ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











An IT governance committee is defining a risk management policy for a portfolio of !T-enabled investments Which of the following should be the PRIMARY consideration when developing the policy?

A.
Risk management framework
A.
Risk management framework
Answers
B.
Possible investment failures
B.
Possible investment failures
Answers
C.
Value obtained with minimum risk
C.
Value obtained with minimum risk
Answers
D.
Risk appetite of the enterprise
D.
Risk appetite of the enterprise
Answers
Suggested answer: D

An internal audit revealed a widespread perception that the enterprise's IT governance reporting lacks transparency Which of the following should the CIO do FIRST?

A.
Add stakeholder transparency metrics to the balanced scorecard
A.
Add stakeholder transparency metrics to the balanced scorecard
Answers
B.
Develop a communication and awareness strategy
B.
Develop a communication and awareness strategy
Answers
C.
Meet with key stakeholders to understand their concerns
C.
Meet with key stakeholders to understand their concerns
Answers
D.
Adopt an industry-recognized template to standardize reports.
D.
Adopt an industry-recognized template to standardize reports.
Answers
Suggested answer: C

An enterprise has decided to execute a risk self-assessment to identify improvement opportunities for current IT services. Which of the following is MOST important to address in the assessment?

A.
Related business risk
A.
Related business risk
Answers
B.
Residual IT risk
B.
Residual IT risk
Answers
C.
Mapping of business objectives to IT risk
C.
Mapping of business objectives to IT risk
Answers
D.
IT capability and performance measures
D.
IT capability and performance measures
Answers
Suggested answer: A

Which of the following is MOST important for IT governance to have in place to ensure the enterprise can maintain operations during extensive system downtime?

A.
Fault-tolerant hardware
A.
Fault-tolerant hardware
Answers
B.
An incident response plan
B.
An incident response plan
Answers
C.
A crisis communications plan
C.
A crisis communications plan
Answers
D.
A business continuity plan (BCP)
D.
A business continuity plan (BCP)
Answers
Suggested answer: A

Which of the following is MOST important for an enterprise to review when classifying information assets?

A.
Procedures for information handling
A.
Procedures for information handling
Answers
B.
Requirements for information retention.
B.
Requirements for information retention.
Answers
C.
Media used for storage and backup
C.
Media used for storage and backup
Answers
D.
Impact of information exposure
D.
Impact of information exposure
Answers
Suggested answer: D

Which of the following is MOST important to document for a business ethics program?

A.
Guiding principles and best practices
A.
Guiding principles and best practices
Answers
B.
Violation response matrix
B.
Violation response matrix
Answers
C.
Whistle-blower protection protocols.
C.
Whistle-blower protection protocols.
Answers
D.
Employee awareness and training content
D.
Employee awareness and training content
Answers
Suggested answer: A

Which of the following is the BEST outcome measure to determine the effectiveness of IT nsk management processes?

A.
Frequency of updates to the IT risk register
A.
Frequency of updates to the IT risk register
Answers
B.
Time lag between when IT risk is identified and the enterprise's response
B.
Time lag between when IT risk is identified and the enterprise's response
Answers
C.
Number of events impacting business processes due to delays in responding to risks
C.
Number of events impacting business processes due to delays in responding to risks
Answers
D.
Percentage of business users satisfied with the quality of risk training
D.
Percentage of business users satisfied with the quality of risk training
Answers
Suggested answer: C

An IT department outsourced application support and negotiated service level agreements (SLAs) directly with the vendor Although the vendor met the SLAs business owner expectations are not met and senior management cancels the contract This situation can be avoided in the future by:

A.
improving the business requirements gathering process
A.
improving the business requirements gathering process
Answers
B.
improving the negotiation process for service level agreements (SLAs)
B.
improving the negotiation process for service level agreements (SLAs)
Answers
C.
implementing a vendor performance scorecard
C.
implementing a vendor performance scorecard
Answers
D.
assigning responsibility for vendor management
D.
assigning responsibility for vendor management
Answers
Suggested answer: A

An IT value delivery framework PRIMARILY helps an enterprise

A.
increase transparency of value to the enterprise
A.
increase transparency of value to the enterprise
Answers
B.
assist top management in approving IT projects
B.
assist top management in approving IT projects
Answers
C.
improve value of successful IT projects
C.
improve value of successful IT projects
Answers
D.
optimize value to the enterprise.
D.
optimize value to the enterprise.
Answers
Suggested answer: D

Which of the following IT governance practices would BEST support IT and enterprise strategic alignment?

A.
An IT communication plan is continuously updated
A.
An IT communication plan is continuously updated
Answers
B.
External consultants regularly review the IT portfolio
B.
External consultants regularly review the IT portfolio
Answers
C.
Senior management regularly reviews the IT portfolio
C.
Senior management regularly reviews the IT portfolio
Answers
D.
IT service level agreements (SLAs) are periodically updated
D.
IT service level agreements (SLAs) are periodically updated
Answers
Suggested answer: C
Total 577 questions
Go to page: of 58