ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











Which of the following should be the ClO's GREATEST consideration when making changes to the IT strategy'?

A.
Has the impact to the enterprise architecture (EA) been assessed?
A.
Has the impact to the enterprise architecture (EA) been assessed?
Answers
B.
Has the investment portfolio been revised?
B.
Has the investment portfolio been revised?
Answers
C.
Have key stakeholders been consulted?
C.
Have key stakeholders been consulted?
Answers
D.
Have IT risk metrics been adjusted?
D.
Have IT risk metrics been adjusted?
Answers
Suggested answer: C

An independent consultant has been hired to conduct an ad hoc audit of an enterprise's information security office with results reported to the IT governance committee and the board Which of the following is MOST important to provide to the consultant before the audit begins?

A.
Acceptance of the audit risks and opportunities
A.
Acceptance of the audit risks and opportunities
Answers
B.
The scope and stakeholders of the audit
B.
The scope and stakeholders of the audit
Answers
C.
The organizational structure of the security office
C.
The organizational structure of the security office
Answers
D.
The policies and framework used by the security office
D.
The policies and framework used by the security office
Answers
Suggested answer: B

Which of the following should be the MOST important consideration when designing an implementation plan for IT governance?

A.
Principles and policies
A.
Principles and policies
Answers
B.
Roles and responsibilities
B.
Roles and responsibilities
Answers
C.
Risk tolerance levels
C.
Risk tolerance levels
Answers
D.
Organizational culture
D.
Organizational culture
Answers
Suggested answer: D

Enterprise leadership is concerned with the potential for discnmination against certain demographic groups resulting from the use of machine learning models What should be done FIRST to address this concern?

A.
Obtain stakeholders' input regarding the ethics associated with machine learning
A.
Obtain stakeholders' input regarding the ethics associated with machine learning
Answers
B.
Revise the code of conduct to discourage bias within automated processes
B.
Revise the code of conduct to discourage bias within automated processes
Answers
C.
Develop a machine learning policy articulating guidelines for machine learning use
C.
Develop a machine learning policy articulating guidelines for machine learning use
Answers
D.
Assess recent case law related to the enterprise's machine learning business strategy
D.
Assess recent case law related to the enterprise's machine learning business strategy
Answers
Suggested answer: C

An enterprise has identified a number of plausible risk scenarios that could result in economic loss associated with major IT investments. Which of the following is the BEST method to assess the risk?

A.
Cost-benefit analysis
A.
Cost-benefit analysis
Answers
B.
Qualitative analysis
B.
Qualitative analysis
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
Quantitative analysis
D.
Quantitative analysis
Answers
Suggested answer: C

Which of the following roles is accountable for the confidentiality integrity and availability of information within an enterprise?

A.
Risk manager
A.
Risk manager
Answers
B.
Data owner
B.
Data owner
Answers
C.
Lead legal counsel
C.
Lead legal counsel
Answers
D.
Data custodian
D.
Data custodian
Answers
Suggested answer: B

Which of the following should be the PRIMARY basis for establishing categories within an information classification scheme?

A.
Information architecture
A.
Information architecture
Answers
B.
Industry standards
B.
Industry standards
Answers
C.
Information security policy
C.
Information security policy
Answers
D.
Business impact
D.
Business impact
Answers
Suggested answer: D

An enterprise will be adopting wearable technology to improve business performance Whtch of the following would be the BEST way for the CIO to validate IPs preparedness for this initiative?

A.
Request an enterprise architecture (EA) review.
A.
Request an enterprise architecture (EA) review.
Answers
B.
Request reprioritization of the IT portfolio.
B.
Request reprioritization of the IT portfolio.
Answers
C.
Perform a baseline business value assessment
C.
Perform a baseline business value assessment
Answers
D.
Identify the penalties for noncompliance.
D.
Identify the penalties for noncompliance.
Answers
Suggested answer: C

Which of the following is a responsibility of an IT strategy committee?

A.
Providing oversight on enterprise strategy implementation
A.
Providing oversight on enterprise strategy implementation
Answers
B.
Approving the business strategy and its IT implications
B.
Approving the business strategy and its IT implications
Answers
C.
Advising the board on the development of IT goals
C.
Advising the board on the development of IT goals
Answers
D.
Tracking projects in the IT investment portfolio
D.
Tracking projects in the IT investment portfolio
Answers
Suggested answer: C

When establishing a risk management process which of the following should be the FIRST step?

A.
Determine the probability of occurrence
A.
Determine the probability of occurrence
Answers
B.
Identify threats
B.
Identify threats
Answers
C.
Identify assets
C.
Identify assets
Answers
D.
Assess risk exposures
D.
Assess risk exposures
Answers
Suggested answer: C
Total 577 questions
Go to page: of 58