Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CGEIT Practice Exam with Questions & Answers

Questions 1

Which of the following should be done FIRST when developing an IT strategy to support a new AI business strategy?

Options:
A.

Assess current AI capabilities and infrastructure

B.

Establish guidelines and policies for responsible use of AI

C.

Create use cases to understand the impact of AI

D.

Build a team of AI professionals

Isaca CGEIT Premium Access
Questions 2

An enterprise has a centralized IT function but also allows business units to have their own technology operations, resulting in duplicate technologies and conflicting priorities. Which of the following should be done FIRST to reduce the complexity of the IT landscape?

Promote automation tools used by the business units.

Options:
A.

Conduct strategic planning with business units.

B.

Migrate all in-house systems to an external cloud environment.

C.

Standardize technology architecture on common products.

Questions 3

When an enterprise plans to deploy mobile device technologies, it is MOST important for leadership to ensure that:

Options:
A.

Users agree to an acceptable use policy

B.

Appropriate controls are implemented

C.

The IT policy addresses mobile devices

D.

The project management office (PMO) is engaged

Questions 4

An IT governance committee realizes there are antiquated technologies in use throughout the enterprise. Which of the following is the BEST group to evaluate the recommendations to address these shortcomings?

Options:
A.

Enterprise architecture (EA) review board

B.

Business process improvement workgroup

C.

Audit committee

D.

Risk management committee

Questions 5

Which of the following is the BEST way for an IT steering committee to monitor the adoption of a new enterprise IT strategy?

Options:
A.

Implement service level agreements (SLAs).

B.

Establish key performance indicators (KPIs).

C.

Schedule ongoing audit reviews.

D.

Establish key risk indicators (KRIs).

Questions 6

Senior management is concerned about the unauthorized use of third-party data that is stored within the enterprise's data repositories. Which of the following is the BEST way to address this concern?

Options:
A.

Communicate consequences for staff who misuse third-party data.

B.

Ensure all third-party data in transit is encrypted.

C.

Establish data ownership with clear accountabilities.

D.

Establish optimal retention periods for third-party data.

Questions 7

To measure the value of IT-enabled investments, an enterprise needs to identify its drivers as defined by its:

Options:
A.

technology strategy.

B.

value statements.

C.

service level agreements (SLAs).

D.

business strategy.

Questions 8

Which strategic planning approach would be MOST appropriate for a large enterprise to follow when revamping its IT services?

Options:
A.

Addressing gaps within the management of IT-related risk

B.

Focusing on business innovation through knowledge, expertise, and initiatives

C.

Calibrating and scaling delivery Of IT services in line with business requirements

D.

Adhering to on-time and on-budget IT service delivery

Questions 9

An enterprise has well-designed procurement and vendor risk management policies that are intended to prevent biased decision-making. However, a pattern of ethical violations indicates that vendor selection may have been inappropriately influenced by non-work-related incentives provided to decision makers. Which of the following should be done FIRST in response to this issue?

Options:
A.

Revise the procurement and vendor risk management policies.

B.

Conduct a root cause analysis and remediate based on findings.

C.

Document the critical success factors (CSFs) for the procurement policies.

D.

Establish and communicate strict penalties for biased vendor selection.

Questions 10

A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:

confirm process owners' acceptance of residual risk.

perform an internal and external network penetration test.

obtain IT security approval on security policy exceptions.

Options:
A.

benchmark policy against industry best practice.

Questions 11

An IT governance committee is reviewing its current risk management policy in light of increased usage of social media within an enterprise. The FIRST task for the governance committee is to:

Options:
A.

recommend blocking access to social media.

B.

review current level of social media usage.

C.

initiate an assessment of the impact on the business.

D.

reassess the enterprise's bring your own device (BYOD) policy.

Questions 12

An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:

Options:
A.

for robust change management.

B.

for periodic service provider audits.

C.

for enterprise architecture (EA) updates.

D.

to qualify service providers.

Questions 13

Which of the following is MOST important to include in the customer dimension of an IT balanced scorecard?

Options:
A.

Business value creation

B.

Stakeholder satisfaction

C.

Maintenance of IT operations

D.

Support for corporate customers

Questions 14

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

Options:
A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Questions 15

Which of the following is MOST likely to have a negative impact on

accountability for information risk ownership?

Options:
A.

The risk owner is a department manager, and the control owner is a member of the risk owner's staff.

B.

Information risk is assigned to a department, and an individual owner has not been assigned.

C.

The risk owner and the control owner of the information do not work in the same department.

D.

The same person is listed as both the control owner and the risk owner for the information.

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.