Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CGEIT

CGEIT Certified in the Governance of Enterprise IT Exam Question and Answers

Question # 4

Which of the following should be done FIRST when preparing to migrate patient records to a cloud service provider?

A.

Review the current data governance policy.

B.

Update the enterprise architecture (EA).

C.

Revise the risk management framework.

D.

Define the service level agreement (SLA).

Full Access
Question # 5

Which of the following should be the MOST essential consideration when outsourcing IT services?

A.

Identification of core and non-core business processes.

B.

Compliance with enterprise architecture (EA).

C.

Alignment with existing human resources (HR) policies and practices.

D.

Adoption of a diverse vendor selection process.

Full Access
Question # 6

Which of the following is the PRIMARY objective of a data protection impact assessment?

A.

To identify and analyze how data privacy might be affected by business processes.

B.

To evaluate the quality and integrity of personal data stored in an enterprise.

C.

To estimate the value created by personal data as it progresses through its life cycle.

D.

To ensure key business processes and related data interfaces are documented.

Full Access
Question # 7

Which of the following presents the GREATEST challenge for a large-scale enterprise when procuring Infrastructure as a Service (IaaS)?

A.

Testing the vendor resiliency plan annually

B.

Protecting the enterprise from labor liability

C.

Ensuring the vendor meets corporate requirements

D.

Monitoring key performance indicators (KPIs)

Full Access
Question # 8

A CIO has been asked to modify an organization's IT performance measurement system to reflect recent changes in technology, including the movement of some data processing to a cloud solution. Which of the following is the PRIMARY consideration when designing such a measurement system?

A.

Ensuring that cost of measurement and reporting is minimized

B.

Ensuring the measurement system maps to the enterprise architecture (EA)

C.

Adequately defining the scope of services moved to the cloud

D.

Correctly understanding stakeholder needs for IT-related measurement

Full Access
Question # 9

To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?

A.

IT staff morale

B.

Core IT processes

C.

Outsourcer's reputation

D.

New service level agreements (SLAs)

Full Access
Question # 10

Which of the following is MOST important to ensure that IT project selections meet the enterprise’s business requirements?

A.

Development of an enterprise architecture (EA).

B.

Business participation in the selection of IT projects.

C.

Implementation of project stage gates.

D.

Creation of thorough business cases prior to IT project selection.

Full Access
Question # 11

An enterprise has an overarching enterprise architecture (EA) document. The CIO is concerned that EA is not leveraged in recent IT-enabled investments. Which of the following would BEST help to address these concerns and enforce the leveraging of EA?

A.

Form a team to update EA regularly.

B.

Require EA review at key milestones.

C.

Publish and train on the EA document.

D.

Adopt a globally recognized EA framework.

Full Access
Question # 12

Which of the following BEST enables an enterprise to achieve the benefits of implementing new Internet of Things (loT) technology?

A.

IT project charter

B.

Change management

C.

Emerging technology roadmap

D.

Enterprise architecture (EA)

Full Access
Question # 13

The board of an organization has been informed of possible cyberthreats. Which of the following should be the board’s NEXT course of action?

A.

Evaluate the security incident response process

B.

Reevaluate the risk tolerance of the organization

C.

Ask the CIO to report on a risk response

D.

Engage the CIO to evaluate the risk

Full Access
Question # 14

A newly established IT steering committee is concerned whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

A.

Critical success factors (CSFs)

B.

Performance indicators

C.

Capability maturity levels

D.

Balanced scorecard

Full Access
Question # 15

A high-tech enterprise is concerned that leading competitors have been successfully recruiting top talent from the enterprise's research and development business unit.

What should the leadership team mandate FIRST?

A.

A SWOT analysis

B.

An incentive and retention program

C.

A root cause analysis

D.

An aggressive talent acquisition program

Full Access
Question # 16

Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?

A.

Defined roles.

B.

Replicated systems.

C.

A risk register.

D.

Budget allocation.

Full Access
Question # 17

An enterprise recently experienced a major breach that was escalated effectively. However, the recovery took far longer than expected, resulting in significant financial loss. Which of the following is MOST likely the root cause of this scenario?

