ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?

A.
Significant gaps are present m the incident documentation.
A.
Significant gaps are present m the incident documentation.
Answers
B.
The incident was not logged in the ticketing system.
B.
The incident was not logged in the ticketing system.
Answers
C.
Response decisions were made without consulting the appropriate authority.
C.
Response decisions were made without consulting the appropriate authority.
Answers
D.
Response efforts had to be outsourced due to insufficient internal resources.
D.
Response efforts had to be outsourced due to insufficient internal resources.
Answers
Suggested answer: C

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

A.
Require an update to enterprise data policies.
A.
Require an update to enterprise data policies.
Answers
B.
Request an impact analysis.
B.
Request an impact analysis.
Answers
C.
Review documented data interdependence.
C.
Review documented data interdependence.
Answers
D.
Validate against existing architecture.
D.
Validate against existing architecture.
Answers
Suggested answer: D

An IT director has become aware that a certain subset of data collected lawfully can be used to generate additional revenue. However, this particular use of the data is outside the original intention. What is the PRIMARY reason this situation should be escalated to the IT steering committee?

A.
Potential legal penalties
A.
Potential legal penalties
Answers
B.
Ethical concerns
B.
Ethical concerns
Answers
C.
Regulatory requirements
C.
Regulatory requirements
Answers
D.
Data protection
D.
Data protection
Answers
Suggested answer: C

Of the following, who should approve the criteria for information quality within an enterprise?

A.
Information architect
A.
Information architect
Answers
B.
Information analyst
B.
Information analyst
Answers
C.
Information steward
C.
Information steward
Answers
D.
Information owner
D.
Information owner
Answers
Suggested answer: D

From a governance perspective, the PRIMARY goal of an IT risk optimization process should be to ensure:

A.
IT risk thresholds are defined in the enterprise architecture (EA).
A.
IT risk thresholds are defined in the enterprise architecture (EA).
Answers
B.
the IT risk mitigation strategy is approved by management.
B.
the IT risk mitigation strategy is approved by management.
Answers
C.
IT risk is mapped to the balanced scorecard.
C.
IT risk is mapped to the balanced scorecard.
Answers
D.
the impact of IT risk to the enterprise is managed.
D.
the impact of IT risk to the enterprise is managed.
Answers
Suggested answer: D

Which of the following is the BEST way to ensure new systems can be adequately supported once in production?

A.
Establish a resource management framework.
A.
Establish a resource management framework.
Answers
B.
Evaluate the operational requirements of the business stakeholders.
B.
Evaluate the operational requirements of the business stakeholders.
Answers
C.
Identify key performance indicators (KPIs).
C.
Identify key performance indicators (KPIs).
Answers
D.
Require operational management be identified in the business case.
D.
Require operational management be identified in the business case.
Answers
Suggested answer: B

To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?

A.
IT staff morale
A.
IT staff morale
Answers
B.
Core IT processes
B.
Core IT processes
Answers
C.
Outsourcer's reputation
C.
Outsourcer's reputation
Answers
D.
New service level agreements (SLAs)
D.
New service level agreements (SLAs)
Answers
Suggested answer: B

The board and senior management of a new enterprise recently met to formalize an IT governance framework. The board of directors' FIRST step in implementing IT governance is to ensure that:

A.
an IT balanced scorecard is implemented.
A.
an IT balanced scorecard is implemented.
Answers
B.
a portfolio of IT-enabled investments is developed.
B.
a portfolio of IT-enabled investments is developed.
Answers
C.
IT roles and responsibilities are established.
C.
IT roles and responsibilities are established.
Answers
D.
IT policies and procedures are defined.
D.
IT policies and procedures are defined.
Answers
Suggested answer: C

An IT risk assessment for a large healthcare group revealed an increased risk of unauthorized disclosure of information. Which of the following should be established FIRST to address the risk?

A.
Data encryption tools
A.
Data encryption tools
Answers
B.
Data loss prevention tools
B.
Data loss prevention tools
Answers
C.
Data classification policy
C.
Data classification policy
Answers
D.
Data retention policy
D.
Data retention policy
Answers
Suggested answer: C

Which of the following should be the MAIN governance focus when implementing a newly approved bring your own device (BYOD) policy?

A.
Recommending mobile applications that will increase business productivity
A.
Recommending mobile applications that will increase business productivity
Answers
B.
Training employees on the enterprise's chosen mobile device management system
B.
Training employees on the enterprise's chosen mobile device management system
Answers
C.
Educating employees on the increased IT security risk to the enterprise
C.
Educating employees on the increased IT security risk to the enterprise
Answers
D.
Understanding knowledge gaps of IT employees to support different mobile platforms
D.
Understanding knowledge gaps of IT employees to support different mobile platforms
Answers
Suggested answer: C
Total 577 questions
Go to page: of 58