investments
Which of the following is the MOST effective approach to ensure senior management sponsorship of IT risk management?
Options:
Benchmark risk framework against best practices.
Calculate financial impact for each IT risk finding.
Periodically review the IT risk register entries.
Integrate IT risk into enterprise risk management (ERM).
Answer:
DExplanation:
According to the CGEIT certification guide, the most effective approach to ensure senior management sponsorship of IT risk management is to integrate IT risk into enterprise risk management (ERM). This is because ERM is a holistic and strategic approach that considers all types of risks that may affect the achievement of the enterprise’s objectives. By integrating IT risk into ERM, senior management can better understand the impact and interdependencies of IT risks on the enterprise’s performance and value, and can provide more effective oversight and guidance to the IT risk management processes1. The other options are less effective than option D, as they do not address the alignment and integration of IT risk with the enterprise’s strategy and objectives. References:= CGEIT certification guide, domain 3: Risk Optimization, section 3.1: Risk Governance, page 86.
A CIO believes that a recent mission-critical IT decision by the board of directors is not in the best financial interest of all stakeholders. Which of the following is the MOST ethical course of action?
Options:
Share concerns with the legal department.
Request a meeting with the board.
Engage an independent cost-benefit analysis.
Request an internal audit review of the board's decision.
Answer:
BExplanation:
Requesting a meeting with the board is the most ethical course of action for the CIO who believes that a recent mission-critical IT decision by the board of directors is not in the best financial interest of all stakeholders, as it allows the CIO to express their concerns and opinions in a respectful and professional manner, and to provide relevant information and evidence to support their views. Requesting a meeting with the board also demonstrates the CIO’s commitment and accountability to the enterprise’s goals and values, and their willingness to collaborate and communicate with the board on IT governance matters123. References := CGEIT Exam Content Outline, Domain 1, Subtopic A: Governance Framework, Task 3: Ensure that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance against agreed-on direction and objectives.
An IT governance committee wants to ensure there is a clear description of the "data owner" in the enterprise data policy. Which of the following would BEST define the owner of data stored in an external cloud?
Options:
The business leader who is most impacted by the loss of data.
The risk manager who is responsible for protecting data stored in the cloud.
The contract manager who monitors the security of the cloud provider.
The vendor who submits the data to the organization via online forms
Answer:
AExplanation:
The owner of data stored in an external cloud is the business leader who is most impacted by the loss of data. This is because the data owner is the person who has the accountability and authority over a specific dataset, and who is responsible for its security, quality, classification, and access control12. The data owner is usually a senior-level employee or a subject-matter expert who has the knowledge and motivation to ensure that the data is handled correctly and in compliance with policies and regulations2. The data owner is not the same as the data custodian, who is the person who implements the technical and operational measures to protect and manage the data according to the data owner’s directives2. Therefore, the risk manager, the contract manager, and the vendor are not the data owners, as they do not have the final say or accountability over the data stored in the external cloud. References: What Is a Data Owner? - Firewall Times1, Data Owners vs. Data Stewards vs. Data Custodians - CPO Magazine2
An enterprise's information security function is making changes to its data retention and backup policies. Which of the following presents the GREATEST risk?
Options:
Business data owners were not consulted.
The new policies Increase the cost of data backups.
Data backups will be hosted at third-party locations.
The retention period for data backups is Increased.
Answer:
AExplanation:
Business data owners were not consulted is the answer that presents the greatest risk, as it implies that the information security function did not consider the needs, expectations, and requirements of the stakeholders who are responsible for the data. Business data owners should be involved in the development and implementation of data retention and backup policies, as they can provide input on the value, sensitivity, and classification of the data, as well as the legal and regulatory obligations for data preservation and protection12. Without consulting the business data owners, the information security function may create policies that are inconsistent, ineffective, or detrimental to the enterprise’s objectives and operations.
IT has launched new portfolio management policies and processes to improve the alignment of IT projects with enterprise goals. The latest audit report indicates that no improvement has been made due to confusion in the decision-making process. Which of the following is the BEST course of action for the CIO?
Options:
Deliver prioritization and facilitation training.
Implement a performance management framework.
Create an IT portfolio management risk framework.
Develop and communicate an accountability matrix.
Answer:
DExplanation:
The best course of action for the CIO is to develop and communicate an accountability matrix. An accountability matrix, also known as a responsibility assignment matrix, is a project management tool that defines the roles and responsibilities of different stakeholders in a project or process1 An accountability matrix can help to clarify who is responsible, accountable, consulted, and informed (RACI) for each task or deliverable, and avoid confusion and ambiguity in the decision-making process2 By developing and communicating an accountability matrix, the CIO can ensure that the IT portfolio management policies and processes are understood and followed by all the relevant parties, and that the IT projects are aligned with the enterprise goals. References: RACI Matrix: Responsibility Assignment Matrix Guide 20233, Responsibility assignment matrix - Wikipedia2, Accountability Matrix - Explained - The Business Professor, LLC1
Which of the following should be the MAIN governance focus when implementing a newly approved bring your own device (BYOD) policy?
Options:
Recommending mobile applications that will increase business productivity
Training employees on the enterprise's chosen mobile device management system
Educating employees on the increased IT security risk to the enterprise
Understanding knowledge gaps of IT employees to support different mobile platforms
Answer:
CExplanation:
The main governance focus when implementing a newly approved BYOD policy is to educate employees on the increased IT security risk to the enterprise. BYOD introduces various challenges and threats to the enterprise’s data and network security, such as device loss or theft, unauthorized access, malware infection, data leakage, and compliance violations. Therefore, it is essential to raise the awareness and understanding of employees on the potential risks and their responsibilities in protecting the enterprise’s assets and information. Educating employees on the IT security risk can also help to foster a culture of security and compliance, and to promote best practices for BYOD usage, such as following the acceptable use policy, installing security software, and reporting incidents. References := The Ultimate Guide to BYOD Security: Definition & More - Digital Guardian; Enterprise mobility and security: How to build a BYOD policy; Bring Your Own Device for Executives | Cyber.gov.au
Which of the following MOST effectively prevents an IT system from becoming technologically obsolete before its planned return on investment (ROi)?
Options:
Requesting periodic third-party assessments of the system throughout its life
Obtaining long-term support commitments from the system platform vendors)
Obtaining independent assurance that the system will conform to future business requirements
Ensuring that the system is maintained in compliance with enterprise architecture (EA) standards
Answer:
DExplanation:
Ensuring that the system is maintained in compliance with enterprise architecture (EA) standards is the most effective way to prevent an IT system from becoming technologically obsolete before its planned return on investment (ROI), because it ensures that the system is aligned with the current and future business needs, goals, and strategies of the organization. Enterprise architecture (EA) standards define the principles, guidelines, and best practices for designing, developing, and managing IT systems in a consistent, coherent, and integrated manner across the organization. By following EA standards, IT leaders can ensure that the system is compatible with the existing and emerging technologies, platforms, and frameworks that support the business processes and functions. EA standards also help IT leaders to monitor and evaluate the performance, quality, security, and reliability of the system, and to identify and address anygaps, issues, or risks that may affect its functionality or value. EA standards also facilitate the communication and collaboration among different stakeholders involved in the system lifecycle, such as business users, IT staff, vendors, and auditors. By maintaining the system in compliance with EA standards, IT leaders can ensure that the system delivers the expected benefits and value to the organization and achieves its planned ROI. References := ISO/IEC/IEEE 42020:2019(en), Software, systems and enterprise ? Architecture processes, Sample: Enterprise Architecture Standards - CIO Portal, Obsolescence management for IT leaders - Information Age
Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?
