New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Isaca COBIT-Design-and-Implementation Dumps

ISACA COBIT2019 Design and Implementation certificate Questions and Answers

Question 1

Which of the following should be used when translating design factor values into governance and management priorities?

Options:

A.

Weighted average

B.

Matrix calculation

C.

Weighted calculation

D.

Pareto analysis

Question 2

Which of the following is an example of a specific focus area to which COBIT could be customized?

Options:

A.

Information items

B.

Cybersecurity

C.

Capability levels

D.

Enterprise goals

Question 3

What is the role of the board when establishing where the enterprise wants to be?

Options:

A.

Ensuring open and fair assessment of IT activities

B.

Providing expert advice and guidance where appropriate

C.

Setting priorities, time scales, and expectations

D.

Obtaining consensus on a required capability target

Question 4

During CSF life cycle action plan review, which of the following tasks is associated with realizing benefits?

Options:

A.

Developing business cases indicating success factors

B.

Monitoring performance against objectives

C.

Documenting risk issues and remediation plans

Question 5

Which of the following refers to a governance topic that can be addressed by diverse components of a governance system?

Options:

A.

Generic components

B.

Capability level

C.

Focus areas

D.

Variants

Question 6

Under which circumstances should an enterprise consider the implementation of a strong compliance function as part of their governance system?

Options:

A.

When the enterprise is subject to substantially higher than average compliance regulations because itis operating in a heavily regulated industry sector

B.

Under all circumstances, because every enterprise is subject to compliance regulations

C.

When the enterprise is operating in a high-threat landscape because of its geopolitical situation

D.

When the enterprise has a strict set of policies and procedures in place

Question 7

The mapping between the IT risk categories in COBIT 2019 and the governance and management objectives expresses the extent to which each of the objectives can be considered:

Options:

A.

As a control for each risk scenario

B.

As an objective for each risk scenario

C.

As a risk tolerance level for each risk

D.

As a risk appetite score for each objective

Question 8

An enterprise has been consistently growing over the years and has decided to adapt the COBIT framework from the growth perspective of the balanced scorecard dimensions. Which of the following enterprise goals is MOST relevant to select?

Options:

A.

Customer-oriented service culture

B.

Managed business risk

C.

Optimization of business process costs

D.

Product and business innovation

Question 9

Which of the following should be the role of IT management when executing an EGIT implementation program plan?

Options:

A.

Ensure the implementation includes the full scope of activities required.

B.

Provide guidance on risk and compliance issues identified during implementation.

C.

Monitor the implementation and provide direction when necessary.

D.

Take ownership for business participation in the implementation.

Question 10

When designing an IT governance system, which of the following IT implementation methods would represent a broader scope covering software building, deployment and operations?

Options:

A.

DevOps

B.

Agile

C.

Hybrid

D.

Traditional

Question 11

What is the FINAL step in governance system design?

Options:

A.

Define target capability levels for the most critical objectives.

B.

Review governance objectives that correspond to high compliance requirements.

C.

Reconcile inherent priority conflicts.

D.

Refine the scope of the governance system.

Question 12

IT management contributes to the initiation of an EGIT program by:

Options:

A.

Gathering input and gaining consensus on an EGIT approach.

B.

Establishing the business strategy and high-level EGIT approach.

C.

Evaluating the proposed EGIT approach to ensure business goals will be met.

D.

Providing advice on specific IT controls and challenging proposed activities.

Question 13

Who is responsible for monitoring the achievement of the overall EGIT implementation program plan results, including the achievement of goals and realization of benefits?

Options:

A.

IT managers

B.

IT process owners

C.

Program steering committee

D.

ICIO

Question 14

Which of the following MUST be done regarding the technology adoption strategy as applied to first movers, followers, and slow adopters?

Options:

A.

One of the three values must be selected that best reflects the enterprise.

B.

Each value must be rated based on the current situation in the enterprise.

C.

Each value must have a completed risk analysis before adoption.

D.

Governance objectives must be mapped to the highest scored value.

Question 15

Which of the following is the MOST common risk response used in risk management?

Options:

A.

Risk avoidance

B.

Risk acceptance

C.

Risk mitigation

D.

Risk transfer

Question 16

Which of the following will BEST enable management to identify all additional resources required to implement planned I&T changes?

Options:

A.

Defining improvement opportunities

B.

Creating a capability maturity model

C.

Performing a SWOT analysis

D.

Conducting a gap analysis.

Question 17

Which of the following industry sectors can be characterized by a low level of regulation and a high level of focus on cost?

Options:

A.

Nonprofit enterprises

B.

Public sector agencies

C.

Health care providers

D.

Financial sector

Question 18

A traditional brick-and-mortar company is planning to fast-track its growth by implementing an information and technology governance system to achieve enterprise goals. Which of the following is the KEY enabler of success in achieving the goals?

Options:

A.

Establishing applicable governance and management objectives

B.

Setting capability levels for key business processes

C.

Conducting staff training programs for performing IT-enabled processes

D.

Tailoring the security policy according to the technology deployed

Question 19

When reviewing the risk profile of an enterprise during the governance design phase, what MUST be established prior to conducting a high-level risk analysis?

