ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











An enterprise plans to implement a business intelligence (Bl) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

A.
Interface issues between enterprise and Bl applications
A.
Interface issues between enterprise and Bl applications
Answers
B.
Large volumes of data fed from enterprise applications
B.
Large volumes of data fed from enterprise applications
Answers
C.
The need for staff to be trained on the new Bl tool
C.
The need for staff to be trained on the new Bl tool
Answers
D.
Data definition and mapping sources from applications
D.
Data definition and mapping sources from applications
Answers
Suggested answer: B

The use of new technology in an enterprise will require specific expertise and updated system development processes. There is concern that IT is not properly sourced. Which of the following should be the FIRST course of action?

A.
Perform a risk assessment on potential outsourcing.
A.
Perform a risk assessment on potential outsourcing.
Answers
B.
Update the enterprise architecture (EA) with the new technology.
B.
Update the enterprise architecture (EA) with the new technology.
Answers
C.
Review the IT balanced scorecard for sourcing opportunities.
C.
Review the IT balanced scorecard for sourcing opportunities.
Answers
D.
Assess the gap between current and required staff competencies.
D.
Assess the gap between current and required staff competencies.
Answers
Suggested answer: D

An enterprise is evaluating a Software as a Service (SaaS) solution to support a core business process. There is no outsourcing governance or vendor management in place. What should be the CEO's FIRST course of action?

A.
Ensure the roles and responsibilities to manage service providers are defined.
A.
Ensure the roles and responsibilities to manage service providers are defined.
Answers
B.
Establish a contract with the SaaS solution provider.
B.
Establish a contract with the SaaS solution provider.
Answers
C.
Instruct management to use the standard procurement process.
C.
Instruct management to use the standard procurement process.
Answers
D.
Ensure the service level agreements (SLAs) for service providers are defined.
D.
Ensure the service level agreements (SLAs) for service providers are defined.
Answers
Suggested answer: A

An IT steering committee wants the enterprise's mobile workforce to use cloud-based file storage to save non-sensitive corporate data, removing the need for remote access to that information. Before this change is implemented, what should be included in the data management policy?

A.
A mandate for periodic employee training on how to classify corporate data files
A.
A mandate for periodic employee training on how to classify corporate data files
Answers
B.
A mandate for the encryption of all corporate data files at rest that contain sensitive data
B.
A mandate for the encryption of all corporate data files at rest that contain sensitive data
Answers
C.
A process for blocking access to cloud-based apps if inappropriate content is discovered
C.
A process for blocking access to cloud-based apps if inappropriate content is discovered
Answers
D.
A requirement to scan approved cloud-based apps for inappropriate content
D.
A requirement to scan approved cloud-based apps for inappropriate content
Answers
Suggested answer: A

Who is PRIMARILY accountable for delivering the benefits of an IT-enabled investment program to the enterprise?

A.
Program manager
A.
Program manager
Answers
B.
IT steering committee chair
B.
IT steering committee chair
Answers
C.
CIO
C.
CIO
Answers
D.
Business sponsor
D.
Business sponsor
Answers
Suggested answer: D

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

A.
Authenticating access to information assets based on roles or business rules.
A.
Authenticating access to information assets based on roles or business rules.
Answers
B.
Implementing multi-factor authentication controls
B.
Implementing multi-factor authentication controls
Answers
C.
Granting access to information based on information architecture
C.
Granting access to information based on information architecture
Answers
D.
Engaging an audit of logical access controls and related security policies
D.
Engaging an audit of logical access controls and related security policies
Answers
Suggested answer: A

Which of the following would be of MOST concern regarding the effectiveness of risk management processes?

A.
Key risk indicators (KRIs) are not established.
A.
Key risk indicators (KRIs) are not established.
Answers
B.
Risk management requirements are not included in performance reviews.
B.
Risk management requirements are not included in performance reviews.
Answers
C.
The plans and procedures are not updated on an annual basis.
C.
The plans and procedures are not updated on an annual basis.
Answers
D.
There is no framework to ensure effective reporting of risk events.
D.
There is no framework to ensure effective reporting of risk events.
Answers
Suggested answer: A

An enterprise has a zero-tolerance policy regarding security. This policy is causing a large number of email attachments to be blocked and is a disruption to enterprise. Which of the following should be the FIRST governance step to address this email issue?

A.
Direct the development of an email usage policy.
A.
Direct the development of an email usage policy.
Answers
B.
Obtain senior management input based on identified risk.
B.
Obtain senior management input based on identified risk.
Answers
C.
Recommend business sign-off on the zero-tolerance policy.
C.
Recommend business sign-off on the zero-tolerance policy.
Answers
D.
Introduce an exception process.
D.
Introduce an exception process.
Answers
Suggested answer: B

Which of the following is the BEST method for determining an enterprise's current appetite for risk?

A.
Interviewing senior management
A.
Interviewing senior management
Answers
B.
Evaluating the balanced scorecard
B.
Evaluating the balanced scorecard
Answers
C.
Reviewing recent audit findings
C.
Reviewing recent audit findings
Answers
D.
Assessing social media adoption
D.
Assessing social media adoption
Answers
Suggested answer: A

Which of the following is the MOST effective approach to ensure senior management sponsorship of IT risk management?

A.
Benchmark risk framework against best practices.
A.
Benchmark risk framework against best practices.
Answers
B.
Calculate financial impact for each IT risk finding.
B.
Calculate financial impact for each IT risk finding.
Answers
C.
Periodically review the IT risk register entries.
C.
Periodically review the IT risk register entries.
Answers
D.
Integrate IT risk into enterprise risk management (ERM).
D.
Integrate IT risk into enterprise risk management (ERM).
Answers
Suggested answer: C
Total 577 questions
Go to page: of 58