Options:
Significant gaps are present m the incident documentation.
The incident was not logged in the ticketing system.
Response decisions were made without consulting the appropriate authority.
Response efforts had to be outsourced due to insufficient internal resources.
Answer:
CExplanation:
The finding that should be of greatest concern to senior management is that response decisions were made without consulting the appropriate authority. This is because response decisions are critical actions that can affect the outcome and impact of a security incident, and they should be made by the designated authority who has the responsibility and accountability for the incident response. According to CISA, the Department of Justice, through the FBI and the NCIJTF, is thelead agency for threat response during a significant incident, with DHS’s investigative agencies—the Secret Service and ICE/HSI - playing a crucial role in criminal investigations1. If response decisions are made without consulting the appropriate authority, it may result in:
Legal or regulatory violations: The response actions may not comply with the applicable laws or regulations, such as data breach notification, evidence preservation, or privacy protection. This may expose the organization to legal or regulatory penalties, lawsuits, or reputational damage.
Ineffective or counterproductive actions: The response actions may not be aligned with the incident response plan, best practices, or standard operating procedures. This may cause more harm than good, such as escalating the incident, destroying evidence, or compromising recovery efforts.
Lack of coordination and communication: The response actions may not be coordinated or communicated with the relevant stakeholders, such as senior management, legal counsel, public relations, or external partners. This may lead to confusion, inconsistency, or mistrust among the parties involved in the incident response.
Therefore, senior management should be most concerned about the finding that response decisions were made without consulting the appropriate authority, and they should take corrective actions to prevent this from happening again in the future. References: Cybersecurity Incident Response | CISA1
While monitoring an enterprise's IT projects portfolio, it is discovered that a project is 75% complete, but all budgeted resources have been expended. Which of the following is the MOST important task to perform?
Options:
Review the IT investments.
Reorganize the IT projects portfolio.
Re-evaluate the business case.
Review the IT governance structure.
Answer:
CExplanation:
A business case is a document that justifies the initiation and continuation of a project based on its expected benefits, costs, risks, and alignment with the strategic objectives of the organization. If a project is experiencing a cost overrun, meaning that it has exceeded its initial budget, it is important to re-evaluate the business case to determine whether the project is still viable and worth pursuing. Re-evaluating the business case can help to identify the root causes of the cost overrun, assess the impact of the overrun on the project’s value proposition, and decide whether to continue, modify, or terminate the project. Reviewing the IT investments, reorganizing the IT projects portfolio, and reviewing the IT governance structure are not the most important tasks to perform in this situation. They are more likely to be part of the portfolio management or governance processes that should be done regularly or periodically, not in response to a specific project issue. Moreover, they do not directly address the problem of the cost overrun or its implications for the project’s feasibility and desirability. References := What is a Business Case?, How to Write a Business Case, Project Cost Overruns – Reasons, How to Prevent and Manage
Which of the following BEST lowers costs and improves scalability from an IT enterprise architecture (EA) perspective?
Options:
Cost management
IT strategic sourcing
Standardization
Business agility
Answer:
CExplanation:
Standardization is the best option to lower costs and improve scalability from an IT enterprise architecture perspective, because it reduces complexity, increases interoperability, and enables reuse of IT resources. References:= ISACA, CGEIT Review Manual, 27th Edition, 2019, page 79.
A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?
Options:
Balanced scorecard
Capability maturity levels
Performance indicators
Critical success factors (CSFs)
Answer:
CExplanation:
Performance indicators are quantitative measures that can be used to evaluate the availability of a system or service. They can include metrics such as uptime, downtime, response time, availability percentage, etc. Balanced scorecard, capability maturity levels, and critical success factors are not directly related to availability objectives, but rather to strategic alignment, process improvement, and goal achievement respectively. References := CGEIT Exam Content Outline, Domain 1: Governance of Enterprise IT, Subdomain A: Governance Framework, Task 5: Establish and monitor key performance indicators (KPIs) and key goal indicators (KGIs) that are aligned with strategic objectives.
The MOST important aspect of an IT governance framework to ensure that IT supports repeatable business processes is:
Options:
earned value management.
quality management,
resource management.
risk management
Answer:
BExplanation:
Quality management is the most important aspect of an IT governance framework to ensure that IT supports repeatable business processes, as it involves defining, implementing, and monitoring quality standards, policies, and procedures for IT products and services. Quality management also ensures that IT processes are aligned with the enterprise requirements, objectives, and expectations, and that they deliver consistent and reliable outcomes12. References := CGEIT Exam Content Outline, Domain 1, Subtopic C: Technology Governance, Task 2: Ensure that IT processes are defined, implemented, monitored and continually improved in alignment with the enterprise governance framework.
Which of the following is the MOST effective means for IT management to report to executive management regarding the value of IT?
Options:
IT process maturity level
Cost-benefit analysis
Resource assessment
Balanced scorecard
Answer:
DExplanation:
According to the CGEIT certification guide, the balanced scorecard is the most effective means for IT management to report to executive management regarding the value of IT. The balanced scorecard is a strategic management tool that translates the vision and strategy of an organization into a comprehensive set of performance measures that provide the framework for a strategic measurement and management system1. The balanced scorecard enables IT management to communicate the value of IT in terms of four perspectives: financial, customer, internal business process, and learning and growth2. The balanced scorecard helps IT management to align IT objectives with business objectives, monitor and improve IT performance, and demonstrate IT contribution to business value3.
The other options are less effective than option D, as they do not provide a comprehensive and balanced view of the value of IT. IT process maturity level is a measure of how well-defined, managed, measured, and optimized an IT process is4. While it can indicate the quality and efficiency of IT processes, it does not directly link them to business outcomes or value. Cost-benefit analysis is a technique that compares the costs and benefits of an IT project or investment. While it can show the financial return of IT initiatives, it does not capture the non-financial aspects of IT value, such as customer satisfaction, innovation, or learning. Resource assessment is a process that evaluates the availability and utilization of IT resources, such as people, technology, or information. While it can show the capacity and capability of IT resources, it does not measure how they support the business strategy or goals.
References :=
CGEIT certification guide, domain 4: Benefits Realization, section 4.3: Value Governance, page 147.
CGEIT certification guide, domain 4: Benefits Realization, section 4.4: Performance Measurement and Reporting, page 150.
Balanced Scorecard - an overview | ScienceDirect Topics
IT Process Maturity - an overview | ScienceDirect Topics
[Cost-Benefit Analysis - an overview | ScienceDirect Topics]
[Resource Assessment - an overview | ScienceDirect Topics]
Which of the following would be of MOST concern regarding the effectiveness of risk management processes?
Options:
Key risk indicators (KRIs) are not established.
Risk management requirements are not included in performance reviews.
The plans and procedures are not updated on an annual basis.
There is no framework to ensure effective reporting of risk events.