Options:

A.

Risk response strategy

B.

Enterprise's risk appetite

C.

Risk management framework

D.

Key risk indicators (KRIs)

Question 20

A recent merger requires an IT initiative to consolidate administrative systems. Where can the implementation team find the details of the intended future state?

Options:

A.

The board’s published announcement of the initiative

B.

Capability assessment results

C.

Business case

D.

Third-party review results

Question 21

When considering the IT implementation methods design factor, and the design factor value is DevOps, which of the following should be a management objective priority?

Options:

A.

Managed solution identification and build (BAI03)

B.

Managed change acceptance and transitioning (BAI07)

C.

Managed service requests and incidents (DSS02)

D.

Managed availability and capacity (BAI04)

Question 22

Which of the following BEST enables an enterprise to show and prove the benefits realized from the implementation of an EGIT program plan?

Options:

A.

Communicating the results and benefits in business impact terms

B.

Delivering a solution from a long-term and complex project

C.

Tracking expected benefits and targets until program implementation

D.

Adopting performance metrics that are easy to achieve

Question 23

Which of the following is the PRIMARY benefit or output derived from setting targeted capability levels and performing a capability-level gap analysis for selected processes?

Options:

A.

Identification of process improvement opportunities

B.

Identification and mitigation of all identified risks

C.

Development of enterprise goals that align to established targets

D.

Development of a business case outline

Question 24

When considering the compliance requirement design factor, and the design factor value is high, which of the following should be a management objective priority?

Options:

A.

Managed data (AP014)

B.

Managed relationships

C.

Managed risk

D.

Managed security (AP013)

Question 25

Which of the following roles creates policies and processes to ensure governance becomes business as usual?

Options:

A.

Internal audit

B.

Business management

C.

Risk, compliance and legal

D.

IT management

Question 26

Which of the following includes capability levels that can be used as benchmarks?

Options:

A.

Process activities

B.

Process metrics

C.

Process practices

D.

Process purpose

Question 27

When assessing the current state of business systems prior to defining the to-be/desired state, the PRIMARY role of the CIO is to ensure:

Options:

A.

A transparent assessment of IT activities

B.

The business customer’s view is represented

C.

Resources are available to support the future state

D.

Legal issues have been considered adequately

Question 28

While tailoring design factors, which of the following roles of IT demonstrates the HIGHEST level of enterprise dependency on I&T?

Options:

A.

Turnaround

B.

Strategic

C.

Support

D.

Factory

Question 29

Which of the following is the MOST likely trigger event for an EGIT improvement or implementation program?

Options:

A.

An enterprise is announcing a merger with one of its major competitors.

B.

The enterprise has failed to meet new privacy regulations and is heavily fined.

C.

The enterprise is faced with a shortage of qualified IT staff.

D.

An enterprise's marketing department has implemented its own IT solutions independent from the IT function.

Question 30

An enterprise is considering threat landscape as a design factor for its governance system. Which of the following would be a reason to classify the threat landscape as high?

Options:

A.

IT trends that could be used in favor of the enterprise

B.

Potential new competitors entering the market

C.

Service delivery problems by IT outsourcers

D.

Geopolitical situations affecting the enterprise

Question 31

In which of the following phases should quick wins be implemented in order to build credibility?

Options:

A.

What needs to be done?

B.

Where do we want to be?

C.

How do we get there?

D.

Where are we now?

Question 32

What functional task area is responsible for assessing the potential return on investment (ROI) during future state planning?

Options:

A.

Continuous improvement

B.

Change enablement

C.

Risk management

D.

Program management

Question 33

Which of the following focus area variants should be considered when the role of IT design factor has a value of Factory?

Options:

A.

Digital transformation

B.

Information security

C.

DevOps

D.

Cloud

Question 34

Which of the following needs to be resolved when finalizing the initial governance design?

Options:

A.

Misaligned enterprise and IT goals

B.

Budgeted versus actual resources

C.

Objectives exceeding enterprise appetite

D.

Conflicting inputs and priorities

Question 35

Which of the following is BEST suited for evaluating the performance of processes?

Options:

A.

Key performance areas

B.

Aligned goals

C.

Capability levels

D.

Key goal indicators

Question 36

Which of the following is a KEY input to be considered when defining drivers for a COBIT implementation?

Options:

A.

IT process documentation

B.

Stakeholder map

C.

Business case outline

D.

Enterprise policies

Question 37

Which of the following is a KEY consideration when determining the initial scope of a governance system?

Options:

A.

The size of the enterprise

B.

The role of IT within the enterprise

C.

Current I&T-related issues of the enterprise

D.

Compliance requirements faced by the enterprise

Question 38

Which of the following MOST effectively addresses cultural aspects of a major international IT initiative that impacts the entire enterprise?

Options:

A.

Continuous improvement

B.

Risk assessments

C.

Change enablement

D.

Program management

Question 39

I&T-related issues, also called pain points:

Options:

A.

Could be considered risks that have materialized.

B.

Could be considered risks that have not yet materialized.

C.

Are generally reported and tracked separately from risk management processes.

D.

Are restricted to internally generated issues.

Page: 1 / 13
Total 132 questions