ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











The PRIMARY objective of building outcome measures is to:

A.
monitor whether the chosen strategy is successful
A.
monitor whether the chosen strategy is successful
Answers
B.
visualize how the strategy will be achieved.
B.
visualize how the strategy will be achieved.
Answers
C.
demonstrate commitment to IT governance.
C.
demonstrate commitment to IT governance.
Answers
D.
clarify the cause-and-effect relationship of the strategy.
D.
clarify the cause-and-effect relationship of the strategy.
Answers
Suggested answer: A

Once the strategic vision has been established, which of the following would be the BEST activity for supporting the implementation of performance measures?

A.
Monitor service level performance.
A.
Monitor service level performance.
Answers
B.
Document strengths, weaknesses, opportunities, and threats.
B.
Document strengths, weaknesses, opportunities, and threats.
Answers
C.
Document policy requirements
C.
Document policy requirements
Answers
D.
Identify key performance indicators (KPIs).
D.
Identify key performance indicators (KPIs).
Answers
Suggested answer: C

Which of the following BEST supports the implementation of an effective data classification policy?

A.
Monitoring with key performance indicators (KPIs)
A.
Monitoring with key performance indicators (KPIs)
Answers
B.
Implementation of data loss prevention (DLP) tools
B.
Implementation of data loss prevention (DLP) tools
Answers
C.
Clear guidelines adopted by the business
C.
Clear guidelines adopted by the business
Answers
D.
Classification policy approval by the board
D.
Classification policy approval by the board
Answers
Suggested answer: C

An enterprise has lost an unencrypted backup tape of archived customer dat

a. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?

A.
Initiate disciplinary proceedings against relevant employees.
A.
Initiate disciplinary proceedings against relevant employees.
Answers
B.
Mandate a review of backup tape inventory procedures.
B.
Mandate a review of backup tape inventory procedures.
Answers
C.
Communicate the breach to customers.
C.
Communicate the breach to customers.
Answers
D.
Require an evaluation of storage facility vendors.
D.
Require an evaluation of storage facility vendors.
Answers
Suggested answer: C

When developing an IT training plan, which of the following is the BEST way to ensure that resource skills requirements are identified?

A.
Extract training requirements from deficiencies reported in customer service satisfaction surveys.
A.
Extract training requirements from deficiencies reported in customer service satisfaction surveys.
Answers
B.
Ask managers to determine IT training requirements annually.
B.
Ask managers to determine IT training requirements annually.
Answers
C.
Determine training needs based on the capabilities to support the IT strategy.
C.
Determine training needs based on the capabilities to support the IT strategy.
Answers
D.
Survey employees for IT skills requirements based upon technology trends.
D.
Survey employees for IT skills requirements based upon technology trends.
Answers
Suggested answer: C

In which of the following situations is it MOST appropriate to use a quantitative risk assessment?

A.
There is a lack of accurate and reliable past and present risk data.
A.
There is a lack of accurate and reliable past and present risk data.
Answers
B.
The risk assessment needs to be completed in a short period of time.
B.
The risk assessment needs to be completed in a short period of time.
Answers
C.
The objectivity of the risk assessment is of primary importance.
C.
The objectivity of the risk assessment is of primary importance.
Answers
D.
The risk assessment is needed for an IT project business case.
D.
The risk assessment is needed for an IT project business case.
Answers
Suggested answer: C

An IT department has forwarded a request to the IT strategy committee for funding of a discretionary Investment. The committee's MOST important consideration should be to evaluate:

A.
the technical feasibility of the investment.
A.
the technical feasibility of the investment.
Answers
B.
the business and technical scope of the investment *
B.
the business and technical scope of the investment *
Answers
C.
whether the investment supports corporate goals
C.
whether the investment supports corporate goals
Answers
D.
whether the investment aligns with the enterprise architecture (EA).
D.
whether the investment aligns with the enterprise architecture (EA).
Answers
Suggested answer: C

Which of the following should be identified FIRST when determining appropriate IT key risk indicators (KRIs)?

A.
IT-related risk
A.
IT-related risk
Answers
B.
IT controls
B.
IT controls
Answers
C.
IT threats
C.
IT threats
Answers
D.
IT objectives
D.
IT objectives
Answers
Suggested answer: C

An IT risk committee is trying to mitigate the risk associated with a newly implemented bring your own device (BYOD) policy and supporting mobile device management (MDM) tools. Which of the following would be the BEST way to ensure employees understand how to protect sensitive corporate data on their mobile devices?

A.
Require staff to complete security awareness training
A.
Require staff to complete security awareness training
Answers
B.
Develop security procedures for mobile devices.
B.
Develop security procedures for mobile devices.
Answers
C.
Distribute the BYOD policy on the company Intranet.
C.
Distribute the BYOD policy on the company Intranet.
Answers
D.
Require staff to review and sign nondisclosure agreements (NDAs)
D.
Require staff to review and sign nondisclosure agreements (NDAs)
Answers
Suggested answer: A

An enterprise's decision to move to a virtualized architecture will have the GREATEST impact on:

A.
system life cycle management.
A.
system life cycle management.
Answers
B.
asset classification.
B.
asset classification.
Answers
C.
vendor management
C.
vendor management
Answers
D.
vulnerability management.
D.
vulnerability management.
Answers
Suggested answer: D
Total 577 questions
Go to page: of 58