A.

Key performance indicators (KPIs) were not regularly monitored

B.

The recovery point objective (RPO) was not established

C.

The disaster recovery plan (DRP) was not routinely updated

D.

The business continuity plan (BCP) was not recently tested

Full Access
Question # 18

Which of the following should be the FIRST step to ensure IT resources have the appropriate skills and experience level to support enterprise objectives?

A.

Determining the required competencies.

B.

Providing training to IT personnel.

C.

Developing an IT skills matrix.

D.

Monitoring resource performance.

Full Access
Question # 19

New legislation requires an enterprise to report cybersecurity incidents to a government agency within a defined timeline. Which of the following should be the FIRST course of action?

A.

Establish an incident reporting system and hotline.

B.

Require automation of incident reporting to agencies.

C.

Establish a cybersecurity incident manager role.

D.

Understand requirements and definitions for reportable incidents.

Full Access
Question # 20

Which of the following is the BEST way for a CIO to provide progress updates on a newly implemented IT strategic plan to the board of directors?

Present an IT summary dashboard.

Present IT critical success factors (CSFs).

Report results Of key risk indicators (KRIs).

A.

Report results of stage-gate reviews.

Full Access
Question # 21

Which of the following should be the PRIMARY consideration when implementing IT governance in a small, newly established organization?

A.

Assigning a budget for IT governance applications.

B.

Defining IT project management methodology.

C.

Approving enterprise architecture (EA) and standards.

D.

Assigning IT roles and responsibilities.

Full Access
Question # 22

Which of the following should be the PRIMARY consideration when implementing an emerging technology with unclear regulatory and compliance requirements?

A.

Enterprise strategic plan

B.

Enterprise architecture (EA) alignment

C.

Enterprise risk appetite

D.

Business impact analysis (BIA) results

Full Access
Question # 23

An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:

A.

a common risk management taxonomy.

B.

a common risk organization.

C.

common key risk indicators (KRIs).

D.

common risk mitigation strategies.

Full Access
Question # 24

An enterprise has decided to invest in Internet of Things (IoT) technology as part of its strategic plan. Which of the following presents the GREATEST risk to consider as part of the technical risk management process?

A.

Device vulnerabilities

B.

Technology integration

C.

Device performance

D.

Technology obsolescence

Full Access
Question # 25

A series of cyber events impacting internet-facing business services has been successfully contained. To minimize future business risk exposure, which of the following should the board require of the IT team?

A.

Review the internet service provider (ISP) contract.

B.

Purchase cybersecurity insurance.

C.

Conduct a business impact analysis (BIA).

D.

Perform a root cause analysis.

Full Access
Question # 26

Despite an adequate training budget, IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?

A.

Provide incentives for IT staff to attend outside conferences and training.

B.

Require human resources (HR) to recruit new talent using an established IT skills matrix.

C.

Create a standard-setting center of excellence for IT.

D.

Establish an agreed-upon skills development plan with each employee.

Full Access
Question # 27

An enterprise’s IT director is concerned that the chair of the IT steering committee is stealing confidential company information. Which of the following is the IT director’s BEST course of action?

A.

File a report with the local law enforcement agency.

B.

Report the concern to the ethics hotline.

C.

Discuss the concern with the chair directly.

D.

Conduct an investigation to substantiate the chair’s activities.

Full Access
Question # 28

Which of the following should be the PRIMARY outcome of IT governance?

A.

Elimination of IT risk

B.

Improved IT risk awareness throughout the enterprise

C.

Quality assurance (QA) of IT processes

D.

Value delivery of IT to the business

Full Access
Question # 29

Which of the following BEST helps to ensure that IT policies are

aligned with organizational strategies?

A.

The policies are approved by the board of directors.

B.

The policies are developed using a top-down approach.

C.

The policies are updated annually.

D.

The policies are periodically audited.

Full Access
Question # 30

Which of the following is the MOST effective approach to ensure senior management sponsorship of IT risk management?

A.

Calculate financial impact for each IT risk finding.