Answer:
DExplanation:
According to the web search results, one of the most important aspects of risk management is the timely and accurate reporting of risk events, which are incidents or occurrences that have a negative impact on the objectives, operations, or reputation of an organization1. A framework to ensure effective reporting of risk events can help to identify, analyze, communicate, and respond to risks in a systematic and consistent manner2. Without such a framework, the organization may fail to capture, escalate, and learn from risk events, and may expose itself to greater losses,liabilities, and regulatory sanctions3. Therefore, the lack of a framework to ensure effective reporting of risk events would be of most concern regarding the effectiveness of risk management processes.
The other options are less concerning than option D, although they may also indicate some weaknesses in the risk management processes. Key risk indicators (KRIs) are metrics that measure the likelihood or impact of potential or actual risks4. While they are useful for monitoring and managing risks, they are not essential for the effectiveness of risk management processes. Risk management requirements are criteria or standards that define the expectations and responsibilities for managing risks. Including them in performance reviews can help to align the incentives and behaviors of employees with the risk appetite and strategy of the organization. However, they are not the only way to ensure accountability and compliance with risk management processes. The plans and procedures are documents that describe the objectives, scope, roles, activities, and outputs of risk management processes. Updating them on an annual basis can help to reflect the changes in the internal and external environment that affect the risks faced by the organization. However, they are not the only source of guidance and information for risk management processes.
References :=
Risk Event - Definition from KWHS
Risk Management - Overview, Importance and Processes
Transforming risk efficiency and effectiveness | McKinsey
Key Risk Indicators (KRIs) - Definition from KWHS
[Risk Management Requirements - an overview | ScienceDirect Topics]
[Risk Management Requirements - an overview | ScienceDirect Topics]
[Risk Management Plan - an overview | ScienceDirect Topics]
[Risk Management Plan - an overview | ScienceDirect Topics]
Which of the following MUST be established before implementing an information architecture that restricts access to data based on sensitivity?
Options:
Risk and control frameworks
Probability and impact analysis
Classification and ownership
Security and privacy policies
Answer:
CExplanation:
Before implementing an information architecture that restricts access to data based on sensitivity, the enterprise must establish the classification and ownership of the data. Classification is the process of tagging data according to its type, sensitivity, and value to the organization if altered, stolen, or destroyed. It helps the organization understand the risk and impact of data breaches and comply with relevant regulations. Ownership is the process of assigning roles andresponsibilities for data creation, maintenance, protection, and disposal. It helps the organization ensure accountability and governance of data throughout its lifecycle
From a governance perspective, the PRIMARY goal of an IT risk optimization process should be to ensure:
Options:
IT risk thresholds are defined in the enterprise architecture (EA).
the IT risk mitigation strategy is approved by management.
IT risk is mapped to the balanced scorecard.
the impact of IT risk to the enterprise is managed.
Answer:
DExplanation:
The primary goal of an IT risk optimization process from a governance perspective is to ensure that the impact of IT risk to the enterprise is managed in alignment with the enterprise risk management (ERM) framework and the enterprise objectives. IT risk optimization is not only about defining thresholds, approving strategies or mapping metrics, but about ensuring that IT risk is effectively mitigated, monitored and communicated to support the achievement of enterprise goals. References := CGEIT Exam Content Outline, Domain 4: Risk Optimization1; Certified in Governance of Enterprise IT (CGEIT) Course, Learning Tree2
Of the following, who should approve the criteria for information quality within an enterprise?
Options:
Information architect
Information analyst
Information steward
Information owner
Answer:
DExplanation:
Information owners are responsible for defining the quality criteria for information within their domain, based on business requirements and stakeholder expectations. Information owners are also accountable for ensuring that information quality is maintained and improved. References := COBIT 5: Enabling Information, chapter 4, section 4.2.1
Which of the following is the MOST effective way to manage risks within the enterprise?
Options:
Assign individuals responsibilities and accountabilities for management of risks.
Make staff aware of the risks in their area and risk management techniques.
Provide financial resources for risk management systems.
Document procedures and reporting processes.
Answer:
AExplanation:
Assigning individuals responsibilities and accountabilities for management of risks is the most effective way to manage risks within the enterprise, as it ensures that the risk owners and stakeholders are clearly identified, involved, and accountable for the risk management activities and outcomes. Assigning responsibilities and accountabilities also helps to establish roles and expectations, delegate authority, and monitor performance and compliance12. References := CGEIT Exam Content Outline, Domain 4, Subtopic B: IT Risk Management, Task 2: Ensure that appropriate senior level management sponsorship for IT risk management exists.
When evaluating benefits realization of IT process performance, the analysis MUST be based on;
Options:
key business objectives.
industry standard key performance indicators (KPIs).
portfolio prioritization criteria.
IT risk policies.
Answer:
AExplanation:
When evaluating benefits realization of IT process performance, the analysis must be based on key business objectives, as they define the desired outcomes and value that the IT processes are expected to deliver and support. Key business objectives are derived from the enterprise strategy and vision, and they provide the basis for measuring and monitoring the IT process performance and benefits123. References := CGEIT Exam Content Outline, Domain 3, Subtopic B: Performance Measurement and Optimization, Task 1: Establish and monitor IT performance measurement systems to evaluate the extent to which IT delivers on its strategic objectives and desired outcomes.
A large retail chain realizes that while there has not been any loss of data, IT security has not been a priority and should become a key goal for the enterprise. What should be the FIRST high-level initiative for a newly created IT strategy committee in order to support this business goal?
Options:
Identifying gaps in information asset protection
Defining data archiving and retrieval policies
Recruiting and training qualified IT security staff
Modernizing internal IT security practices
Answer:
AExplanation:
Identifying gaps in information asset protection should be the first high-level initiative for a newly created IT strategy committee in order to support the business goal of making IT security a priority. This initiative would help to assess the current state of IT security, identify the risks and vulnerabilities that may compromise the confidentiality, integrity, and availability of information assets, and determine the actions and resources needed to address them. The other options are not as high-level, as they are more related to the implementation or execution of IT security, rather than the planning or direction of it. References: : CGEIT Review Manual (Digital Version), Chapter 1: Governance of Enterprise IT, Section 1.3: Strategic Management, Subsection 1.3.2: Strategic Management Process, Page 23 : CGEIT Review Manual (Digital Version), Chapter 4: Risk Optimization, Section 4.3: IT Risk Management, Subsection 4.3.2: IT Risk Management Process, Page 156 : CGEIT Review Manual (Digital Version), Chapter 5: Resource Optimization, Section 5.3: Security Resource Management, Subsection 5.3.1: Security Resource Management Overview, Page 192 : What is CGEIT? A certification for seasoned IT governance professionals1
The PRIMARY reason for an enterprise to adopt an IT governance framework is to:
Options:
assure IT sustains and extends the enterprise strategies and objectives.
expedite IT investments among other competing business investments.
establish IT initiatives focused on the business strategy.
allow IT to optimize confidentiality, integrity, and availability of information assets.
Answer:
AExplanation:
IT governance is a framework that provides a formal structure for organizations to ensure that IT investments support business objectives. The primary reason for an enterprise to adopt an ITgovernance framework is to assure that IT sustains and extends the enterprise strategies and objectives, by aligning IT with business needs, optimizing IT performance and value, managing IT risks and resources, and measuring IT outcomes and benefits12. References: ISACA, CGEIT Review Manual, 7th Edition, 2019, page 15. What Is IT Governance? Definition, Practices and Frameworks. IT Governance: Definition, Frameworks, and Best Practices.
