ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











IT security is concerned with employees' increasing use of personal equipment for work-related purposes, while employees claim it allows them to be more productive. A decision on whether to modify the enterprise information security policy should be based on:

A.
audit findings.
A.
audit findings.
Answers
B.
user access approval procedures.
B.
user access approval procedures.
Answers
C.
the impact to security.
C.
the impact to security.
Answers
D.
a risk and benefit evaluation.
D.
a risk and benefit evaluation.
Answers
Suggested answer: D

Which of the following is the PRIMARY consideration when developing an information asset management program?

A.
Operational requirements
A.
Operational requirements
Answers
B.
Industry best practice
B.
Industry best practice
Answers
C.
Cost benefit
C.
Cost benefit
Answers
D.
Regulatory requirements
D.
Regulatory requirements
Answers
Suggested answer: A

An enterprise is determining the objectives for an IT training improvement initiative from a governance prosoectic. it would be MOST important to ensure that:

A.
policies and processes address both enterprise requirements and professional growth
A.
policies and processes address both enterprise requirements and professional growth
Answers
B.
courses of instruction that will maximize employee productivity are identified
B.
courses of instruction that will maximize employee productivity are identified
Answers
C.
several different training strategies are created for final approval by the CIO
C.
several different training strategies are created for final approval by the CIO
Answers
D.
IT employees are surveyed and interviewed to identify development needs
D.
IT employees are surveyed and interviewed to identify development needs
Answers
Suggested answer: A

Which of the following is the BEST way to maximize the value of an enterprise's information aseet base?

A.
Seek additional opportunities to leverage existing information assets .
A.
Seek additional opportunities to leverage existing information assets .
Answers
B.
Facilitate widespread user access to ail information assets
B.
Facilitate widespread user access to ail information assets
Answers
C.
Regularly purge information assets to minimize maintenance costs
C.
Regularly purge information assets to minimize maintenance costs
Answers
D.
Implement an automated information management platform
D.
Implement an automated information management platform
Answers
Suggested answer: D

The PRIMARY benefit of using an IT service catalog as part of the IT governance program is that it.

A.
ensures IT effectively meets future business needs,
A.
ensures IT effectively meets future business needs,
Answers
B.
provides a foundation for measuring IT performance,
B.
provides a foundation for measuring IT performance,
Answers
C.
improves the ability to allocate IT resources
C.
improves the ability to allocate IT resources
Answers
D.
establishes enterprise performance metrics per service
D.
establishes enterprise performance metrics per service
Answers
Suggested answer: A

When developing an IT strategic plan that supports an enterprise's business goals which of the following should be done FIRST?

A.
Ensure that IT drives business goals
A.
Ensure that IT drives business goals
Answers
B.
Analyze benchmarking data
B.
Analyze benchmarking data
Answers
C.
Understand the current vision
C.
Understand the current vision
Answers
D.
Perform a business impact analysis (BIA)
D.
Perform a business impact analysis (BIA)
Answers
Suggested answer: C

The PRIMARY reason for implementing an IT governance program in an enterprise is to

A.
balance the demand for information and the ability to deliver.
A.
balance the demand for information and the ability to deliver.
Answers
B.
comply with regulatory requirements
B.
comply with regulatory requirements
Answers
C.
reduce risks due to improved compensating controls.
C.
reduce risks due to improved compensating controls.
Answers
D.
decrease the scale of investment in information systems due to budgetary controls.
D.
decrease the scale of investment in information systems due to budgetary controls.
Answers
Suggested answer: A

Which of the following is the BEST way to address an IT audit finding that many enterprise application updates lack appropriate documentation?

A.
Enforce change control procedures.
A.
Enforce change control procedures.
Answers
B.
Conduct software quality audits
B.
Conduct software quality audits
Answers
C.
Review the application development life cycle.
C.
Review the application development life cycle.
Answers
D.
Add change control to the risk register.
D.
Add change control to the risk register.
Answers
Suggested answer: B

Which of the following is the GREATEST benefit of using a quantitative risk assessment method?

A.
It uses resources more efficiently
A.
It uses resources more efficiently
Answers
B.
It can be used to assess risks against non-tangible assets
B.
It can be used to assess risks against non-tangible assets
Answers
C.
It reduces subjectivity
C.
It reduces subjectivity
Answers
D.
It helps in prioritizing risk response action plans
D.
It helps in prioritizing risk response action plans
Answers
Suggested answer: C

Following the rollout of an enterprise IT software solution that hosts sensitive data it was discovered that the application's role-based access control was not functioning as specified Which of the following is the BEST way to prevent reoccurrence in the future?

A.
Ensure supplier contracts include penalties if solutions do not meet functional requirements
A.
Ensure supplier contracts include penalties if solutions do not meet functional requirements
Answers
B.
Ensure the evaluation process requires independent assessment of solutions prior to implementation
B.
Ensure the evaluation process requires independent assessment of solutions prior to implementation
Answers
C.
Ensure supplier contracts include a provision for the right to audit on an annual basis
C.
Ensure supplier contracts include a provision for the right to audit on an annual basis
Answers
D.
Ensure procurement processes require the identification of alternate vendors to ensure business continuity.
D.
Ensure procurement processes require the identification of alternate vendors to ensure business continuity.
Answers
Suggested answer: B
Total 577 questions
Go to page: of 58