ExamGecko
Home Home / Isaca / CGEIT

Isaca CGEIT Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











Which of the following is the MOST effective way of assessing enterprise risk?

A.
Business impact analysis (BIA)
A.
Business impact analysis (BIA)
Answers
B.
Business vulnerability assessment
B.
Business vulnerability assessment
Answers
C.
Likelihood of threat analysis
C.
Likelihood of threat analysis
Answers
D.
Operational risk assessment
D.
Operational risk assessment
Answers
Suggested answer: D

A CIO must determine if IT staff have adequate skills to deliver on key strategic objectives. Which of the following will provide the MOST useful information?

A.
Employee performance metrics
A.
Employee performance metrics
Answers
B.
Project risk reports
B.
Project risk reports
Answers
C.
Gap analysis results
C.
Gap analysis results
Answers
D.
Training program statistics
D.
Training program statistics
Answers
Suggested answer: C

When evaluating benefits realization of IT process performance, the analysis MUST be based on;

A.
key business objectives.
A.
key business objectives.
Answers
B.
industry standard key performance indicators (KPIs).
B.
industry standard key performance indicators (KPIs).
Answers
C.
portfolio prioritization criteria.
C.
portfolio prioritization criteria.
Answers
D.
IT risk policies.
D.
IT risk policies.
Answers
Suggested answer: A

Which of the following is the PRIMARY ongoing responsibility of the IT governance function related to risk?

A.
Responding to and controlling all IT risk events
A.
Responding to and controlling all IT risk events
Answers
B.
Communicating the enterprise risk management plan
B.
Communicating the enterprise risk management plan
Answers
C.
Ensuring IT risk management is aligned with business risk appetite
C.
Ensuring IT risk management is aligned with business risk appetite
Answers
D.
Verifying that all business units have staff skilled at assessing risk
D.
Verifying that all business units have staff skilled at assessing risk
Answers
Suggested answer: C

An enterprise considering implementing IT governance should FIRST develop the scope of the IT governance program and:

A.
initiate the program using an implementation roadmap.
A.
initiate the program using an implementation roadmap.
Answers
B.
establish initiatives for business and managers.
B.
establish initiatives for business and managers.
Answers
C.
acquire the resources that will be required.
C.
acquire the resources that will be required.
Answers
D.
communicate the program to stakeholders to gain consensus.
D.
communicate the program to stakeholders to gain consensus.
Answers
Suggested answer: D

Which of the following should be the MAIN reason for an enterprise to implement an IT risk management framework?

A.
The need to enable IT risk-aware decisions by executives
A.
The need to enable IT risk-aware decisions by executives
Answers
B.
The results of an external audit report concerning IT risk management processes.
B.
The results of an external audit report concerning IT risk management processes.
Answers
C.
The need to address market regulations and internal compliance in IT risk
C.
The need to address market regulations and internal compliance in IT risk
Answers
D.
The ability to benchmark IT risk policies against major competitors
D.
The ability to benchmark IT risk policies against major competitors
Answers
Suggested answer: A

An enterprise's information security function is making changes to its data retention and backup policies. Which of the following presents the GREATEST risk?

A.
Business data owners were not consulted.
A.
Business data owners were not consulted.
Answers
B.
The new policies Increase the cost of data backups.
B.
The new policies Increase the cost of data backups.
Answers
C.
Data backups will be hosted at third-party locations.
C.
Data backups will be hosted at third-party locations.
Answers
D.
The retention period for data backups is Increased.
D.
The retention period for data backups is Increased.
Answers
Suggested answer: A

Which of the following would be MOST important to update if a decision is made to ban end user-owned devices in the workplace?

A.
Employee nondisclosure agreement
A.
Employee nondisclosure agreement
Answers
B.
Enterprise risk appetite statement
B.
Enterprise risk appetite statement
Answers
C.
Enterprise acceptable use policy
C.
Enterprise acceptable use policy
Answers
D.
Orientation training materials
D.
Orientation training materials
Answers
Suggested answer: C

Which of the following is the MOST effective way to manage risks within the enterprise?

A.
Assign individuals responsibilities and accountabilities for management of risks.
A.
Assign individuals responsibilities and accountabilities for management of risks.
Answers
B.
Make staff aware of the risks in their area and risk management techniques.
B.
Make staff aware of the risks in their area and risk management techniques.
Answers
C.
Provide financial resources for risk management systems.
C.
Provide financial resources for risk management systems.
Answers
D.
Document procedures and reporting processes.
D.
Document procedures and reporting processes.
Answers
Suggested answer: A

Which of the following is an ADVANTAGE of using strategy mapping?

A.
It provides effective indicators of productivity and growth.
A.
It provides effective indicators of productivity and growth.
Answers
B.
It depicts the maturity levels of processes that support organizational strategy.
B.
It depicts the maturity levels of processes that support organizational strategy.
Answers
C.
It identifies barriers to strategic alignment and links them to specific outcomes.
C.
It identifies barriers to strategic alignment and links them to specific outcomes.
Answers
D.
It depicts the cause-and-effect linked relationships between strategic objectives.
D.
It depicts the cause-and-effect linked relationships between strategic objectives.
Answers
Suggested answer: D
Total 577 questions
Go to page: of 58