B.

Benchmark the risk framework against best practices.

C.

Integrate IT risk into enterprise risk management (ERM).

D.

Periodically review the IT risk register entries.

Full Access
Question # 31

When an enterprise outsources to a third-party data center, who is accountable for the governance of data retention controls for the data that has been transferred?

A.

The enterprise's internal audit team

B.

The third party's data steward

C.

The third party's control operators

D.

The enterprise's data owner

Full Access
Question # 32

An enterprise is concerned that ongoing maintenance costs are not being considered when prioritizing IT-enabled business investments. Which of the following should be the enterprise's FIRST course of action?

A.

Implement a balanced scorecard for the IT project portfolio.

B.

Establish a portfolio manager role to monitor and control the IT projects.

C.

Require business cases to have product life cycle information.

D.

Mandate an enterprise architecture (EA) review with business stakeholders.

Full Access
Question # 33

An enterprise wants to establish key risk indicators (KRIs) in an effort to better manage IT risk. Which of the following should be identified FIRST?

A.

The enterprise risk appetite

B.

Key performance metrics

C.

Risk mitigation strategies

D.

Enterprise architecture (EA) components

Full Access
Question # 34

What is the BEST way for a board of directors to improve its ability to identify material changes to the enterprise IT risk profile?

A.

Require management to present a comprehensive list of risks.

B.

Require the implementation of a security incident and event management (SIEM) tool.

C.

Review the key risk indicators (KRIs) on a regular basis.

D.

Focus on key performance indicators (KPIs) that predict future business performance.

Full Access
Question # 35

Which of the following is the BEST way to express the value of financial investments in cybersecurity?

A.

Payback period

B.

Cost-benefit analysis

C.

Net present value (NPV)

D.

Internal rate of return (IRR)

Full Access
Question # 36

Which of the following provides an enterprise with the BEST understanding of the value proposition for employing a new cloud service?

A.

Key risk indicators (KRIs).

B.

Service level agreements (SLAs).

C.

Return on investment (ROI).

D.

Customer satisfaction surveys.

Full Access
Question # 37

Which of the following roles is accountable for the confidentiality, integrity, and availability of information within an enterprise?

A.

Data owner

B.

Lead legal counsel

C.

Risk manager

D.

Data custodian

Full Access
Question # 38

Which of the following would BEST help to prevent an IT system from becoming obsolete before its planned return on investment (ROI)?

A.

Obtaining independent assurance that the IT system conforms to business requirements

B.

Defining IT and business goals to ensure value delivery as required

C.

Managing the benefit realization through the entire life cycle

D.

Ordering an external audit for the IT system early in the roll out

Full Access
Question # 39

When developing IT risk management policies and standards, it is MOST important to align them with:

A.

The corporate risk culture

B.

The enterprise risk management (ERM) framework

C.

Enterprise goals and objectives

D.

Best practices for IT risk management

Full Access
Question # 40

When developing IT risk management policies and standards, it is MOST important to align them with:

A.

Best practices for IT risk management.

B.

The corporate risk culture.

C.

Enterprise goals and objectives.

D.

The enterprise risk management (ERM) framework.

Full Access
Question # 41

A regulatory audit of an IT department has identified discrepancies between processes described in the procedures and what is actually done by system administrators.

The discrepancies were caused by recent IT application changes. Which of the following would be the BEST way to prevent the recurrence of similar findings in the future?

A.

Assign the responsibility for periodic revisions and changes to process owners.

B.

Require each IT employee to confirm compliance with IT procedures on an annual basis.

C.

Include the update of documentation within the change management framework.

D.

Establish high-level procedures to minimize process changes.

Full Access
Question # 42

An enterprise has established a new department to oversee the life cycle of activities that support data management objectives. Which of the following should be done NEXT?

A.

Develop a business continuity plan (BCP).

B.

Assess the current data business model.

C.

Review data privacy requirements.

D.

Establish a RACI chart

Full Access
Question # 43

What is the PRIMARY benefit of aligning information architecture with enterprise architecture (EA)?

