ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 50

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the MOST important consideration when integrating a new vendor with an enterprise resource planning (ERP) system?

A.
IT senior management selects the vendor.
A.
IT senior management selects the vendor.
Answers
B.
A vendor risk assessment is conducted
B.
A vendor risk assessment is conducted
Answers
C.
ERP data mapping is approved by the enterprise architect.
C.
ERP data mapping is approved by the enterprise architect.
Answers
D.
Procurement provides the terms of the contract.
D.
Procurement provides the terms of the contract.
Answers
Suggested answer: B

Which of the following is MOST important for a data steward to verify when a system's data is edited by an automated tool to fix an incident?

A.
The change has been requested by the business department and approved by the data owner.
A.
The change has been requested by the business department and approved by the data owner.
Answers
B.
The change is documented in preparation for future audits.
B.
The change is documented in preparation for future audits.
Answers
C.
The change maintains consistency among databases and has no other impacts.
C.
The change maintains consistency among databases and has no other impacts.
Answers
D.
The change is a temporary fix for the incident, and the permanent solution is addressed by problem management.
D.
The change is a temporary fix for the incident, and the permanent solution is addressed by problem management.
Answers
Suggested answer: C

Explanation:

The most important thing for a data steward to verify when a system's data is edited by anautomated tool to fix an incident is that the change maintains consistency among databasesand has no other impacts.Data consistency is a dimension of data quality that describes thedata's uniformity as it moves across applications and networks and when it comes frommultiple sources1.Data is considered consistent if two or more values in different locations areidentical and do not conflict1.Data consistency is related to data integrity and datacurrency1.To ensure data consistency, some steps include data governance, automated dataintegration, and regular data audits and quality control checks1. If the automated tool changesthe data in one database, but not in others, it can create inconsistencies and errors that affectthe reliability and usability of the data. Similarly, if the automated tool changes the data in away that affects other processes or systems that depend on the data, it can cause disruptionsand failures that impact the business operations and performance. Therefore, the data stewardshould verify that the change is consistent and has no other impacts before approving it.The other options are not as important as verifying the data consistency and impact of thechange. Requesting and approving the change by the business department and the data owneris a good practice, but not a verification step. Documenting the change in preparation for futureaudits is a necessary step, but not a verification step. Addressing the permanent solution forthe incident by problem management is a relevant step, but not a verificationstep.Reference:=What is Data Quality - Definition, Dimensions ... - Simplilearn

What is the BEST way for IT to achieve compliance with regulatory requirements?

A.
Enforce IT policies and procedures.
A.
Enforce IT policies and procedures.
Answers
B.
Create an IT project portfolio.
B.
Create an IT project portfolio.
Answers
C.
Review an IT performance dashboard.
C.
Review an IT performance dashboard.
Answers
D.
Report on IT audit findings and action plans.
D.
Report on IT audit findings and action plans.
Answers
Suggested answer: A

Which of the following is the PRIMARY role of the governance function in enabling an enterprise to achieve its business objectives?

A.
Determining risk thresholds that the enterprise can sustain
A.
Determining risk thresholds that the enterprise can sustain
Answers
B.
Preparing business continuity and resiliency plans
B.
Preparing business continuity and resiliency plans
Answers
C.
Providing a means to effectively manage stakeholders
C.
Providing a means to effectively manage stakeholders
Answers
D.
Monitoring strategic plans to reach the desired target state
D.
Monitoring strategic plans to reach the desired target state
Answers
Suggested answer: C

Explanation:

The primary role of the governance function in enabling an enterprise to achieve its businessobjectives is to provide a means to effectively manage stakeholders. Stakeholders are theindividuals or groups that have an interest or stake in the enterprise's activities, outcomes, andperformance. They include shareholders, customers, employees, suppliers, regulators, andsociety at large. Effective stakeholder management involves identifying, engaging,communicating, and satisfying the needs and expectations of the stakeholders in a transparentand ethical manner. By providing a means to effectively manage stakeholders, the governancefunction can help the enterprise to align its vision, mission, strategy, and values with thestakeholder interests, foster trust and collaboration among the stakeholder groups, balance theeconomic and social goals and the individual and communal goals of the enterprise, andenhance the reputation and legitimacy of the enterprise in the market and society.The other options are not as primary as providing a means to effectively manage stakeholdersfor the governance function. Determining risk thresholds that the enterprise can sustain is an important aspect of the governance function, but it is not the primary role. Risk thresholds arethe levels of risk exposure that the enterprise is willing to accept or tolerate in pursuit of itsbusiness objectives. They are derived from the enterprise's risk appetite and risk tolerancestatements, which reflect the enterprise's culture, values, and strategy. The governancefunction can help to define, communicate, and monitor the risk thresholds that the enterprisecan sustain, but this is not its primary role. Preparing business continuity and resiliency plans isa vital responsibility of the management function, not the governance function. Businesscontinuity and resiliency plans are the documents that outline the processes and procedures forensuring the continuity of critical business functions and operations in the event f a disruptionor crisis. They also describe how the enterprise can recover from the disruption or crisis andresume normal operations as soon as possible. The governance function can oversee andapprove the business continuity and resiliency plans prepared by the management function,but this is not its primary role. Monitoring strategic plans to reach the desired target state is akey activity of both the governance function and the management function, but it is not theirprimary role. Strategic plans are the documents that define the long-term goals and objectivesof the enterprise and how they will be achieved. They also specify the resources, actions,measures, and timelines for implementing the strategy. The governance function can set thedirection and scope of the strategic plans, while the management function can execute andreport on them. Both functions can monitor the progress and performance of the strategicplans to reach the desired target state, but this is not their primary role.Reference:=The fivefunctions of governance -- Project Manager,What is a Governance Structure? - ESG | TheReport,Develop an effective governance structure | Australian Public Service Q

A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?

