ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











An enterprise is concerned with the potential for data leakage as a result of increased use of social media in the workplace, and wishes to establish a social media strategy. Which of the following should be the MOST important consideration in developing this strategy?

A.
Criticality of the information
A.
Criticality of the information
Answers
B.
Ensuring that the enterprise architecture (EA) is updated
B.
Ensuring that the enterprise architecture (EA) is updated
Answers
C.
Data ownership
C.
Data ownership
Answers
D.
The balance between business benefits and risk
D.
The balance between business benefits and risk
Answers
Suggested answer: A

The CIO of an international enterprise is considering the use of an offshore cloud service provider to store customer dat

a. Which of the following should be the MOST important consideration when making this decision?

A.
IT service delivery roles and responsibilities
A.
IT service delivery roles and responsibilities
Answers
B.
Compliance with applicable legislation
B.
Compliance with applicable legislation
Answers
C.
Likelihood of natural disasters
C.
Likelihood of natural disasters
Answers
D.
The cloud service provider's reputation
D.
The cloud service provider's reputation
Answers
Suggested answer: B

Which of the following BEST indicates the success of an enterprise's IT governance framework after implementation?

A.
A high percentage of business owners involved with the approval of the IT strategic plan
A.
A high percentage of business owners involved with the approval of the IT strategic plan
Answers
B.
A high percentage of IT systems complying with corporate information security standards
B.
A high percentage of IT systems complying with corporate information security standards
Answers
C.
A high percentage of IT projects delivered on time and on budget
C.
A high percentage of IT projects delivered on time and on budget
Answers
D.
A high percentage of IT investments delivering expected benefits
D.
A high percentage of IT investments delivering expected benefits
Answers
Suggested answer: D

Which of the following aspects of IT governance BEST addresses the potential intellectual property implications of a cloud service provider having a database in another country?

A.
Contract management
A.
Contract management
Answers
B.
Continuity planning
B.
Continuity planning
Answers
C.
Data management
C.
Data management
Answers
D.
Security architecture
D.
Security architecture
Answers
Suggested answer: A

After shifting from lease to purchase of IT infrastructure and software licenses, an enterprise has to pay for unexpected lease extensions causing significant cost overruns. The BEST direction for the IT steering committee would be to establish;

A.
an end-of-life program to remove aging infrastructure from the environment.
A.
an end-of-life program to remove aging infrastructure from the environment.
Answers
B.
budget cuts to compensate for the cost overruns.
B.
budget cuts to compensate for the cost overruns.
Answers
C.
a program to annually review financial policy on overruns.
C.
a program to annually review financial policy on overruns.
Answers
D.
a policy to consider total cost of ownership (TCO) in investment decisions.
D.
a policy to consider total cost of ownership (TCO) in investment decisions.
Answers
Suggested answer: A

Which of the following is MOST important to the successful implementation of enterprise architecture (EA)?

A.
Developing data modeling tools
A.
Developing data modeling tools
Answers
B.
Managing the challenge of change
B.
Managing the challenge of change
Answers
C.
Reducing the cost of IT investments
C.
Reducing the cost of IT investments
Answers
D.
Establishing key performance indicators (KPIs)
D.
Establishing key performance indicators (KPIs)
Answers
Suggested answer: B

The BEST time to identity metrics to measure the performance of an IT-enabled investment is during:

A.
system implementation
A.
system implementation
Answers
B.
project initiation
B.
project initiation
Answers
C.
investment feasibility analysis
C.
investment feasibility analysis
Answers
D.
business case development.
D.
business case development.
Answers
Suggested answer: D

To meet the growing demands of a newly established business unit, IT senior management has been tasked with changing the current IT organization model to service-oriented. With significant growth expected of the IT organization, which of the following is the MOST important consideration when planning for long-term IT service delivery?

A.
The IT service delivery model is approved by the business.
A.
The IT service delivery model is approved by the business.
Answers
B.
An IT risk management process is in place.
B.
An IT risk management process is in place.
Answers
C.
IT is able to provide a comprehensive service catalog to the business.
C.
IT is able to provide a comprehensive service catalog to the business.
Answers
D.
The IT organization is able to sustain business requirements.
D.
The IT organization is able to sustain business requirements.
Answers
Suggested answer: C

When preparing a new IT strategic plan for board approval, the MOST important consideration is to ensure the plan identifies:

A.
roles and responsibilities that link to IT objectives.
A.
roles and responsibilities that link to IT objectives.
Answers
B.
specific resourcing requirements for identified IT projects.
B.
specific resourcing requirements for identified IT projects.
Answers
C.
frameworks that will be aligned to IT programs.
C.
frameworks that will be aligned to IT programs.
Answers
D.
implications of the strategy on the procurement process.
D.
implications of the strategy on the procurement process.
Answers
Suggested answer: A

Which of the following should be done FIRST when defining responsibilities for ownership of information and systems?

A.
Require an information risk assessment.
A.
Require an information risk assessment.
Answers
B.
Identify systems that are outsourced.
B.
Identify systems that are outsourced.
Answers
C.
Ensure information is classified.
C.
Ensure information is classified.
Answers
D.
Require an inventory of information assets.
D.
Require an inventory of information assets.
Answers
Suggested answer: D
Total 577 questions
Go to page: of 58