A.

It improves communication with senior management and the business.

B.

It ensures the adoption of enterprise data quality standards.

C.

It enables the tracing of data to business functions.

D.

It facilitates appropriate access to data consumers.

Full Access
Question # 44

Which of the following MOST effectively prevents an IT system from becoming technologically obsolete before its planned return on investment (ROi)?

A.

Requesting periodic third-party assessments of the system throughout its life

B.

Obtaining long-term support commitments from the system platform vendors)

C.

Obtaining independent assurance that the system will conform to future business requirements

D.

Ensuring that the system is maintained in compliance with enterprise architecture (EA) standards

Full Access
Question # 45

A CIO was notified that a new employee was observed wearing a headset with an optical lens at the organization's data center. The individual was entering voice commands into the device. When approached, the employee explained the device is a new personal technology serving as a hands-free version of a smart phone. The CIO is concerned with potential security vulnerabilities of allowing such devices, and whether they should be banned from the facility. What should be the NEXT course of action in response to the ClO's concern?

A.

Define a risk mitigation strategy.

B.

Update the acceptable use policy.

C.

Research competitor usage of similar devices.

D.

Assess the risk associated with the device.

Full Access
Question # 46

An enterprise is planning to upgrade its current enterprise resource planning (ERP) system to remain competitive within the industry. Which of the following would be MOST helpful to facilitate a successful implementation?

A.

Documenting the current ERP processes and procedures

B.

Reviewing the ERP post-implementation report

C.

Establishing a change and transition planning process

D.

Conducting a comprehensive requirements review

Full Access
Question # 47

An enterprise's current business continuity plan (BCP) fails to consider many common crisis events. What would be MOST helpful to address this situation?

A.

Engage stakeholders in scenario development

B.

Review the root cause analysis

C.

Require further walk-through tests

D.

Review and update the crisis communication plan

Full Access
Question # 48

Which of the following is the BEST indication that an implementation plan for a new governance initiative will be successful?

A.

Staff have been trained on the new initiative.

B.

External consultants created the plan.

C.

The plan assigns responsibility for completing milestones.

D.

The plan is designed to engage employees across the enterprise.

Full Access
Question # 49

A chief technology officer (CTO) wants to ensure IT governance practices adequately address risk management specific to mobile applications. To create the appropriate risk policies for IT, it is MOST important for the CTO to:

A.

understand the enterprise's risk tolerance.

B.

create an IT risk scorecard.

C.

map the business goals to IT risk processes.

D.

identify the mobile technical requirements.

Full Access
Question # 50

A CIO must determine if IT staff have adequate skills to deliver on key strategic objectives. Which of the following will provide the MOST useful information?

A.

Employee performance metrics

B.

Project risk reports

C.

Gap analysis results

D.

Training program statistics

Full Access
Question # 51

A newly appointed CIO is concerned that IT is too reactive and wants to ensure IT adds value to the enterprise by proactively anticipating business needs. Which of the following will BEST contribute to meeting this objective?

A.

Incorporating IT planning into the enterprise strategic planning process

B.

Implementing an IT portfolio management framework

C.

Involving more IT representation in strategic business case reviews

D.

Including IT management within the program management office

Full Access
Question # 52

An internal auditor conducts an assessment of a two-year-old IT risk management program. Which of the following findings should be of MOST concern to the CIO?

A.

Organizational responsibility for IT risk management is not clearly defined.

B.

None of the members of the IT risk management team have risk management-related certifications.

C.

Only a few key risk indicators (KRIs) identified by the IT risk management team are being monitored and the rest will be on a phased schedule.

D.

IT risk training records are not properly retained in accordance with established schedules

Full Access
Question # 53

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Full Access
Question # 54

Which of the following is the FIRST step when developing an IT risk management framework?

A.

Promoting a culture of risk awareness

B.

Establishing a risk control library

C.

Aligning to enterprise risk management (ERM)

D.

Establishing risk appetite

Full Access
Question # 55

A new regulation requires enterprises to disclose when significant cyber incidents occur. Which of the following is MOST important for the enterprise to determine?