Which of the following should be the MAIN reason for an enterprise to implement an IT risk management framework?
Options:
The need to enable IT risk-aware decisions by executives
The results of an external audit report concerning IT risk management processes.
The need to address market regulations and internal compliance in IT risk
The ability to benchmark IT risk policies against major competitors
Answer:
AExplanation:
The main reason for an enterprise to implement an IT risk management framework is the need to enable IT risk-aware decisions by executives, as it helps to ensure that the IT risks are aligned with the enterprise strategy, objectives, and risk appetite. IT risk management also provides a consistent and structured approach to identify, analyze, treat, and monitor IT-related business risks, and to communicate and report them to the relevant stakeholders12. References := CGEIT Exam Content Outline, Domain 4, Subtopic B: IT Risk Management, Task 1: Ensure that an IT risk management framework exists to identify, analyze, mitigate, manage, monitor, andcommunicate IT-related business risk, and that the framework for IT risk management is in alignment with the enterprise risk management (ERM) framework.
Which of the following BEST reflects mature risk management in an enterprise?
Options:
A regularly updated risk register
Ongoing risk assessment
Ongoing investment in risk mitigation
Responsive risk awareness culture
Answer:
DExplanation:
A responsive risk awareness culture is the best reflection of mature risk management in an enterprise, because it implies that the organization has a high level of risk maturity that enables it to reduce noise and focus more effectively on truly high-risk concerns, choose cost-effective solutions for the risk management priorities, and execute reliably1. A responsive risk awareness culture also means that the organization has a clear and consistent risk appetite and tolerance, and that the employees are cognizant of the relevant risks as part of their actions2. A responsive risk awareness culture also fosters trust, collaboration, and innovation among the stakeholders, and helps the organization to adapt to changing business environments and emerging risks3.
The other options are not as indicative of mature risk management in an enterprise, because they are either too narrow or too reactive. A regularly updated risk register is a useful tool forcataloguing, tracking, and mitigating risks, but it does not necessarily reflect the strategic alignment, integration, or performance of the risk management process4. Ongoing risk assessment is an essential activity for identifying and evaluating risks, but it does not guarantee that the risks are prioritized, communicated, or managed effectively5. Ongoing investment in risk mitigation is a sign of commitment to risk management, but it does not ensure that the investment is aligned with the risk appetite and tolerance, or that it delivers value to the organization5.
Which of the following is MOST important to effectively initiate IT-enabled change?
Options:
Establish a change management process.
Obtain top management support and ownership.
Ensure compliance with corporate policy.
Benchmark against best practices.
Answer:
BExplanation:
The most important factor to effectively initiate IT-enabled change is to obtain top management support and ownership. This is because top management can provide the vision, direction, resources, and authority for the change, as well as communicate the benefits and urgency of the change to the rest of the organization. Top management support and ownership can also help to overcome resistance, align stakeholders, and ensure accountability and governance for the change. According to a McKinsey survey1, having active and visible executive sponsorship is the most important practice for successful digital transformations.
Establishing a change management process is also important, but not the most important factor. A change management process can help to plan, execute, monitor, and control the change activities, as well as address the human side of the change. However, without top management support and ownership, a change management process may not be effective or sustainable.
Ensuring compliance with corporate policy is also important, but not the most important factor. Compliance with corporate policy can help to ensure that the change is consistent with the organization’s values, standards, and regulations, as well as avoid legal or ethical issues. However, compliance with corporate policy may not be sufficient or relevant for initiating IT-enabled change, especially if the policy is outdated or incompatible with the change objectives.
Benchmarking against best practices is also important, but not the most important factor. Benchmarking against best practices can help to identify gaps, opportunities, and solutions for improving the organization’s performance and competitiveness through IT-enabled change. However, benchmarking against best practices may not be applicable or feasible for initiating IT-enabled change, especially if the change is innovative or disruptive.
References := The Magic Bullet Theory in IT-Enabled Transformation, Introduction section. The keys to a successful digital transformation | McKinsey, The anatomy of digital transformations section. Best Practices in Change Management - Prosci, Introduction section.
Which of the following components of a policy BEST enables the governance of enterprise IT?
Options:
Disciplinary actions
Regulatory requirements
Roles and responsibilities
Terms and definitions
Answer:
CExplanation:
A policy is a document that defines the rules and guidelines for how an organization conducts its activities and operations. A policy can help to ensure the compliance, consistency, and quality of the organization’s performance and outcomes1. A policy typically consists of several components, such as purpose, scope, terms and definitions, roles and responsibilities, procedures, compliance, and review2.
From a governance perspective, one of the most important components of a policy is roles and responsibilities, because it clarifies who is accountable and responsible for implementing, enforcing, monitoring, and improving the policy. Roles and responsibilities can help to establish the authority, accountability, and communication among different stakeholders involved in the policy, such as the board of directors, senior management, business units, IT staff, customers, regulators, etc. Roles and responsibilities can also help to avoid confusion, duplication, or conflict of work among the stakeholders3 .
The governance of enterprise IT (GEIT) is the system by which the current and future use of IT is directed and controlled by an organization. GEIT aims to ensure that IT supports the organization’s strategy and objectives, delivers value and benefits, manages risks and resources, and measures performance and outcomes. GEIT requires a clear definition of roles and responsibilities for the IT governance policies, processes, structures, and relationships. Some of the common roles and responsibilities involved in GEIT are:
The board of directors: provides strategic direction, oversight, and approval for IT governance
The senior management: provides leadership, support, and guidance for IT governance
The business units: provide input, feedback, and collaboration for IT governance
The IT function: provides execution, delivery, and improvement for IT governance
The audit function: provides assurance, evaluation, and recommendation for IT governance
The external stakeholders: provide requirements, expectations, and compliance for IT governance References: What is a Policy? Definition & Examples. Policy Components: Definition & Examples. Roles & Responsibilities in Policy Development. [Policy Development: Roles & Responsibilities]. [What is IT Governance? Definition & Frameworks]. [IT Governance Roles & Responsibilities]. [Roles & Responsibilities in IT Governance].
Which of the following would BEST enable business innovation through IT?
Options:
Outsourcing of IT to a strategic business partner
Business participation in IT strategy development
Adoption of a standardized business development life cycle
IT participation in business strategy development
Answer:
DExplanation:
Business innovation is the process of creating new or improved products, services, processes, or business models that create value for the organization and its customers. IT can enable business innovation by providing the tools, platforms, data, and capabilities that support the generation, implementation, and diffusion of innovative ideas. However, IT alone cannot drive business innovation; it requires a close collaboration and alignment between IT and business. Therefore, IT participation in business strategy development is the best way to enable business innovation through IT, because it can help to ensure that IT understands the business goals and needs, that IT contributes to the identification and evaluation of opportunities and challenges, that IT provides feasible and effective solutions and recommendations, and that IT supports the execution and monitoring of the innovation initiatives123. References: How to Drive Business Innovation Through IT. How to Enable Business Innovation with IT. Business Innovation: What It Is and How to Achieve It.
An audit report has revealed that data scientists are analyzing sensitive "big data" files using an offsite cloud because corporate servers do not have the necessary processing capabilities. A review of policies indicates this practice is not prohibited. Which of the following should be the FIRST strategic action to address the report?
