ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Which of the following represents the GREATEST challenge to implementing IT governance?

A.
Determining the best practice to follow
A.
Determining the best practice to follow
Answers
B.
Planning the project itself
B.
Planning the project itself
Answers
C.
Developing a business case
C.
Developing a business case
Answers
D.
Applying behavioral change management
D.
Applying behavioral change management
Answers
Suggested answer: D

Which of the following is the BEST method for making a strategic decision to invest in cloud services?

A.
Prepare a business case.
A.
Prepare a business case.
Answers
B.
Prepare a request for information (RFI),
B.
Prepare a request for information (RFI),
Answers
C.
Benchmarking.
C.
Benchmarking.
Answers
D.
Define a balanced scorecard.
D.
Define a balanced scorecard.
Answers
Suggested answer: A

An enterprise is developing several consumer-based services using emerging technologies involving sensitive personal dat

a. The CIO is under pressure to ensure the enterprise is first to market, but security scan results have not been adequately addressed. Reviewing which of the following will enable the CIO to make the BEST decision for the customers?

A.
Acceptable use policy
A.
Acceptable use policy
Answers
B.
Risk register
B.
Risk register
Answers
C.
Ethics standards
C.
Ethics standards
Answers
D.
Change management policy
D.
Change management policy
Answers
Suggested answer: B

An organization's board of directors has questioned the value provided by IT key performance indicators (KPIs). Which of the following is the BEST way to determine whether the KPIs adequately support organizational objectives?

A.
Define a strategy for IT measurement.
A.
Define a strategy for IT measurement.
Answers
B.
Define policies and procedures around current KPIs.
B.
Define policies and procedures around current KPIs.
Answers
C.
Review the KPIs with key business executives.
C.
Review the KPIs with key business executives.
Answers
D.
Work directly with the CEO to identify what measures should be used.
D.
Work directly with the CEO to identify what measures should be used.
Answers
Suggested answer: C

Which of the following is PRIMARILY achieved through performance measurement?

A.
Process improvement
A.
Process improvement
Answers
B.
Transparency
B.
Transparency
Answers
C.
Cost efficiency
C.
Cost efficiency
Answers
D.
Benefit realization
D.
Benefit realization
Answers
Suggested answer: D

A large retail chain realizes that while there has not been any loss of data, IT security has not been a priority and should become a key goal for the enterprise. What should be the FIRST high-level initiative for a newly created IT strategy committee in order to support this business goal?

A.
Identifying gaps in information asset protection
A.
Identifying gaps in information asset protection
Answers
B.
Defining data archiving and retrieval policies
B.
Defining data archiving and retrieval policies
Answers
C.
Recruiting and training qualified IT security staff
C.
Recruiting and training qualified IT security staff
Answers
D.
Modernizing internal IT security practices
D.
Modernizing internal IT security practices
Answers
Suggested answer: A

Risk management strategies are PRIMARILY adopted to:

A.
avoid risks for business and IT assets.
A.
avoid risks for business and IT assets.
Answers
B.
take necessary precautions for claims and losses.
B.
take necessary precautions for claims and losses.
Answers
C.
achieve acceptable residual risk levels.
C.
achieve acceptable residual risk levels.
Answers
D.
achieve compliance with legal requirements.
D.
achieve compliance with legal requirements.
Answers
Suggested answer: C

An enterprise made a significant change to its business operating model that resulted in a new strategic direction. Which of the following should be reviewed FIRST to ensure IT congruence with the new business strategy?

A.
IT risk appetite
A.
IT risk appetite
Answers
B.
Enterprise project management framework
B.
Enterprise project management framework
Answers
C.
IT investment portfolio
C.
IT investment portfolio
Answers
D.
Information systems architecture
D.
Information systems architecture
Answers
Suggested answer: C

A chief technology officer (CTO) wants to ensure IT governance practices adequately address risk management specific to mobile applications. To create the appropriate risk policies for IT, it is MOST important for the CTO to:

A.
understand the enterprise's risk tolerance.
A.
understand the enterprise's risk tolerance.
Answers
B.
create an IT risk scorecard.
B.
create an IT risk scorecard.
Answers
C.
map the business goals to IT risk processes.
C.
map the business goals to IT risk processes.
Answers
D.
identify the mobile technical requirements.
D.
identify the mobile technical requirements.
Answers
Suggested answer: A

A large financial institution is considering outsourcing customer call center operations which will allow the chosen vendor to access systems from offshore locations. Which of the following represents the GREATEST risk?

A.
Inconsistent customer service and reporting
A.
Inconsistent customer service and reporting
Answers
B.
Loss of data confidentiality
B.
Loss of data confidentiality
Answers
C.
Lack of network availability
C.
Lack of network availability
Answers
D.
Inadequate business continuity planning
D.
Inadequate business continuity planning
Answers
Suggested answer: B
Total 577 questions
Go to page: of 58