A.

Cyber awareness program effectiveness

B.

Incident reporting mechanisms

C.

Criteria for a material incident

D.

Role responsible for communications

Full Access
Question # 56

Which of the following is the BEST critical success factor (CSF) to use when changing an IT value management program in an enterprise?

A.

Documenting the process for the board of directors' approval

B.

Adopting the program by using an incremental approach

C.

Implementing the program through the enterprise's change plan

D.

Aligning the program to the business requirements

Full Access
Question # 57

Which of the following aspects of the transition from X-rays to digital images would be BEST addressed by implementing information security policy and procedures?

A.

Establishing data retention procedures

B.

Training technicians on acceptable use policy

C.

Minimizing the impact of hospital operation disruptions on patient care

D.

Protecting personal health information

Full Access
Question # 58

An enterprise is developing several consumer-based services using emerging technologies involving sensitive personal data. The CIO is under pressure to ensure the enterprise is first to market, but security scan results have not been adequately addressed. Reviewing which of the following will enable the CIO to make the BEST decision for the customers?

A.

Acceptable use policy

B.

Risk register

C.

Ethics standards

D.

Change management policy

Full Access
Question # 59

Which of the following is the BEST indicator of effective IT governance?

A.

Regulatory authorities have given a favorable report on IT controls.

B.

Executive management is involved in important IT decisions and activities.

C.

The chief information security officer (CISO) reports to a board member.

D.

IT management is proactive in reporting IT project status to executive management.

Full Access
Question # 60

Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?

A.

A risk register

B.

Budget allocation

C.

Replicated systems

D.

Defined roles

Full Access
Question # 61

Which of the following roles has PRIMARY accountability for the security related to data assets?

A.

Database administrator

B.

Data owner

C.

Data analyst

D.

Security architect

Full Access
Question # 62

Which of the following is the MOST important driver of IT governance?

A.

Effective internal controls

B.

Management transparency

C.

Quality measurement

D.

Technical excellence

Full Access
Question # 63

An ongoing project is on track according to project plan. However, a recent regulation change will have a major impact to the project. The project sponsor's NEXT step should be to:

A.

Seek exemption from the appropriate regulatory body

B.

Perform an impact analysis and update the business case

C.

Submit the project to the IT steering committee for reapproval

D.

Rescope the project to remove work impacted by the regulation

Full Access
Question # 64

Which of the following is MOST likely to have a negative impact on

accountability for information risk ownership?

A.

The risk owner is a department manager, and the control owner is a member of the risk owner's staff.

B.

Information risk is assigned to a department, and an individual owner has not been assigned.

C.

The risk owner and the control owner of the information do not work in the same department.

D.

The same person is listed as both the control owner and the risk owner for the information.

Full Access
Question # 65

When a shortfall of IT resources is identified, the FIRST course of action is to;

A.

perform a business impact analysis (BIA).

B.

reallocate the budget to close the gap in resources.

C.

reduce business requirements.

D.

negotiate best pricing for contracted resources.

Full Access
Question # 66

Of the following, who is responsible for the achievement of IT strategic objectives?

A.

IT steering committee

B.

Business process owners

C.

Chief information officer (CIO)

D.

Board of directors

Full Access
Question # 67

When reporting key risk indicators (KRIs) to the board, what information BEST enables risk-based decision-making?

A.

Risk appetite, risk threshold, and risk tolerance

B.

Classification of current business risk

C.

Emerging industry risk trends and benchmarks

D.

Costs and resource needs related to risk mitigation measures

Full Access
Question # 68

An enterprise has an ongoing issue of corporate applications not delivering the expected benefits due to missing key functionality. As a result, many groups are using spreadsheets and databases instead of approved enterprise applications to store and manipulate information. Which of the following will BEST improve the success rate of future IT initiatives?

A.

Engage the business user community in acceptance testing Of acquired applications.

B.

Engage stakeholders to identify and validate business requirements.

C.

Establish a process for risk and value management.

D.

Prohibit the use of non-approved alternate software solutions.

