ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











An enterprise is considering outsourcing non-core IT processes Which of the following should be the FIRST step?

A.
Update resource allocation policies
A.
Update resource allocation policies
Answers
B.
Conduct a cost-benefit analysis for outsourcing.
B.
Conduct a cost-benefit analysis for outsourcing.
Answers
C.
Issue a formal request for proposal to outsourcing vendors.
C.
Issue a formal request for proposal to outsourcing vendors.
Answers
D.
Establish service level metrics for outsourced activities
D.
Establish service level metrics for outsourced activities
Answers
Suggested answer: B

The board of directors of an enterprise has questioned whether the business is focused on optimizing value. The IT strategy committees BEST action to address the board's concern is to:

A.
initiate reporting and review of key IT performance metrics.
A.
initiate reporting and review of key IT performance metrics.
Answers
B.
conduct a portfolio review to assess the benefits realization of IT investments.
B.
conduct a portfolio review to assess the benefits realization of IT investments.
Answers
C.
conduct a benchmark to assess IT value relative to competitors.
C.
conduct a benchmark to assess IT value relative to competitors.
Answers
D.
form a technology council to monitor the efficiency of project implementation.
D.
form a technology council to monitor the efficiency of project implementation.
Answers
Suggested answer: A

Which of the following activities MUST be completed before developing an IT strategic plan?

A.
Review the enterprise business plan
A.
Review the enterprise business plan
Answers
B.
Align the enterprise vision statement with business processes
B.
Align the enterprise vision statement with business processes
Answers
C.
Develop an enterprise architecture (EA) framework
C.
Develop an enterprise architecture (EA) framework
Answers
D.
Review the enterprise risk tolerance level
D.
Review the enterprise risk tolerance level
Answers
Suggested answer: A

Which of the following is the BEST indication that information security requirements are taken into consideration when developing IT processes?

A.
The database is deployed in a distributed processing platform
A.
The database is deployed in a distributed processing platform
Answers
B.
The information architecture incorporates data classification
B.
The information architecture incorporates data classification
Answers
C.
Customer profiles are stored with a domestic service provider
C.
Customer profiles are stored with a domestic service provider
Answers
D.
The integrity of sensitive information is periodically reviewed
D.
The integrity of sensitive information is periodically reviewed
Answers
Suggested answer: B

To minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations which of the following is the BEST action to take?

A.
Update the information architecture
A.
Update the information architecture
Answers
B.
Revise the IT strategic plan
B.
Revise the IT strategic plan
Answers
C.
Implement data loss prevention (DLP)
C.
Implement data loss prevention (DLP)
Answers
D.
Establish new IT key risk indicators (KRIs)
D.
Establish new IT key risk indicators (KRIs)
Answers
Suggested answer: A

The IT department has determined that problems with a business report are due to quality issues within a set of data To whom should IT refer the matter for resolution?

A.
Internal audit
A.
Internal audit
Answers
B.
Data architect
B.
Data architect
Answers
C.
Business analyst
C.
Business analyst
Answers
D.
Data steward
D.
Data steward
Answers
Suggested answer: D

Which of the following is the MOST important consideration when developing a new IT service'?

A.
Return on investment (ROI)
A.
Return on investment (ROI)
Answers
B.
Resource requirements.
B.
Resource requirements.
Answers
C.
Service level agreements (SLAs)
C.
Service level agreements (SLAs)
Answers
D.
Economies of scale
D.
Economies of scale
Answers
Suggested answer: A

Which of the following BEST facilitates governance oversight of data protection measures?

A.
Information ownership
A.
Information ownership
Answers
B.
Information classification
B.
Information classification
Answers
C.
Information custodianship
C.
Information custodianship
Answers
D.
Information life cycle management
D.
Information life cycle management
Answers
Suggested answer: B

An airline wants to launch a new program involving the use of artificial intelligence (Al) and machine learning The mam objective of the program is to use customer behavior to determine new routes and markets Which of the following should be done NEXT?

A.
Consult with the enterprise privacy function
A.
Consult with the enterprise privacy function
Answers
B.
Define the critical success factors (CSFs)
B.
Define the critical success factors (CSFs)
Answers
C.
Present the proposal to the IT strategy committee
C.
Present the proposal to the IT strategy committee
Answers
D.
Perform a business impact analysis (BIA)
D.
Perform a business impact analysis (BIA)
Answers
Suggested answer: A

Which of the following BEST facilitates the standardization of IT vendor selection?

A.
Cost-benefit analysis
A.
Cost-benefit analysis
Answers
B.
Contract management office
B.
Contract management office
Answers
C.
Service level agreements (SLAs)
C.
Service level agreements (SLAs)
Answers
D.
Procurement framework
D.
Procurement framework
Answers
Suggested answer: D
Total 577 questions
Go to page: of 58