ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would be the BEST long-term solution to address the concern regarding loss of expenenced staff?

A.
implement knowledge management practices
A.
implement knowledge management practices
Answers
B.
Establish a mentoring program for IT staff
B.
Establish a mentoring program for IT staff
Answers
C.
Determine key risk indicators (KRIs)
C.
Determine key risk indicators (KRIs)
Answers
D.
Retain key staff as consultants.
D.
Retain key staff as consultants.
Answers
Suggested answer: A

An enterprise has performed a business impact analysis (BIA) considering a number of risk scenarios Which of the following should the enterpnse do NEXT?

A.
Perform a risk controls gap analysis
A.
Perform a risk controls gap analysis
Answers
B.
Update the disaster recovery plan (DRP)
B.
Update the disaster recovery plan (DRP)
Answers
C.
Verify compliance with relevant legislation
C.
Verify compliance with relevant legislation
Answers
D.
Assess risk mitigation strategies
D.
Assess risk mitigation strategies
Answers
Suggested answer: A

An enterprise has finalized a major acquisition and a new business strategy in line with stakeholder needs has been introduced To help ensure continuous alignment of IT with the new business strategy the CiO should FIRST

A.
review the existing IT strategy against the new business strategy
A.
review the existing IT strategy against the new business strategy
Answers
B.
revise the existing IT strategy to align with the new business strategy
B.
revise the existing IT strategy to align with the new business strategy
Answers
C.
establish a new IT strategy committee for the new enterprise
C.
establish a new IT strategy committee for the new enterprise
Answers
D.
assess the IT cultural aspects of the acquired entity
D.
assess the IT cultural aspects of the acquired entity
Answers
Suggested answer: A

An enterprise has decided to implement an IT risk management program After establishing stakeholder desired outcomes, the MAIN goal of the IT strategy committee should be to:

A.
identify business data that requires protection.
A.
identify business data that requires protection.
Answers
B.
perform a risk analysis on key IT processes
B.
perform a risk analysis on key IT processes
Answers
C.
implement controls to address high risk areas
C.
implement controls to address high risk areas
Answers
D.
ensure IT risk alignment with enterprise risk
D.
ensure IT risk alignment with enterprise risk
Answers
Suggested answer: D

An enterprise has learned of a new regulation that may impact delivery of one of its core technology services Which of the following should the done FIRST?

A.
Update the risk management framework
A.
Update the risk management framework
Answers
B.
Determine whether the board wants to comply with the regulation
B.
Determine whether the board wants to comply with the regulation
Answers
C.
Assess the risk associated with the new regulation
C.
Assess the risk associated with the new regulation
Answers
D.
Request an action plan from the risk team
D.
Request an action plan from the risk team
Answers
Suggested answer: C

The BEST way for a CIO to monitor the alignment between the business and IT strategy is to regularly review

A.
key risk indicators (KRIs)
A.
key risk indicators (KRIs)
Answers
B.
IT services supporting business processes
B.
IT services supporting business processes
Answers
C.
the balanced scorecard
C.
the balanced scorecard
Answers
D.
the risk register
D.
the risk register
Answers
Suggested answer: B

The FIRST step in aligning resource management to the enterprise's IT strategic plan would be to

A.
develop a responsible, accountable, consulted and informed (RACI) chart
A.
develop a responsible, accountable, consulted and informed (RACI) chart
Answers
B.
assign appropriate roles and responsibilities
B.
assign appropriate roles and responsibilities
Answers
C.
perform a gap analysis
C.
perform a gap analysis
Answers
D.
identify outsourcing opportunities
D.
identify outsourcing opportunities
Answers
Suggested answer: C

Which of the following should a new CIO do FIRST to ensure information assets are effectively governed?

A.
Quantify the business value of information assets
A.
Quantify the business value of information assets
Answers
B.
Perform an information gap analysis
B.
Perform an information gap analysis
Answers
C.
Review information classification procedures
C.
Review information classification procedures
Answers
D.
Evaluate information access methods
D.
Evaluate information access methods
Answers
Suggested answer: C

An IT steering committee wants to select a disaster recovery site based on available nsk data Which of the following would BE ST enable the mapping of cost to risk?

A.
Key risk indicators (KRIs)
A.
Key risk indicators (KRIs)
Answers
B.
Scenario-based assessment
B.
Scenario-based assessment
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
Qualitative forecasting
D.
Qualitative forecasting
Answers
Suggested answer: B

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

A.
Granting access to information based on information architecture
A.
Granting access to information based on information architecture
Answers
B.
Engaging an audit of logical access controls and related security policies
B.
Engaging an audit of logical access controls and related security policies
Answers
C.
Implementing multi-factor authentication controls
C.
Implementing multi-factor authentication controls
Answers
D.
Authenticating access to information assets based on roles or business rules
D.
Authenticating access to information assets based on roles or business rules
Answers
Suggested answer: D
Total 577 questions
Go to page: of 58