Full Access
Question # 69

An enterprise’s IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

A.

Business to help define IT goals.

B.

IT and business to define risks.

C.

Business to fund IT services.

D.

IT to define business objectives.

Full Access
Question # 70

Which of the following provides the STRONGEST indication that IT governance is well established within an organizational culture?

A.

Benefits of IT governance are realized throughout the organization.

B.

There is awareness of IT metrics throughout the organization.

C.

IT governance defines how IT projects should be assessed.

D.

IT performance metrics are defined in the balanced scorecard.

Full Access
Question # 71

An enterprise is required to implement several regulatory requirements. Which of the following functions is BEST suited to determine compliance priorities?

A.

Legal counsel

B.

The IT risk department

C.

The audit department

D.

Business units

Full Access
Question # 72

An enterprise is assessing whether to utilize wearable technology. The enterprise has no prior experience with this technology and has asked the chief technology officer (CTO) to assess the impact to the enterprise. The CTO should FIRST:

A.

understand the enterprise’s risk tolerance.

B.

create an IT risk scorecard.

C.

prioritize wearable technology risk.

Full Access
Question # 73

An enterprise has made the strategic decision to begin a global expansion program which will require opening sales offices in countries across the world. Which of the following should be the FIRST consideration with regard to the IT service desk which will remain centralized?

The effect of regional differences On service delivery

Identification of IT service desk functions that can be outsourced

A.

Enforcement Of a standardized policy across all regions

B.

Availability of adequate resources to provide support for new users

Full Access
Question # 74

Which of the following is the BEST way to address the risk associated with new IT investments?

A.

Develop security best practices to protect applications.

B.

Integrate security requirements at the beginning of projects

C.

Establish an enterprise-wide incident response process.

D.

Implement an enterprise-wide security awareness program.

Full Access
Question # 75

An enterprise is concerned about the community impact of its data center noise levels. Which of the following is the enterprise’s BEST course of action?

A.

Proactively reduce after-hours operations

B.

Pursue acquisition of surrounding properties

C.

Wait for a formal complaint to be filed

D.

Seek input from appropriate stakeholders

Full Access
Question # 76

Which of the following is the MOST important reason that IT strategic planning processes need to be adequately documented and communicated?

A.

To justify spending on IT projects

B.

To promote transparency to stakeholders

C.

To ensure other departments are aligned with the direction set by IT

D.

To inform business units of IT department achievements

Full Access
Question # 77

When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?

A.

Standardization

B.

Replication

C.

Segregation

D.

Sanitization

Full Access
Question # 78

A small enterprise has just hired its first CIO, who has been tasked with making the IT department more efficient. What should be the CIO's NEXT step after identifying several new improvement initiatives?

A.

Mandate IT staff training.

B.

Request an IT balanced scorecard.

C.

Require a cost-benefit analysis.

D.

Allocate funding for the initiatives.

Full Access
Question # 79

An enterprise's service center is experiencing long delays in fulfilling! T service requests and very low customer satisfaction. The BEST way to determine if staff competency is the root cause of these performance problems is to compare required staff competencies with:

A.

certification requirements.

B.

current skills inventory.

C.

training program completions.

D.

hiring and staffing practices.

Full Access
Question # 80

Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?

A.

Poor desktop service delivery

B.

Data retention

C.

Redundant systems

D.

Poor business decisions

Full Access
Question # 81

A large organization with branches across many countries is in the midst of an enterprise resource planning (ERP) transformation. The IT organization receives news that the branches in a country where the impact to the enterprise is to be greatest are being sold. What should be the NEXT step?

A.

Update the ERP business case and re-evaluate the ROI.

B.

Cancel the ERP transformation and re-allocate project funds.

C.

Adjust the ERP implementation plan and budget.

D.

Continue with the ERP migration according to plan.

Full Access
Question # 82

Which of the following is the BEST way to ensure new systems can be adequately supported once in production?

A.

Establish a resource management framework.

B.

Evaluate the operational requirements of the business stakeholders.

C.

Identify key performance indicators (KPIs).

D.

Require operational management be identified in the business case.