Options:
Authorize a risk analysis of the practice.
Update data governance practices.
Revise the information security policy.
Recommend the use of a private cloud.
Answer:
AExplanation:
The first strategic action to address the report is to authorize a risk analysis of the practice. A risk analysis is a systematic process of identifying, assessing, and prioritizing the potential threats and vulnerabilities that may arise from the use of an offsite cloud for analyzing sensitive “big data” files. A risk analysis can help to determine the level of exposure and impact of the practice on the organization’s data security, privacy, compliance, and performance. A risk analysis can also provide recommendations for mitigating or avoiding the risks, such as implementing appropriate controls, policies, and procedures.
Updating data governance practices, revising the information security policy, and recommending the use of a private cloud are possible actions that may result from the risk analysis, but they are not the first step. Data governance practices are the rules and processes that define how data is created, stored, accessed, used, and disposed of within an organization. Data governance practices should align with the organization’s data strategy, objectives, and values. Information security policy is a document that outlines the principles, guidelines, and responsibilities for protecting the confidentiality, integrity, and availability of data. Information security policy should reflect the organization’s risk appetite, legal obligations, and industry standards. A private cloud is a cloud computing model that provides dedicated resources and services to a single organization. A private cloud may offer more control, security, and customization than an offsite cloud, but it may also require more investment, maintenance, and expertise.
Therefore, before updating data governance practices, revising the information security policy, or recommending the use of a private cloud, it is important to conduct a risk analysis of the current practice of using an offsite cloud for analyzing sensitive “big data” files. This will help to ensure that the organization makes informed and strategic decisions that balance the benefits and risks of using cloud computing for big data analytics.
Which of the following is the MOST important consideration for data classification to be successfully implemented?
Options:
Users should be provided with clear instructions that are easy to follow and understand.
The data classification tools integrate with other tools that help manage the data.
The classification scheme should be closely aligned with the IT strategic plan.
Senior management should be properly trained in monitoring compliance.
Answer:
AExplanation:
Data classification is a process that involves users assigning labels or tags to data based on its sensitivity, value, and protection requirements. Users are the ones who know the data best and are responsible for handling it appropriately. Therefore, users should be provided with clear instructions that are easy to follow and understand, so they can classify data correctly and consistently. This will also help users comply with the data security policies and regulations that apply to the data they work with. References := CGEIT Exam Content Outline, Domain 1: Governance of Enterprise IT, Subtopic B: IT Resources, Task 3: Ensure that processes are in place to maintain the integrity, availability, reliability, performance, scalability and security of IT resources. What is Data Classification? | Best Practices & Data Types | Imperva, User-based classification section. Best practices for data classification - ManageEngine, 6 best practices for data classification section.
A healthcare enterprise that is subject to strict compliance requirements has decided to outsource several key IT services to third-party providers. Which of the following would be the BEST way to assess compliance and avoid reputational damage?
Options:
Require quarterly reports from the providers demonstrating compliance.
Require documentation that the providers have adequate controls in place.
Exercise the right to perform an audit.
Impose monetary penalties for noncompliance.
Answer:
CExplanation:
Exercising the right to perform an audit is the best way to assess compliance and avoid reputational damage when outsourcing key IT services to third-party providers, especially in a highly regulated industry like healthcare. An audit is a systematic and independent examination of the provider’s policies, procedures, controls, and performance related to the outsourced IT services, and it can help to verify that the provider is complying with the contractual obligations, service level agreements, and regulatory requirements. An audit can also help to identify and address any gaps, issues, or risks that may affect the quality, security, or reliability of the outsourced IT services, and to ensure that the provider is delivering value and meeting the expectations of the enterprise. An audit can also provide assurance and confidence to the enterprise’s senior management, board, and stakeholders that the outsourcing arrangement is effective, efficient, and compliant. According to Outsourcing Compliance: What You Need to Know, “The right to audit clause should be included in every contract with a third-party service provider. It allows the organization to conduct an independent review of the provider’s compliance with applicable laws and regulations, contractual terms and conditions, and industry standards and best practices.”
The board of a start-up company has directed the CIO to develop a technology resource acquisition and management policy. Which of the following should be the MOST important consideration during the development of this policy?
Options:
Enterprise growth plans
Industry best practices
Organizational knowledge retention
IT staff competencies
Answer:
AExplanation:
Enterprise growth plans should be the most important consideration during the development of a technology resource acquisition and management policy, because they define the vision, goals, and strategies of the start-up company and how technology can support them. A technology resource acquisition and management policy should align with the enterprise growth plans and ensure that the technology resources are acquired and managed in a way that enables the company to achieve its desired outcomes, such as increasing market share, enhancing customer satisfaction, improving operational efficiency, or creating innovative products or services. A technology resource acquisition and management policy should also consider the scalability, flexibility, and adaptability of the technology resources to accommodate the changing needs and demands of the company as it grows and evolves. A technology resource acquisition and management policy should also balance the costs and benefits of acquiring and managing technology resources and ensure that they deliver value to the company and its stakeholders.
References := Managing Technology as a Business Strategy, A Complete Guide To Strategic Technology Planning, Policy on IT Acquisition Strategies and Planning Under FITARA
Which of the following aspects of the transition from X-rays to digital images would be BEST addressed by implementing information security policy and procedures?
Options:
Establishing data retention procedures
Training technicians on acceptable use policy
Minimizing the impact of hospital operation disruptions on patient care
Protecting personal health information
Answer:
DExplanation:
The aspect of the transition from X-rays to digital images that would be best addressed by implementing information security policy and procedures is protecting personal health information. This is because personal health information is a type of sensitive data that contains confidential and private information about patients, such as their medical history, diagnosis, treatment, and identity. Personal health information is subject to various legal and ethical obligations and regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) in the US1, that require its protection from unauthorized access, disclosure, modification, or destruction. Information security policy and procedures can help to define the rules, guidelines, and responsibilities for ensuring the confidentiality, integrity, and availability of personal health information in digital form.
Establishing data retention procedures is not the best answer, as it is only one component of information security policy and procedures. Data retention procedures specify how long and where digital images should be stored, archived, or deleted, based on the business, legal, and regulatory requirements. Data retention procedures can help to optimize the storage capacity, performance, and cost of digital images, as well as comply with the applicable laws and regulations. However, data retention procedures do not address the full scope of information security policy and procedures.
Training technicians on acceptable use policy is not the best answer, as it is only one aspect of information security policy and procedures. Acceptable use policy defines what are the permitted and prohibited behaviors and actions for using digital images and related IT resources. Training technicians on acceptable use policy can help to educate them on the security risks and best practices for handling digital images, as well as enforce compliance and accountability. However, training technicians on acceptable use policy does not cover the entire range of information security policy and procedures.
Minimizing the impact of hospital operation disruptions on patient care is not the best answer, as it is a business continuity objective rather than an information security objective. Business continuity refers to the ability of an organization to maintain or resume its critical functions and processes in the event of a disruption or disaster. Minimizing the impact of hospital operation disruptions on patient care can help to ensure the safety, quality, and efficiency of health services delivery. However, minimizing the impact of hospital operation disruptions on patient care is not directly related to information security policy and procedures.
