ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











Which of the following provides the STRONGEST indication that IT governance is well established within an organizational culture?

A.
IT performance metrics are defined in the balanced scorecard.
A.
IT performance metrics are defined in the balanced scorecard.
Answers
B.
Benefits of IT governance are realized throughout the organization.
B.
Benefits of IT governance are realized throughout the organization.
Answers
C.
There is awareness of IT metrics throughout the organization.
C.
There is awareness of IT metrics throughout the organization.
Answers
D.
IT governance defines how IT projects should be assessed.
D.
IT governance defines how IT projects should be assessed.
Answers
Suggested answer: A

A board of directors has just received a report indicating that only a small number of IT initiatives have been completed on time and within budget, A third of the projects were cancelled prior to completion, and more than half will cost almost double their original estimates. An analysis has determined that no one is held responsible for the completion of investment initiatives, and there is no consistency in execution. Which of the following would BEST help the enterprise address these problems?

A.
Establishing a project governance framework
A.
Establishing a project governance framework
Answers
B.
Assigning business management to an IT investment review board
B.
Assigning business management to an IT investment review board
Answers
C.
Establishing an IT risk management plan
C.
Establishing an IT risk management plan
Answers
D.
Aligning IT investment priorities to the business
D.
Aligning IT investment priorities to the business
Answers
Suggested answer: B

An enterprise is trying to increase the maturity of its IT process from being ad hoc to being repeatable. Which of the following is the PRIMARY benefit of this change?

A.
Process optimization is embedded across the organization.
A.
Process optimization is embedded across the organization.
Answers
B.
Required outcomes are mapped to business objectives.
B.
Required outcomes are mapped to business objectives.
Answers
C.
Process performance is measured in business terms.
C.
Process performance is measured in business terms.
Answers
D.
Required outcomes are more frequently achieved.
D.
Required outcomes are more frequently achieved.
Answers
Suggested answer: D

A new chief information officer (CIO) of an enterprise recommends implementing portfolio management after realizing there is no process in place for evaluating investments prior to selection. What should be the PRIMARY strategic goal driving this decision?

A.
Maximize value from the combined investments.
A.
Maximize value from the combined investments.
Answers
B.
Standardize processes for investment evaluation.
B.
Standardize processes for investment evaluation.
Answers
C.
Align investments to the enterprise architecture (EA).
C.
Align investments to the enterprise architecture (EA).
Answers
D.
Enable transparency within the investment process.
D.
Enable transparency within the investment process.
Answers
Suggested answer: A

Supply chain management has established a supplier policy requiring multiple technology suppliers. What is the BEST way to ensure the success of this policy?

A.
Identity and select suppliers based on cost.
A.
Identity and select suppliers based on cost.
Answers
B.
Align the vendor selection process with the security policy.
B.
Align the vendor selection process with the security policy.
Answers
C.
Implement a master service agreement.
C.
Implement a master service agreement.
Answers
D.
Align enterprise architecture (EA) and procurement strategies.
D.
Align enterprise architecture (EA) and procurement strategies.
Answers
Suggested answer: D

When establishing an enterprise data model, the BEST way to ensure the integrity of data is to:

A.
classify information using an agreed-upon schema.
A.
classify information using an agreed-upon schema.
Answers
B.
implement the highest level of protection to data across the enterprise.
B.
implement the highest level of protection to data across the enterprise.
Answers
C.
establish a privileged access management platform.
C.
establish a privileged access management platform.
Answers
D.
implement a data loss prevention (DLP) program.
D.
implement a data loss prevention (DLP) program.
Answers
Suggested answer: D

Which of the following is the BEST indication that enterprise value is being derived from IT?

A.
IT strategy supports continuous improvement initiatives
A.
IT strategy supports continuous improvement initiatives
Answers
B.
Metrics are established for IT performance.
B.
Metrics are established for IT performance.
Answers
C.
Rate of return for projects is achieved.
C.
Rate of return for projects is achieved.
Answers
D.
IT services enable business strategy.
D.
IT services enable business strategy.
Answers
Suggested answer: D

Which of the following should be the FIRST step in planning an IT governance implementation?

A.
Assign decision-making responsibilities.
A.
Assign decision-making responsibilities.
Answers
B.
Obtain necessary business funding.
B.
Obtain necessary business funding.
Answers
C.
Define key business performance indicators.
C.
Define key business performance indicators.
Answers
D.
Identify business drivers.
D.
Identify business drivers.
Answers
Suggested answer: D

A CIO just received a final audit report that indicates there is inconsistent enforcement of the enterprise's mobile device acceptable use policy throughout all business units. Which of the following should be the FIRST step to address this issue?

A.
Incorporate compliance metrics into performance goals.
A.
Incorporate compliance metrics into performance goals.
Answers
B.
Review the relevance of existing policy.
B.
Review the relevance of existing policy.
Answers
C.
Mandate awareness training for all mobile device users.
C.
Mandate awareness training for all mobile device users.
Answers
D.
Implement controls to enforce the policy.
D.
Implement controls to enforce the policy.
Answers
Suggested answer: B

Which of the following should be the MOST important consideration for a hospital planning to use cloud services and mobile applications?

A.
Privacy requirements
A.
Privacy requirements
Answers
B.
Data classification
B.
Data classification
Answers
C.
Acceptable use policy
C.
Acceptable use policy
Answers
D.
Internet connectivity
D.
Internet connectivity
Answers
Suggested answer: A
Total 577 questions
Go to page: of 58