Full Access
Question # 83

An enterprise plans to expand into new markets in countries lacking data privacy regulations, increasing risk exposure. Which of the following is the BEST course of action for the CIO?

A.

Identify business risk appetite and tolerance levels.

B.

Quantify the risk impact and evaluate possible countermeasures.

C.

Limit the personal data available to the high-risk countries.

D.

Mandate the strengthening of user access controls.

Full Access
Question # 84

Senior management wants to expand offshoring to include IT services as other types of business offshoring have already resulted in significant financial benefits for the enterprise. The CIO is currently midway through a successful five-year strategy that relies heavily on internal IT resources. What should the CIO do NEXT?

A.

Reevaluate the offshoring strategy.

B.

Abandon the current IT strategy.

C.

Continue with the existing IT strategy.

D.

Reevaluate the current IT strategy.

Full Access
Question # 85

Which of the following would BEST help to improve an enterprise's ability to manage large IT investment projects?

A.

Creating a change management board

B.

Reviewing and evaluating existing business cases

C.

Implementing a review and approval process for each phase

D.

Publishing the IT approval process online for wider scrutiny

Full Access
Question # 86

Which of the following should be the MAIN reason for an enterprise to implement an IT risk management framework?

A.

The need to enable IT risk-aware decisions by executives

B.

The results of an external audit report concerning IT risk management processes.

C.

The need to address market regulations and internal compliance in IT risk

D.

The ability to benchmark IT risk policies against major competitors

Full Access
Question # 87

Which of the following is the MOST comprehensive method to report on overall IT performance to the board of directors?

A.

Balanced scorecard

B.

Net present value (NPV)

C.

Performance-based payments

D.

Return on investment (ROI)

Full Access
Question # 88

An enterprise plans to implement a business intelligence (Bl) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

A.

Interface issues between enterprise and Bl applications

B.

Large volumes of data fed from enterprise applications

C.

The need for staff to be trained on the new Bl tool

D.

Data definition and mapping sources from applications

Full Access
Question # 89

IT has launched new portfolio management policies and processes to improve the alignment of IT projects with enterprise goals. The latest audit report indicates that no improvement has been made due to confusion in the decision-making process. Which of the following is the BEST course of action for the CIO?

A.

Deliver prioritization and facilitation training.

B.

Implement a performance management framework.

C.

Create an IT portfolio management risk framework.

D.

Develop and communicate an accountability matrix.

Full Access
Question # 90

A board of directors is concerned that a major IT implementation has the potential to significantly disrupt enterprise operations. Which of the following would be MOST helpful in identifying the extent of the potential impact of the disruption?

A.

An analysis of the current enterprise risk appetite

B.

An earned value analysis (EVA) of the implementation

C.

A risk assessment of the implementation

D.

A review of lessons learned from previous implementations

Full Access
Question # 91

An enterprise experiencing issues with data protection and least privilege is implementing enterprise-wide data encryption in response. Which of the following is the BEST approach to ensure all business units work toward remediating these issues?

A.

Develop key performance indicators (KPIs) to measure enterprise adoption.

B.

Integrate data encryption requirements into existing and planned projects.

C.

Assign owners for data governance initiatives.

D.

Mandate the creation of a data governance framework.

Full Access
Question # 92

Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?

A.

Significant gaps are present m the incident documentation.

B.

The incident was not logged in the ticketing system.

C.

Response decisions were made without consulting the appropriate authority.

D.

Response efforts had to be outsourced due to insufficient internal resources.

Full Access
Question # 93

Which of the following is an ADVANTAGE of using strategy mapping?

A.

It provides effective indicators of productivity and growth.

B.

It depicts the maturity levels of processes that support organizational strategy.

C.

It identifies barriers to strategic alignment and links them to specific outcomes.

D.

It depicts the cause-and-effect linked relationships between strategic objectives.

Full Access
Question # 94

A rail transport company has the worst on-time arrival record in the industry due to an antiquated IT system that controls scheduling. Despite employee resistance, an initiative lo upgrade the technology and related processes has been approved. To maximize employee engagement throughout the project, which of the following should be in place prior to the start of the initiative?