References := HIPAA Privacy Rule | HHS.gov, Introduction section. Information Security Policy: Definition & Examples - NetApp, What Is an Information Security Policy? section. Data Retention Policy: Definition & Best Practices - NetApp, What Is a Data Retention Policy? section. Acceptable Use Policy: Definition & Best Practices - NetApp, What Is an Acceptable Use Policy? section. [Business Continuity Management: Definition & Best Practices - NetApp], What Is Business Continuity Management? section.
The MOST successful IT performance metrics are those that:
Options:
measure financial results.
measure all areas.
are approved by the stakeholders.
contain objective measures.
Answer:
DExplanation:
The most successful IT performance metrics are those that contain objective measures that can be quantified and verified. Objective measures are more reliable, consistent, and repeatable than subjective measures, which may vary depending on the perspective or opinion of the stakeholders. Objective measures also help to align IT performance goals with business goals and to communicate the value of IT to the rest of the organization. According to one source1, a good metric is linear, reliable, repeatable, easy to use, consistent and independent. References := ISACA, CGEIT Review Manual, 27th Edition, 2020, page 11; Performance Measurement Metrics for IT Governance
The CIO of a financial services company is tasked with ensuring IT processes are in compliance with recently instituted regulatory changes. The FIRST course of action should be to:
Options:
align IT project portfolio with regulatory requirements.
create an IT balanced scorecard.
identify the penalties for noncompliance.
perform a current state assessment.
Answer:
DExplanation:
The first course of action for the CIO of a financial services company to ensure IT processes are in compliance with recently instituted regulatory changes should be to perform a current state assessment. This is because a current state assessment can help to evaluate the existing IT processes, policies, controls, and performance against the new regulatory requirements and identify any gaps, issues, or risks that need to be addressed. A current state assessment can also help to establish a baseline and a benchmark for measuring the progress and effectiveness of the compliance initiatives.
Aligning IT project portfolio with regulatory requirements is not the first course of action, as it is a subsequent step after performing a current state assessment. Aligning IT project portfolio with regulatory requirements can help to prioritize and allocate resources for the IT projects that support the compliance objectives and deliver value to the business. However, aligning IT project portfolio with regulatory requirements requires a clear understanding of the current state and the desired state of the IT processes and compliance.
Creating an IT balanced scorecard is not the first course of action, as it is a tool for monitoring and reporting the compliance outcomes and impacts. An IT balanced scorecard is a framework that measures and communicates the performance of the IT function in terms of financial, customer, internal process, and learning and growth perspectives. An IT balanced scorecard can help to align the IT strategy with the business strategy, track the progress and results of the IT initiatives, and demonstrate the value and contribution of IT to the business. However, creating an IT balanced scorecard does not provide a comprehensive analysis or improvement plan for the IT processes and compliance.
Identifying the penalties for noncompliance is not the first course of action, as it is only a motivation factor for compliance. Identifying the penalties for noncompliance can help to raise awareness and urgency of the compliance issues and risks, as well as deter or prevent violations or breaches. However, identifying the penalties for noncompliance does not provide a detailed assessment or guidance for achieving compliance.
References := IT Compliance: What You Need to Know | Smartsheet, How to Achieve Compliance section. IT Compliance Management Best Practices: 5 Tips from Experts - MetricStream, Tip 1: Assess your current state section. IT Compliance Checklist: How to Ensure Your Business Is Compliant - Blissfully, Step 1: Assess Your Current State section. IT Compliance Management - Definition & Overview | OpsCompass, How Do You Manage IT Compliance? section.
A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?
Options:
Mitigate and track data-related issues and risks.
Modify legal and regulatory data requirements.
Define data protection and privacy practices.
Assess the information governance framework.
Answer:
DExplanation:
An information governance framework is the structure that provides a holistic overview of the influences that inform how an organisation creates and manages its enterprise-wide information assets (records, information and data)1. It defines the roles, responsibilities, policies, standards, and processes for ensuring effective and secure information management. If a new and expanding enterprise has collected a large amount of data in a short period of time, it may face data breach and privacy risks if it does not have a robust and comprehensive information governance framework in place. Therefore, the IT steering committee’s first course of action should be to assess the current state of the information governance framework, identify any gaps or weaknesses, and implement improvements or changes as needed. This will help the enterprise to protect and preserve its information assets, comply with legal and regulatory requirements, and enable ethical and efficient use of information. Mitigating and tracking data-related issues and risks, modifying legal and regulatory data requirements, and defining data protection and privacy practices are important actions, but they are not the first course of action. They are more likely to be part of the implementation or improvement of the information governance framework after it has been assessed. References := Establishing an information governance framework
Which of the following groups should approve the implementation of new technology?
Options:
IT steering committee
IT audit department
Portfolio management office
Program management office
Answer:
AExplanation:
An IT steering committee is a group of senior executives who are responsible for directing, reviewing, and approving IT strategic plans, overseeing major initiatives, and allocating resources. They are the most appropriate group to approve the implementation of new technology, as they can ensure that it aligns with the organization’s vision, mission, goals, and objectives. They can also evaluate the business case, risks, benefits, and alternatives of the new technology and provide guidance and support to the IT team. According to one of the web search results1, “the steering committee establishes IT priorities for the business as a whole.” References := What is an IT Steering Committee? – BMC Software | Blogs
An IT audit report indicates that a lack of IT employee risk awareness is creating serious security issues in application design and configuration. Which of the following would be the BEST key risk indicator (KRI) to show progress in IT employee behavior?
Options:
Number of IT employees attending security training sessions
Results of application security testing
Number of reported security incidents
Results of application security awareness training quizzes
Answer:
DExplanation:
The best key risk indicator (KRI) to show progress in IT employee behavior regarding application security issues is the results of application security awareness training quizzes. This KRI measures the level of knowledge and understanding that IT employees have acquired from the security training sessions, and how well they can apply it to their work. This KRI can also help to identify the gaps and weaknesses in the training content and delivery, and suggest areas for improvement. A high score on the quizzes indicates a high level of IT employee risk awareness and a low likelihood of creating serious security issues in application design and configuration
A global financial institution has decided to integrate data from branch locations into a common database to address regulatory reporting requirements. Analysis of data flows and the full data life cycle should be conducted at which level?
Options:
Transaction level
Enterprise level
Branch level
Department level
Answer:
BExplanation:
Analysis of data flows and the full data life cycle should be conducted at the enterprise level, because it provides a holistic and comprehensive view of how data is created, stored, processed, used, and disposed of across the entire organization. By conducting data analysis at the enterprise level, the financial institution can ensure that the data integration from branch locations is aligned with the business objectives, needs, and expectations, and that the data quality, security, and compliance are maintained throughout the data life cycle. Data analysis at the enterprise level can also help to identify and address any data gaps, issues, or risks that may affect the regulatory reporting requirements or the performance and value of the data. According to Data Life Cycle and Data Governance What CDOs and CISOs Can Learn, “Data governance is an enterprise-wide program that requires a holistic approach to managing data throughout its life cycle.”
A global enterprise is experiencing an economic downturn and is rapidly losing market share. IT senior management is reassessing the core activities of the business, including IT, and the associated resource implications. Management has decided to focus on its local market and to close international operations. A critical issue from a resource management perspective is to retain the most capable staff. This is BEST achieved by:
Options:
reviewing current goals-based performance appraisals across the enterprise.
ranking employees across the enterprise based on their compensation.
ranking employees across the enterprise based on length of service.
retaining capable staff exclusively from the local market.
