Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CGEIT Practice Exam with Questions & Answers | Set: 13

Questions 181

An enterprise has decided to implement an IT risk management program After establishing stakeholder desired outcomes, the MAIN goal of the IT strategy committee should be to:

Options:
A.

identify business data that requires protection.

B.

perform a risk analysis on key IT processes

C.

implement controls to address high risk areas

D.

ensure IT risk alignment with enterprise risk

Isaca CGEIT Premium Access
Questions 182

An IT strategy committee has reviewed an audit report indicating sales employees are using personal smartphones to conduct corporate business. Although the committee appreciates the business benefits, it is also concerned with the security risk. To deliver the business benefit, what should be the committee's FIRST recommendation?

Options:
A.

Document procedures for securing personal devices.

B.

Improve training courses on securing corporate information.

C.

Perform a risk assessment on personal device data protection.

D.

Update the corporate security policy to include personal devices.

Questions 183

When developing an IT strategic plan that supports an enterprise's business goals which of the following should be done FIRST?

Options:
A.

Ensure that IT drives business goals

B.

Analyze benchmarking data

C.

Understand the current vision

D.

Perform a business impact analysis (BIA)

Questions 184

Which of the following BEST indicates the success of an enterprise's IT governance framework after implementation?

Options:
A.

A high percentage of business owners involved with the approval of the IT strategic plan

B.

A high percentage of IT systems complying with corporate information security standards

C.

A high percentage of IT projects delivered on time and on budget

D.

A high percentage of IT investments delivering expected benefits

Questions 185

Which of the following should be the MOST important consideration when designing an implementation plan for IT governance?

Options:
A.

Principles and policies

B.

Roles and responsibilities

C.

Risk tolerance levels

D.

Organizational culture

Questions 186

In an enterprise that has worldwide business units and a centralized financial control model, which of the following is a barrier to strategic alignment of business and IT?

Options:
A.

Each business unit has its own steering committee for IT investment and prioritization.

B.

Uniform portfolio management is in place throughout the business units.

C.

IT is the exclusive provider of IT services to the business units.

D.

The enterprise's CIO is a member of the executive committee.

Questions 187

Which of the following is MOST important to document for a business ethics program?

Options:
A.

Guiding principles and best practices

B.

Violation response matrix

C.

Whistle-blower protection protocols.

D.

Employee awareness and training content

Questions 188

An independent consultant has been hired to conduct an ad hoc audit of an enterprise’s information security office with results reported to the IT governance committee and the board Which of the following is MOST important to provide to the consultant before the audit begins?

Options:
A.

Acceptance of the audit risks and opportunities

B.

The scope and stakeholders of the audit

C.

The organizational structure of the security office

D.

The policies and framework used by the security office

Questions 189

The board of directors of a large organization has directed IT senior management to improve IT governance within the organization. IT senior management's MOST important course of action should be to:

Options:
A.

understand the driver that led to a desire to change.

B.

assess the current slate of IT governance within the organization.

C.

review IT strategy and direction.

D.

analyze IT service levels and performance.

Questions 190

An enterprise is concerned with the potential for data leakage as a result of increased use of social media in the workplace, and wishes to establish a social media strategy. Which of the following should be the MOST important consideration in developing this strategy?

Options:
A.

Criticality of the information

B.

Ensuring that the enterprise architecture (EA) is updated

C.

Data ownership

D.

The balance between business benefits and risk

Questions 191

Following the rollout of an enterprise IT software solution that hosts sensitive data it was discovered that the application's role-based access control was not functioning as specified Which of the following is the BEST way to prevent reoccurrence in the future?

Options:
A.

Ensure supplier contracts include penalties if solutions do not meet functional requirements

B.

Ensure the evaluation process requires independent assessment of solutions prior to implementation

C.

Ensure supplier contracts include a provision for the right to audit on an annual basis

D.

Ensure procurement processes require the identification of alternate vendors to ensure business continuity.

Questions 192

A newly appointed CIO has been tasked with the responsibility of developing an effective IT enterprise roadmap that meets business requirements. Which of the following is the BEST way to ensure that the business needs have been taken into consideration?

Options:
A.

Involve process owners in requirements gathering.

B.

Implement a balanced scorecard.

C.

Include user acceptance testing (UAT) as part of the resulting IT solutions.

Questions 193

An enterprise has developed a new digital strategy to improve fraud detection. Which of the following is MOST important to consider when updating the information architecture?

Options:
A.

Resource constraints related to implementing the digital strategy.

B.

The business use cases supporting the digital strategy

C.

Changes to the legacy business and data architectures

D.

The history of fraud incidents and their root causes

Questions 194

The CIO of a financial and insurance company is considering the projects and portfolio for the coming year Which of the following projects is a non-discretionary project?

Options:
A.

Data center relocation

B.

Compliance with statutory regulations

C.

Actuarial application system analysis and design

D.

Core banking applications scalability assessment

Questions 195

Which of the following is the MOST significant challenge faced by an enterprise when establishing information stewardship?

Options:
A.

Lack of documented policies and procedures

B.

Information requirements of regulatory authorities

C.

Insufficient knowledge of IT practices and controls

D.

Lack of role clarity and specific responsibilities

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.