ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Which of the following should be the PRIMARY goal of implementing an IT strategic planning process?

A.
Determining benefits from IT deployments
A.
Determining benefits from IT deployments
Answers
B.
Optimizing IT resources to drive innovation
B.
Optimizing IT resources to drive innovation
Answers
C.
Directing business strategy to achieve goals
C.
Directing business strategy to achieve goals
Answers
D.
Translating business needs into IT initiatives
D.
Translating business needs into IT initiatives
Answers
Suggested answer: D

A health tech enterprise wants to ensure that its in-house developed mobile app for users complies with data privacy regulations. Which of the following should be identified FIRST when creating an inventory of information systems and data related to the mobile app?

A.
Data maintained by vendors
A.
Data maintained by vendors
Answers
B.
Vendors and outsourced systems
B.
Vendors and outsourced systems
Answers
C.
Application and data owners
C.
Application and data owners
Answers
D.
Information classification scheme
D.
Information classification scheme
Answers
Suggested answer: D

Which of the following is the MOST important, characteristic of a well-defined information architecture?

A.
It addresses key stakeholder requirements.
A.
It addresses key stakeholder requirements.
Answers
B.
It ensures compliance with regulations.
B.
It ensures compliance with regulations.
Answers
C.
It enables achievement of service level agreements (SLAs).
C.
It enables achievement of service level agreements (SLAs).
Answers
D.
It supports IT strategic goals.
D.
It supports IT strategic goals.
Answers
Suggested answer: B

An enterprise wants to address the human factors of social engineering risk within the organization. From a governance perspective, which of the following is the BEST way to mitigate this risk?

A.
Distribute the social media information security policy to staff.
A.
Distribute the social media information security policy to staff.
Answers
B.
Mandate annual security awareness training.
B.
Mandate annual security awareness training.
Answers
C.
Restrict access to social media.
C.
Restrict access to social media.
Answers
D.
Mandate security requirements be included in employee contracts.
D.
Mandate security requirements be included in employee contracts.
Answers
Suggested answer: B

Which of the following has the GREATEST influence on data quality assurance?

A.
Data stewardship
A.
Data stewardship
Answers
B.
Data encryption
B.
Data encryption
Answers
C.
Data classification
C.
Data classification
Answers
D.
Data modeling
D.
Data modeling
Answers
Suggested answer: D

Which of the following is MOST important to consider when planning to implement a cloud-based application for sharing documents with internal and external parties?

A.
Cloud implementation model
A.
Cloud implementation model
Answers
B.
User experience
B.
User experience
Answers
C.
Information ownership
C.
Information ownership
Answers
D.
Third-party access rights
D.
Third-party access rights
Answers
Suggested answer: D

In an enterprise that has worldwide business units and a centralized financial control model, which of the following is a barrier to strategic alignment of business and IT?

A.
Each business unit has its own steering committee for IT investment and prioritization.
A.
Each business unit has its own steering committee for IT investment and prioritization.
Answers
B.
Uniform portfolio management is in place throughout the business units.
B.
Uniform portfolio management is in place throughout the business units.
Answers
C.
IT is the exclusive provider of IT services to the business units.
C.
IT is the exclusive provider of IT services to the business units.
Answers
D.
The enterprise's CIO is a member of the executive committee.
D.
The enterprise's CIO is a member of the executive committee.
Answers
Suggested answer: A

An enterprise's executive team has recently released a new IT strategy and related objectives. Which of the following would be the MOST effective way for the CIO to ensure IT personnel are supporting the new strategy's objectives?

A.
Measure progress towards IT objectives and communicate the results to IT staff.
A.
Measure progress towards IT objectives and communicate the results to IT staff.
Answers
B.
Incorporate IT objectives into individual performance evaluations.
B.
Incorporate IT objectives into individual performance evaluations.
Answers
C.
Develop communication materials to promote the new IT strategy and objectives.
C.
Develop communication materials to promote the new IT strategy and objectives.
Answers
D.
Require IT managers to assign activities aligned to the IT objectives.
D.
Require IT managers to assign activities aligned to the IT objectives.
Answers
Suggested answer: D

The PRIMARY reason for using quantitative criteria in developing business cases for IT projects is to:

A.
improve the process of evaluating returns after implementation.
A.
improve the process of evaluating returns after implementation.
Answers
B.
benchmark project success with similar enterprises.
B.
benchmark project success with similar enterprises.
Answers
C.
learn lessons from errors made in past projects.
C.
learn lessons from errors made in past projects.
Answers
D.
apply other corporate standards to the development project.
D.
apply other corporate standards to the development project.
Answers
Suggested answer: A

Which of the following is the MOST important reason to include internal audit as a stakeholder when establishing clear roles for the governance of IT?

A.
Internal audit has knowledge and technical expertise to advise on IT infrastructure.
A.
Internal audit has knowledge and technical expertise to advise on IT infrastructure.
Answers
B.
Internal audit is accountable for the overall enterprise governance of IT.
B.
Internal audit is accountable for the overall enterprise governance of IT.
Answers
C.
Internal audit implements controls over IT risks and security.
C.
Internal audit implements controls over IT risks and security.
Answers
D.
Internal audit provides input on relevant issues and control processes.
D.
Internal audit provides input on relevant issues and control processes.
Answers
Suggested answer: D
Total 577 questions
Go to page: of 58