ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the GREATEST consideration when evaluating whether to comply with the new carbon footprint regulations impacted by blockchain technology?

A.

The enterprise's organizational structure

A.

The enterprise's organizational structure

Answers
B.

The enterprise's risk appetite

B.

The enterprise's risk appetite

Answers
C.

The current IT process capability maturity

C.

The current IT process capability maturity

Answers
D.

The IT strategic plan

D.

The IT strategic plan

Answers
Suggested answer: B

Explanation:

The greatest consideration when evaluating whether to comply with new carbon footprint regulations impacted by blockchain technology is the enterprise's risk appetite. This involves understanding the level of risk the organization is willing to accept in relation to the potential environmental impact and regulatory compliance requirements associated with blockchain technology. The organization's risk appetite guides decision-making processes, influencing whether to invest in more sustainable practices or technologies, or to accept the risks associated with non-compliance. While the organizational structure, IT process capability maturity, and the IT strategic plan are relevant, the risk appetite is the key factor in determining the approach to compliance with environmental regulations.

Which of the following is the MOST important consideration regarding IT measures as part of an IT strategic plan?

A.

Data collection for the metrics is automated.

A.

Data collection for the metrics is automated.

Answers
B.

The metrics can be traced to enterprise goals.

B.

The metrics can be traced to enterprise goals.

Answers
C.

Minimum target levels are realistic.

C.

Minimum target levels are realistic.

Answers
D.

Thresholds align to key risk indicators (KRIs).

D.

Thresholds align to key risk indicators (KRIs).

Answers
Suggested answer: B

Explanation:

The most important consideration regarding IT measures as part of an IT strategic plan is that the metrics can be traced to enterprise goals. This alignment ensures that IT initiatives and performance metrics directly contribute to achieving the broader objectives of the organization, demonstrating the value of IT in supporting strategic outcomes. While data collection automation, realistic minimum target levels, and thresholds aligned to KRIs are important attributes of effective metrics, the ability to trace metrics back to enterprise goals is fundamental to ensuring strategic alignment and justifying IT investments.

An enterprise wants to reduce the complexity of its data assets while ensuring impact to the business is minimized during the transition.

Which of the following should be done FIRST?

A.

Remove applications that are not aligned with the information architecture.

A.

Remove applications that are not aligned with the information architecture.

Answers
B.

Review the information classification and retention policies.

B.

Review the information classification and retention policies.

Answers
C.

Review the information architecture.

C.

Review the information architecture.

Answers
D.

Assess current information ownership.

D.

Assess current information ownership.

Answers
Suggested answer: C

Explanation:

To reduce the complexity of its data assets while minimizing impact to the business during the transition, an enterprise should first review the information architecture. This review will provide a comprehensive understanding of the current state of data assets, their interdependencies, and how they are managed and utilized within the organization. It forms the basis for identifying redundancies, inefficiencies, and opportunities for simplification. While removing misaligned applications, reviewing classification and retention policies, and assessing information ownership are important, they should be guided by a thorough review of the information architecture to ensure a strategic and effective approach to simplification.

An interna! health organization has been notified that a data breach has resulted in patient records being published online. Which of the following is MOST important consideration when determining the process for meeting the organization's legal and regulatory obligations?

A.

Organizational structure, including accountable partes

A.

Organizational structure, including accountable partes

Answers
B.

Data classification and related security policy

B.

Data classification and related security policy

Answers
C.

Context of the breach, including data ownership and location

C.

Context of the breach, including data ownership and location

Answers
D.

Details of how the breach occurred and related incident response efforts

D.

Details of how the breach occurred and related incident response efforts

Answers
Suggested answer: C

Explanation:

When determining the process for meeting an internal health organization's legal and regulatory obligations following a data breach, the most important consideration is the context of the breach, including data ownership and location. Understanding who owns the breached data and where it was stored or processed is crucial for determining jurisdictional and regulatory requirements. This context informs the organization's legal obligations, such as notification requirements and potential liabilities. While organizational structure, data classification, security policy, and details of the breach and incident response efforts are relevant, the context of the breach is paramount in guiding the legal and regulatory response.

Which of the following BEST supports an IT strategy committee's objective to align employee competencies with planned initiatives?

A.

Set management goals to hire cooperative work experience students.

A.

Set management goals to hire cooperative work experience students.

Answers
B.

Specify minimum training hours required for continuing professional education.

B.

Specify minimum training hours required for continuing professional education.

Answers
C.

Require balanced scorecard concepts training of all employees.

C.

Require balanced scorecard concepts training of all employees.

Answers
D.

Add achievement of competencies to employee performance goals.

D.

Add achievement of competencies to employee performance goals.

Answers
Suggested answer: D

Explanation:

Adding the achievement of specific competencies to employee performance goals best supports an IT strategy committee's objective to align employee competencies with planned initiatives. This approach directly links employee development and performance evaluation to the acquisition of skills and knowledge required for the organization's strategic initiatives. By embedding competency development into performance goals, employees are incentivized to acquire the necessary skills, ensuring that the workforce is capable of supporting and executing strategic plans. While hiring students, specifying training hours, and requiring balanced scorecard training can contribute to skill development, integrating competency achievement into performance goals ensures a direct and measurable alignment with strategic needs.

Which of the following is a CIO's BEST approach to ensure IT executes against an approved strategy?

A.

Ask project management to define the IT activities for accomplishing the strategy.

A.

Ask project management to define the IT activities for accomplishing the strategy.

Answers
B.

Request IT senior leaders to collectively plan tactics for execution

B.

