ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











An enterprise has decided to utilize a cloud vendor for the first time to provide email as a service, eliminating in-house email capabilities. Which of the following IT strategic actions should be triggered by this decision?

A.
Develop a data protection awareness education training program.
A.
Develop a data protection awareness education training program.
Answers
B.
Monitor outgoing email traffic for malware.
B.
Monitor outgoing email traffic for malware.
Answers
C.
Implement a data classification and storage management tool.
C.
Implement a data classification and storage management tool.
Answers
D.
Update and communicate data storage and transmission policies.
D.
Update and communicate data storage and transmission policies.
Answers
Suggested answer: A

Which of the following components of a policy BEST enables the governance of enterprise IT?

A.
Disciplinary actions
A.
Disciplinary actions
Answers
B.
Regulatory requirements
B.
Regulatory requirements
Answers
C.
Roles and responsibilities
C.
Roles and responsibilities
Answers
D.
Terms and definitions
D.
Terms and definitions
Answers
Suggested answer: C

An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?

A.
Revising the business $ balanced storecard
A.
Revising the business $ balanced storecard
Answers
B.
Updating the business risk profile
B.
Updating the business risk profile
Answers
C.
Changing the IT steering committee charter
C.
Changing the IT steering committee charter
Answers
D.
Calculating the cost of the current solution
D.
Calculating the cost of the current solution
Answers
Suggested answer: B

An IT investment review board wants to ensure that IT will be able to support business initiatives. Each initiative is comprised of several interrelated IT projects. Which of the following would help ensure that the initiatives meet their goals?

A.
Review of project management methodology
A.
Review of project management methodology
Answers
B.
Review of the business case for each initiative
B.
Review of the business case for each initiative
Answers
C.
Establishment of portfolio management
C.
Establishment of portfolio management
Answers
D.
Verification of initiatives against the architecture
D.
Verification of initiatives against the architecture
Answers
Suggested answer: B

It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?

A.
Enterprise architecture (EA)
A.
Enterprise architecture (EA)
Answers
B.
Enterprise risk framework
B.
Enterprise risk framework
Answers
C.
IT service management
C.
IT service management
Answers
D.
IT project roadmap
D.
IT project roadmap
Answers
Suggested answer: C

Results of an enterprise's customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise's mobile applications are considered inferior compared to legacy browser-based applications. Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?

A.
Establish service level agreements (SLAs) with the development team.
A.
Establish service level agreements (SLAs) with the development team.
Answers
B.
Identify key risks and mitigation strategies for mobile applications.
B.
Identify key risks and mitigation strategies for mobile applications.
Answers
C.
Implement key performance indicators (KPIs) that include application quality.
C.
Implement key performance indicators (KPIs) that include application quality.
Answers
D.
Identify business requirements concerning mobile applications.
D.
Identify business requirements concerning mobile applications.
Answers
Suggested answer: D

Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?

A.
Poor desktop service delivery
A.
Poor desktop service delivery
Answers
B.
Data retention
B.
Data retention
Answers
C.
Redundant systems
C.
Redundant systems
Answers
D.
Poor business decisions
D.
Poor business decisions
Answers
Suggested answer: D

Of the following, who should be responsible for ensuring the regular review of quality management performance against defined quality metrics?

A.
Process owners
A.
Process owners
Answers
B.
Risk management team
B.
Risk management team
Answers
C.
Internal auditors
C.
Internal auditors
Answers
D.
Executive management
D.
Executive management
Answers
Suggested answer: A

An enterprise experiencing issues with data protection and least privilege is implementing enterprise-wide data encryption in response. Which of the following is the BEST approach to ensure all business units work toward remediating these issues?

A.
Develop key performance indicators (KPIs) to measure enterprise adoption.
A.
Develop key performance indicators (KPIs) to measure enterprise adoption.
Answers
B.
Integrate data encryption requirements into existing and planned projects.
B.
Integrate data encryption requirements into existing and planned projects.
Answers
C.
Assign owners for data governance initiatives.
C.
Assign owners for data governance initiatives.
Answers
D.
Mandate the creation of a data governance framework.
D.
Mandate the creation of a data governance framework.
Answers
Suggested answer: B

Senior management wants to promote investment in IT, but is uncertain that associated risks are being properly identified. The BEST way to address this concern is to:

A.
engage an external consultant to develop risk scenarios.
A.
engage an external consultant to develop risk scenarios.
Answers
B.
appoint an IT representative to the business risk committee.
B.
appoint an IT representative to the business risk committee.
Answers
C.
assign an IT cost controller to the finance department.
C.
assign an IT cost controller to the finance department.
Answers
D.
ensure business cases are developed by IT.
D.
ensure business cases are developed by IT.
Answers
Suggested answer: D
Total 577 questions
Go to page: of 58