ExamGecko
Home / Isaca / CGEIT / List of questions
Ask Question

Isaca CGEIT Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?

Significant gaps are present m the incident documentation.
Significant gaps are present m the incident documentation.
The incident was not logged in the ticketing system.
The incident was not logged in the ticketing system.
Response decisions were made without consulting the appropriate authority.
Response decisions were made without consulting the appropriate authority.
Response efforts had to be outsourced due to insufficient internal resources.
Response efforts had to be outsourced due to insufficient internal resources.
Suggested answer: C
asked 18/09/2024
Duncan Brundseaux
44 questions

Question 112

Report Export Collapse

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

Require an update to enterprise data policies.
Require an update to enterprise data policies.
Request an impact analysis.
Request an impact analysis.
Review documented data interdependence.
Review documented data interdependence.
Validate against existing architecture.
Validate against existing architecture.
Suggested answer: D
asked 18/09/2024
George Sanchez
43 questions

Question 113

Report Export Collapse

An IT director has become aware that a certain subset of data collected lawfully can be used to generate additional revenue. However, this particular use of the data is outside the original intention. What is the PRIMARY reason this situation should be escalated to the IT steering committee?

Potential legal penalties
Potential legal penalties
Ethical concerns
Ethical concerns
Regulatory requirements
Regulatory requirements
Data protection
Data protection
Suggested answer: C
asked 18/09/2024
Kirk Boothe
42 questions

Question 114

Report Export Collapse

Of the following, who should approve the criteria for information quality within an enterprise?

Information architect
Information architect
Information analyst
Information analyst
Information steward
Information steward
Information owner
Information owner
Suggested answer: D
asked 18/09/2024
ONWUDIWE NYENKE
37 questions

Question 115

Report Export Collapse

From a governance perspective, the PRIMARY goal of an IT risk optimization process should be to ensure:

IT risk thresholds are defined in the enterprise architecture (EA).
IT risk thresholds are defined in the enterprise architecture (EA).
the IT risk mitigation strategy is approved by management.
the IT risk mitigation strategy is approved by management.
IT risk is mapped to the balanced scorecard.
IT risk is mapped to the balanced scorecard.
the impact of IT risk to the enterprise is managed.
the impact of IT risk to the enterprise is managed.
Suggested answer: D
asked 18/09/2024
Misael Mosco Jiménez
44 questions

Question 116

Report Export Collapse

Which of the following is the BEST way to ensure new systems can be adequately supported once in production?

Become a Premium Member for full access
  Unlock Premium Member

Question 117

Report Export Collapse

To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?

Become a Premium Member for full access
  Unlock Premium Member

Question 118

Report Export Collapse

The board and senior management of a new enterprise recently met to formalize an IT governance framework. The board of directors' FIRST step in implementing IT governance is to ensure that:

Become a Premium Member for full access
  Unlock Premium Member

Question 119

Report Export Collapse

An IT risk assessment for a large healthcare group revealed an increased risk of unauthorized disclosure of information. Which of the following should be established FIRST to address the risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 120

Report Export Collapse

Which of the following should be the MAIN governance focus when implementing a newly approved bring your own device (BYOD) policy?

Become a Premium Member for full access
  Unlock Premium Member
Total 582 questions
Go to page: of 59
Search

Related questions