Request IT senior leaders to collectively plan tactics for execution

Answers
C.

Have IT leaders independently develop goals for their teams.

C.

Have IT leaders independently develop goals for their teams.

Answers
D.

Provide specific direction for execution of the tasks across IT.

D.

Provide specific direction for execution of the tasks across IT.

Answers
Suggested answer: B

Explanation:

The best approach for a CIO to ensure IT executes against an approved strategy is to request IT senior leaders to collectively plan tactics for execution. This collaborative approach leverages the expertise and insights of senior IT leaders to develop a cohesive and aligned plan that supports the strategic objectives. Collective planning fosters ownership and commitment among leaders, ensuring that execution tactics are well-coordinated and aligned with the overall IT strategy. While asking project management to define activities, having leaders independently develop team goals, and providing specific task direction are important, the collective planning by IT senior leaders ensures a strategic and unified approach to execution.

An IT governance committee is reviewing its current risk management policy in light of increased usage of social media within an enterprise. The FIRST task for the governance committee is to:

A.

recommend blocking access to social media.

A.

recommend blocking access to social media.

Answers
B.

review current level of social media usage.

B.

review current level of social media usage.

Answers
C.

initiate an assessment of the impact on the business.

C.

initiate an assessment of the impact on the business.

Answers
D.

reassess the enterprise's bring your own device (BYOD) policy.

D.

reassess the enterprise's bring your own device (BYOD) policy.

Answers
Suggested answer: C

Explanation:

When an IT governance committee is reviewing its current risk management policy due to increased usage of social media within an enterprise, the first task should be to initiate an assessment of the impact on the business. This assessment will provide a comprehensive understanding of how social media usage affects various aspects of the business, including productivity, security, data privacy, and compliance with existing policies and regulations. Understanding the business impact will inform the committee's decisions on any necessary policy adjustments or controls to mitigate potential risks associated with social media usage. While reviewing current usage levels, blocking access, and reassessing BYOD policies are relevant considerations, they should be informed by an initial assessment of the business impact to ensure that any actions taken are aligned with the enterprise's strategic objectives and risk tolerance.


An IT governance committee realizes there are antiquated technologies in use throughout the enterprise. Which of the following is the BEST group to evaluate the recommendations to address these shortcomings?

A.

Enterprise architecture (EA) review board

A.

Enterprise architecture (EA) review board

Answers
B.

Business process improvement workgroup

B.

Business process improvement workgroup

Answers
C.

Audit committee

C.

Audit committee

Answers
D.

Risk management committee

D.

Risk management committee

Answers
Suggested answer: A

Explanation:

The best group to evaluate recommendations to address the use of antiquated technologies throughout the enterprise is the Enterprise Architecture (EA) review board. This group is responsible for overseeing the architectural framework and ensuring that IT systems and technologies align with the enterprise's strategic objectives. The EA review board has the expertise to assess the impact of current technologies on the business and recommend modernization strategies that align with the enterprise architecture. While business process improvement workgroups, audit committees, and risk management committees play important roles, the EA review board is specifically equipped to address technological shortcomings and alignment with business goals.

Which of the following would be an IT steering committee's BEST course of action upon learning business units have been independently procuring cloud services?

A.

Require cancellation of cloud-based application services not vetted by IT leadership.

A.

Require cancellation of cloud-based application services not vetted by IT leadership.

Answers
B.

Include business unit leadership in the enterprise architecture (EA) review board.

B.

Include business unit leadership in the enterprise architecture (EA) review board.

Answers
C.

Limit cloud-based application service usage to open source solutions.

C.

Limit cloud-based application service usage to open source solutions.

Answers
D.

Define a procurement strategy based on business unit needs.

D.

Define a procurement strategy based on business unit needs.

Answers
Suggested answer: D

Explanation:

Upon learning that business units have been independently procuring cloud services, the IT steering committee's best course of action is to define a procurement strategy based on business unit needs. This approach ensures that cloud service procurement aligns with the enterprise's overall IT strategy and governance policies while still addressing the specific requirements of individual business units. It fosters collaboration between IT and business units, ensuring that cloud services are vetted for compliance, security, and interoperability. Requiring cancellation, including business unit leadership in the EA review board, or limiting usage to open-source solutions may address aspects of the issue but do not provide a comprehensive strategy that aligns business needs with IT governance.

Which of the following would be the BEST way for an enterprise to address new legal and regulatory requirements applicable to IT?

A.

Treat as a risk to be assessed before developing a response.

A.

Treat as a risk to be assessed before developing a response.

Answers
B.

Benchmark how other IT organizations are treating the new requirements.

B.

Benchmark how other IT organizations are treating the new requirements.

Answers
C.

Adopt a zero-tolerance approach for noncompliance with regulatory matters.

C.

Adopt a zero-tolerance approach for noncompliance with regulatory matters.

Answers
D.

Use a cost-benefit analysis to determine if compliance is warranted.

D.

Use a cost-benefit analysis to determine if compliance is warranted.

Answers
Suggested answer: A

Explanation:

The best way for an enterprise to address new legal and regulatory requirements applicable to IT is to treat them as a risk to be assessed before developing a response. This approach involves identifying the potential impact of the new requirements on the organization, evaluating the likelihood and consequences of non-compliance, and then developing a prioritized response plan based on this risk assessment. This method ensures a measured and proportional response that aligns with the organization's risk appetite and strategic objectives. While benchmarking, adopting a zero-tolerance approach, and using cost-benefit analysis are useful, they should be part of a broader risk-based strategy to address compliance effectively.

Total 577 questions
Go to page: of 58