Isaca CGEIT Practice Test - Questions Answers, Page 53
List of questions
Related questions
A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:
confirm process owners' acceptance of residual risk.
perform an internal and external network penetration test.
obtain IT security approval on security policy exceptions.
benchmark policy against industry best practice.
A high-tech enterprise is concerned that leading competitors have been successfully recruiting top talent from the enterprise's research and development business unit.
What should the leadership team mandate FIRST?
A SWOT analysis
An incentive and retention program
A root cause analysis
An aggressive talent acquisition program
Which of the following metrics is MOST useful to ensure IT services meet business requirements?
Number of discontinued business transformation programs
Frequency Of IT services risk profile updates
Frequency Of IT policy updates
Number of business disruptions due to IT incidents
Which of the following is MOST important for a CIO to ensure before signing a contract for a new cloud-based customer relationship management (CRM) system?
The service provider has been audited for vulnerabilities and threats.
Risk management responsibilities are agreed upon and accepted.
The request for proposal (RFP) has been reviewed for completeness.
A full system functionality check has been completed.
Which of the following is the MOST efficient approach for using risk scenarios to evaluate a new business opportunity?
Related risks are consolidated into one scenario for analysis.
Risk events are identified bottom-up and top-down.
Risk identification leverages past audit and compliance reports.
Risk scenario narratives are summarized and limited in length.
Which of the following would BEST help to ensure the appropriate allocation of IT resources to support an enterprise's mission?
Develop a resource strategy as part of program management.
Prioritize program requirements based on existing resources.
Implement resource planning for each IT project.
Manage resources as part of the portfolio strategy.
IT governance within an enterprise is attempting to drive a cultural shift to enhance compliance with IT security policies. The BEST way to support this objective is to ensure that enterprise IT policies are:
communicated on a regular basis.
acknowledged and signed by each employee.
centrally posted and contain detailed instructions.
integrated into individual performance objectives.
An enterprise learns that some of its business divisions have been approaching technology vendors for cloud services, resulting in duplicate support contracts and underutilization of IT services. Which of the following should be done FIRST to address this issue?
Review the enterprise IT procurement policy.
Re-negotiate contracts with vendors to request discounts.
Require updates to the IT procurement process.
Conduct an audit to investigate utilization of cloud services.
Which of the following is the BEST way for a CIO to provide progress updates on a newly implemented IT strategic plan to the board of directors?
Present an IT summary dashboard.
Present IT critical success factors (CSFs).
Report results Of key risk indicators (KRIs).
Report results of stage-gate reviews.
After experiencing poor recovery times following a catastrophic event, an enterprise is seeking to improve its disaster recovery capabilities. Which of the following would BEST enable the enterprise to accomplish this objective?
Continuous testing of disaster recovery capabilities with implementation of lessons learned
Increased training and monitoring for disaster recovery personnel who perform below expectations
Annual review and updates to the disaster recovery plan (DRP)
Increased outsourcing of disaster recovery capabilities to ensure reliability
Question