A.
Mitigate and track data-related issues and risks.
A.
Mitigate and track data-related issues and risks.
Answers
B.
Modify legal and regulatory data requirements.
B.
Modify legal and regulatory data requirements.
Answers
C.
Define data protection and privacy practices.
C.
Define data protection and privacy practices.
Answers
D.
Assess the information governance framework.
D.
Assess the information governance framework.
Answers
Suggested answer: C

From a governance perspective, the PRIMARY goal of an IT risk optimization process should be to ensure:

A.
IT risk thresholds are defined in the enterprise architecture (EA).
A.
IT risk thresholds are defined in the enterprise architecture (EA).
Answers
B.
the IT risk mitigation strategy is approved by management.
B.
the IT risk mitigation strategy is approved by management.
Answers
C.
IT risk is mapped to the balanced scorecard.
C.
IT risk is mapped to the balanced scorecard.
Answers
D.
the impact of IT risk to the enterprise is managed.
D.
the impact of IT risk to the enterprise is managed.
Answers
Suggested answer: D

An enterprise is planning to outsource data processing for personally identifiable information (Pll). When is the MOST appropriate time to define the requirements for security and privacy of information?

A.
When issuing requests for proposals (RFPs)
A.
When issuing requests for proposals (RFPs)
Answers
B.
After an assessment of the current information architecture .
B.
After an assessment of the current information architecture .
Answers
C.
When developing service level agreements (SLAs)
C.
When developing service level agreements (SLAs)
Answers
D.
During the initial vendor selection process
D.
During the initial vendor selection process
Answers
Suggested answer: A

Which of the following BEST helps to ensure that IT policies are aligned with organizational strategies?

A.

The policies are approved by the board of directors.

A.

The policies are approved by the board of directors.

Answers
B.

The policies are developed using a top-down approach.

B.

The policies are developed using a top-down approach.

Answers
C.

The policies are updated annually.

C.

The policies are updated annually.

Answers
D.

The policies are periodically audited.

D.

The policies are periodically audited.

Answers
Suggested answer: B

Explanation:

Ensuring that IT policies are aligned with organizational strategies is best achieved when the policies are developed using a top-down approach. This approach starts with strategic objectives and cascades down to operational policies, ensuring coherence and alignment with the overall direction and goals of the organization. While board approval, annual updates, and periodic audits are important for policy governance, the top-down development approach ensures that policies are inherently designed to support organizational strategies from the outset.

What should be an IT steering committee's FIRST course of action when an enterprise is considering establishing a virtual reality store to sell its products?

A.

Request a resource gap analysis.

A.

Request a resource gap analysis.

Answers
B.

Request a cost-benefit analysis.

B.

Request a cost-benefit analysis.

Answers
C.

Request development of key risk indicators (KRIs).

C.

Request development of key risk indicators (KRIs).

Answers
D.

Request a threat assessment.

D.

Request a threat assessment.

Answers
Suggested answer: B

Explanation:

When an enterprise is considering establishing a virtual reality store to sell its products, the IT steering committee's first course of action should be to request a cost-benefit analysis. This analysis will evaluate the financial implications, potential returns, and strategic value of the investment, providing a basis for informed decision-making. While resource gap analysis, development of key risk indicators (KRIs), and threat assessment are important considerations, understanding the economic viability through a cost-benefit analysis is fundamental before proceeding with such strategic initiatives.

Within a governance structure for risk management, which of the following activities should be performed by the second line of defense?

A.

Conducting internal and external audits

A.

Conducting internal and external audits

Answers
B.

Implementing controls to manage risk

B.

Implementing controls to manage risk

Answers
C.

Monitoring risk and controls

C.

Monitoring risk and controls

Answers
D.

Identifying and assessing risk

D.

Identifying and assessing risk

Answers
Suggested answer: C

Explanation:

Within a governance structure for risk management, the second line of defense is primarily responsible for monitoring risk and controls. This function involves overseeing the effectiveness of the first line of defense (operational management and control implementation) and ensuring that risk management practices are properly integrated into business processes. It serves as a check on the adequacy and effectiveness of risk management across the organization. While conducting audits is a function of the third line of defense (internal audit), and identifying and assessing risk is often a shared responsibility, the distinct role of the second line is to provide ongoing monitoring and oversight of risk management and control processes.

Total 577 questions
Go to page: of 58