Answer:
AExplanation:
Goals-based performance appraisals are a method of evaluating employees based on their achievement of specific and measurable objectives that are aligned with the organization’s strategy and vision. Goals-based performance appraisals can help to identify the most capable staff who have contributed to the organization’s success, demonstrated high performance and potential, and shown commitment and engagement. Reviewing current goals-based performance appraisals across the enterprise can help management to retain the most capable staff regardless of their location, compensation, or length of service12. References: Performance Appraisal Methods: Traditional and Modern Methods (with example). How to Conduct a Performance Appraisal.
The BEST way to manage continuous improvement of governance-related processes is to:
Options:
assess existing process resource capacities.
define accountability based on roles and responsibilities.
apply effective quality management practices.
require third-party independent reviews.
Answer:
CExplanation:
Quality management is the process of ensuring that the products and services delivered by an organization meet or exceed the expectations and requirements of the customers and stakeholders. Quality management practices include planning, implementing, monitoring, and improving the quality standards and processes for an organization. Applying effective quality management practices can help to manage continuous improvement of governance-related processes, by ensuring that the processes are aligned with the organizational goals and objectives, that the processes are performed consistently and efficiently, that the processes are measured and evaluated for their effectiveness and value, and that the processes are continuously reviewed and enhanced for improvement123. References: What is Quality Management? Definition, Principles, Tools & Examples. Quality Management: The Importance of ISO. Continuous Improvement and a Business Process Governance Framework.
The use of new technology in an enterprise will require specific expertise and updated system development processes. There is concern that IT is not properly sourced. Which of the following should be the FIRST course of action?
Options:
Perform a risk assessment on potential outsourcing.
Update the enterprise architecture (EA) with the new technology.
Review the IT balanced scorecard for sourcing opportunities.
Assess the gap between current and required staff competencies.
Answer:
DExplanation:
The first course of action when the use of new technology in an enterprise will require specific expertise and updated system development processes is to assess the gap between current and required staff competencies. This course of action involves identifying the skills, knowledge, and abilities that are needed to implement and manage the new technology, and comparing them with the existing capabilities of the IT staff. By assessing the gap between current and required staff competencies, the enterprise can determine the extent and nature of the sourcing challenge, and plan for appropriate solutions, such as training, hiring, or outsourcing. According to one source1, “A competency gap analysis is a process of identifying the difference between what is required for a person to perform their role effectively and what they actually possess.” The other options are not the first course of action when the use of new technology in an enterprise will require specific expertise and updated system development processes, but rather some of the steps or outcomes that can follow or result from the gap assessment. Performing a risk assessment on potential outsourcing is a step that involves evaluating the benefits and drawbacks of delegating some or all of the IT functions related to the new technology to an external service provider. This step can be done after assessing the gap between current and required staff competencies, and identifying outsourcing as a viable option. Updating the enterprise architecture (EA) with the new technology is a step that involves incorporating the new technology into the holistic view of the enterprise’s IT environment, including its goals, principles, standards, policies, processes, technologies, and systems. This step can be done after assessing the gap between current and required staff competencies, and ensuring that the new technology aligns with the enterprise’s strategic objectives and business requirements. Reviewing the IT balanced scorecard for sourcing opportunities is an outcome that involves measuring and reporting on the performance and value of IT sourcing activities and outcomes. This outcome can be done after assessing the gapbetween current and required staff competencies, and implementing the chosen sourcing solution. References := What is Competency Gap Analysis? Definition & Examples
An enterprise learns that a new privacy regulation was recently published to protect customers in the event of a breach involving personally identifiable information (Pll). The IT risk management team's FIRST course of action should be to:
Options:
evaluate the risk appetite for the new regulation.
define the risk tolerance for the new regulation.
determine if the new regulation introduces new risk.
assign a risk owner for the new regulation.
Answer:
CExplanation:
A new privacy regulation is a legal requirement that aims to protect the rights and interests of customers in relation to their personal data, especially in the event of a breach involvingpersonally identifiable information (PII). A breach is an unauthorized or unlawful access, disclosure, alteration, or destruction of personal data that may compromise the confidentiality, integrity, or availability of the data1. A new privacy regulation may introduce new risk for an enterprise that collects, processes, stores, or transfers personal data of customers, such as legal, financial, reputational, or operational risk. Therefore, the IT risk management team’s first course of action should be to determine if the new regulation introduces new risk for the enterprise, by assessing the scope, applicability, and impact of the regulation on the enterprise’s data activities and practices. This can help the IT risk management team to identify and prioritize the gaps or issues that need to be addressed to comply with the regulation and to mitigate the potential risk23. References: What is a Data Breach? Definition & Examples. How to Manage Data Privacy Risks. Data Privacy Risk Management: A Guide for Businesses.
Which of the following is an ADVANTAGE of using strategy mapping?
Options:
It provides effective indicators of productivity and growth.
It depicts the maturity levels of processes that support organizational strategy.
It identifies barriers to strategic alignment and links them to specific outcomes.
It depicts the cause-and-effect linked relationships between strategic objectives.
Answer:
DExplanation:
Strategy mapping is an advantage of using strategy mapping, as it helps to visualize and communicate how the enterprise can create value by achieving its strategic objectives. Strategy mapping also helps to align the IT goals and activities with the enterprise strategy, and to measure and monitor the IT performance and outcomes123. References := CGEIT Exam Content Outline, Domain 3, Subtopic A: Performance Management, Task 2: Ensure that IT performance measurement supports IT performance management by providing relevant, complete, reliable, timely and consistent information.
The PRIMARY benefit of integrating IT resource planning into enterprise strategic planning is that it enables the enterprise to:
Options:
allocate resources efficiently to achieve desired goals.
adjust business goals depending upon resource availability.
prioritize resource allocation based on sourcing strategy.
develop tactical plans to achieve resource optimization.
Answer:
AExplanation:
Integrating IT resource planning into enterprise strategic planning enables the enterprise to allocate resources efficiently to achieve desired goals, as it ensures that IT resources are aligned with the enterprise vision, mission, and objectives. IT resource planning also helps to identify and prioritize the IT needs and demands of the enterprise, and to allocate the appropriate resources (such as people, processes, technology, and information) to meet them123. References := CGEIT Exam Content Outline, Domain 2, Subtopic A: IT Resource Planning, Task 1: Ensure that IT resource planning is aligned with the enterprise strategic planning process.
An IT strategy committee wants to ensure that a risk program is successfully implemented throughout the enterprise. Which of the following would BEST support this goal?
Options:
A risk management framework
Mandatory risk awareness courses for staff
A risk recognition and reporting policy
Commitment from senior management
Answer:
DExplanation:
This is because a risk program is a strategic initiative that requires the support and involvement of the top leaders of the enterprise. Senior management can demonstrate their commitment to the risk program by:
Providing clear direction and guidance on the objectives, scope, and approach of the risk program
Allocating sufficient resources, budget, and authority to the risk program team
Communicating the importance and benefits of the risk program to all stakeholders
Encouraging a culture of risk awareness and accountability across the enterprise
Reviewing and approving the risk program deliverables and outcomes
Rewarding and recognizing the achievements and contributions of the risk program team and participants
A risk management framework (A) is a tool that helps to define and implement the risk program, but it does not ensure its success without senior management commitment. Mandatory risk awareness courses for staff (B) are a way to increase the knowledge and skills of the staff regarding risk management, but they do not guarantee their engagement and participation in the risk program without senior management endorsement. A risk recognition and reporting policy © is a document that establishes the rules and procedures for identifying and communicatingrisks, but it does not ensure its compliance and effectiveness without senior management oversight.
A chief technology officer (CTO) wants to ensure IT governance practices adequately address risk management specific to mobile applications. To create the appropriate risk policies for IT, it is MOST important for the CTO to:
Options:
understand the enterprise's risk tolerance.
create an IT risk scorecard.
map the business goals to IT risk processes.
identify the mobile technical requirements.
Answer:
AExplanation:
Understanding the enterprise’s risk tolerance is the most important step for the CTO to create the appropriate risk policies for IT, as it would help to define the acceptable level of risk exposure and the risk appetite for mobile applications. Risk tolerance is the degree of uncertainty that an enterprise is willing to accept in pursuit of its objectives, and it reflects the enterprise’s culture, strategy, and stakeholder expectations. Risk policies for IT should be aligned with the enterprise’s risk tolerance, as well as its mission, vision, and goals. The other options are not as important, as they are more related to the implementation or measurement of risk management, rather than the establishment of risk policies. References: : CGEIT Review Manual (Digital Version), Chapter 4: Risk Optimization, Section 4.3: IT Risk Management, Subsection 4.3.1: IT Risk Management Overview, Page 153 : CGEIT Review Manual (Digital Version), Chapter 4: Risk Optimization, Section 4.3: IT Risk Management, Subsection 4.3.2: IT Risk Management Process, Page 156 : Proactive IT Risk Management in an Era of Emerging Technologies
Which of the following responsibilities should be retained within an enterprise when outsourcing a project management office (PMO) function?
Options:
Selecting projects
Managing projects
Tracking project cost
Defining project methodology
Answer:
AExplanation:
The responsibility that should be retained within an enterprise when outsourcing a project management office (PMO) function is selecting projects. This is because selecting projects is a strategic decision that involves aligning the project portfolio with the enterprise goals, vision, and mission. Selecting projects also requires understanding the business needs, priorities, and value proposition of each project, as well as the available resources, risks, and opportunities. These are aspects that the enterprise should have more knowledge and authority over than theoutsourced PMO provider. Outsourcing the project selection process may result in a loss of control, alignment, and accountability for the enterprise. Therefore, selecting projects is a responsibility that should be retained within an enterprise when outsourcing a PMO function.
Which of the following would BEST help to improve an enterprise's ability to manage large IT investment projects?
Options:
Creating a change management board
Reviewing and evaluating existing business cases
Implementing a review and approval process for each phase
Publishing the IT approval process online for wider scrutiny
Answer:
CExplanation:
Implementing a review and approval process for each phase would best help to improve an enterprise’s ability to manage large IT investment projects. This is because a review and approval process can help to ensure that the project is aligned with the business objectives, scope, budget, schedule, quality, and risk criteria at each stage of the project life cycle. A review and approval process can also help to monitor the project progress, performance, and deliverables, as well as identify and resolve any issues or changes that may arise. A review and approval process can also provide transparency, accountability, and governance for the project stakeholders and decision-makers.
Creating a change management board is not the best answer, as it is only one aspect of a review and approval process. A change management board is a group of people who are responsible for reviewing, approving, or rejecting change requests that affect the project scope, schedule, cost, or quality. A change management board is important for managing changes in a project, but it is not sufficient or comprehensive for managing large IT investment projects.
Reviewing and evaluating existing business cases is not the best answer, as it is only a preliminary step in a review and approval process. A business case is a document that provides the justification and rationale for initiating a project, based on the expected costs, benefits, risks, and value of the project. Reviewing and evaluating existing business cases can help to select and prioritize the most viable and valuable projects for the enterprise, but it is not enough or relevant for managing large IT investment projects.
Publishing the IT approval process online for wider scrutiny is not the best answer, as it is only a communication method for a review and approval process. Publishing the IT approval process online can help to increase the visibility, awareness, and understanding of the project requirements, criteria, and procedures among the project stakeholders and participants. Publishing the IT approval process online can also help to solicit feedback, suggestions, or concerns from the wider audience. However, publishing the IT approval process online does not necessarily improve the enterprise’s ability to manage large IT investment projects.
References := IT Portfolio Management Strategies | Smartsheet, Managing an IT portfolio requires four steps section. Best Practices in Project Management | Smartsheet, Establish ground rules for how the project will move forward section. Government of Canada project management - Canada.ca, These practices include establishing clear accountabilities section. IT Project Management: Concepts, Solutions & Best Practices, What is Integrated Project Management (IPM)? section. 16 Industry Experts Share Best Practices For IT Project Management - Forbes, 1. Limit Work In Progress section.
Results of an enterprise's customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise's mobile applications are considered inferior compared to legacy browser-based applications. Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?
Options:
Establish service level agreements (SLAs) with the development team.
Identify key risks and mitigation strategies for mobile applications.
Implement key performance indicators (KPIs) that include application quality.
Identify business requirements concerning mobile applications.
Answer:
DExplanation:
The first step in creating an effective long-term mobile application strategy is to identify the business requirements concerning mobile applications. Business requirements are the needs, expectations, and objectives of the business stakeholders and customers for a product or service. Business requirements can help to define the scope, purpose, value, and quality of the mobile applications, as well as to align them with the business strategy and goals12.
By identifying the business requirements concerning mobile applications, the enterprise can understand what the customers want and need from the mobile applications, what problems or pain points they are facing with the current applications, what features or functions they are looking for or missing, what benefits or outcomes they are expecting or measuring, and what preferences or feedback they have for improving the mobile applications12.
Identifying the business requirements concerning mobile applications can also help the enterprise to prioritize and plan the development, testing, and deployment of the mobile applications, by using criteria such as feasibility, suitability, scalability, security, compliance, etc. Identifying the business requirements concerning mobile applications can also help the enterprise to monitor and evaluate the performance and satisfaction of the mobile applications, by using metrics, indicators, and reports12.
Therefore, identifying the business requirements concerning mobile applications is the first step in creating an effective long-term mobile application strategy. This can help the enterprise to deliver mobile applications that meet or exceed the customer expectations and requirements, and that are superior to the legacy browser-based applications. References: Business Requirements: Definition & Best Practices. How to Write a Business Requirements Document: A Comprehensive Guide.
Establishing a uniform definition for likelihood and impact through risk management standards PRIMARILY addresses which of the following concerns?
Options:
Inconsistent categories of vulnerabilities
Conflicting interpretations of risk levels
Inconsistent data classification
Lack of strategic IT alignment
Answer:
BExplanation:
Establishing a uniform definition for likelihood and impact through risk management standards primarily addresses the concern of conflicting interpretations of risk levels. This is because likelihood and impact are two key factors that determine the level of risk associated with a threat or event. Different stakeholders may have different perceptions and expectations of what constitutes a high, medium, or low likelihood or impact, which can lead to inconsistent or inaccurate risk assessment and management. By defining and applying a common set of criteria and scales for likelihood and impact, risk management standards can help to ensure a consistent and objective evaluation and communication of risk levels across the organization