A.

Procurement management plan

B.

Organizational change management plan

C.

Risk response plan

D.

Resource management plan

Full Access
Question # 95

An IT audit report indicates that a lack of IT employee risk awareness is creating serious security issues in application design and configuration. Which of the following would be the BEST key risk indicator (KRI) to show progress in IT employee behavior?

A.

Number of IT employees attending security training sessions

B.

Results of application security testing

C.

Number of reported security incidents

D.

Results of application security awareness training quizzes

Full Access
Question # 96

Which of the following is MOST important for an IT strategy committee to ensure before initiating the development of an IT strategic plan?

A.

Committee members are apprised of business needs

B.

A risk assessment has been conducted.

C.

Committee members are independent from business units.

D.

IT initiatives are fully supported by the business.

Full Access
Question # 97

Which of the following should be done FIRST when designing an IT balanced scorecard?

A.

Develop key performance indicators (KPIs).

B.

Communicate to stakeholders

C.

Analyze the business strategy.

D.

Review the IT resource plan.

Full Access
Question # 98

What should be an IT steering committee's FIRST course of action when an enterprise is considering establishing a virtual reality store to sell its products?

A.

Request a resource gap analysis.

B.

Request development of key risk indicators (KRIs).

C.

Request a threat assessment.

D.

Request a cost-benefit analysis.

Full Access
Question # 99

When establishing a risk management process which of the following should be the FIRST step?

A.

Determine the probability of occurrence

B.

Identify threats

C.

Identify assets

D.

Assess risk exposures

Full Access
Question # 100

Of the following, who should be responsible for ensuring the regular review of quality management performance against defined quality metrics?

A.

Process owners

B.

Risk management team

C.

Internal auditors

D.

Executive management

Full Access
Question # 101

An enterprise has decided to implement an enterprise resource planning (ERP) system to achieve operating and cost efficiencies through global IT standardization. The business units are resistant because they are used to operating autonomously. The CEO has instructed the CIO to move quickly with the implementation to force acceptance with business unit leaders. Which of the following should be the ClO's FIRST step?

A.

Build a governance framework for identifying non-standard processes.

B.

Request funding from the CEO to hire ERP consultants.

C.

Ask the CEO to be the sponsor of the program

D.

Engage a reluctant business unit to conduct a proof-of-concept pilot.

Full Access
Question # 102

Which of the following should be the PRIMARY goal of implementing an IT strategic planning process?

A.

Determining benefits from IT deployments

B.

Optimizing IT resources to drive innovation

C.

Directing business strategy to achieve goals

D.

Translating business needs into IT initiatives

Full Access
Question # 103

Which of the following should be the PRIMARY basis for establishing categories within an information classification scheme?

A.

Information architecture

B.

Industry standards

C.

Information security policy

D.

Business impact

Full Access
Question # 104

An enterprise has lost an unencrypted backup tape of archived customer data. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?

A.

Initiate disciplinary proceedings against relevant employees.

B.

Mandate a review of backup tape inventory procedures.

C.

Communicate the breach to customers.

D.

Require an evaluation of storage facility vendors.

Full Access
Question # 105

Which of the following should be the MOST important consideration for a hospital planning to use cloud services and mobile applications?

A.

Privacy requirements

B.

Data classification

C.

Acceptable use policy

D.

Internet connectivity

Full Access
Question # 106

An IT steering committee has received a report that supports the economic and service benefits of moving infrastructure hosting to an external cloud provider. Business leadership is very concerned about the security risk and potential loss of customer data. What is the BEST way for the committee to address these concerns?

A.

Mandate there will be no customer data at rest stored on cloud servers used by the vendor.

B.

Include compliance with the enterprise's data governance policy in the contract.

C.

Ensure reporting and penalty clauses are included in the contract for any loss of data.

D.

Require an encrypted connection between the cloud and enterprise servers.

Full Access
Question # 107

Following a re-prioritization of business objectives by management, which of the following should be performed FIRST to allocate resources to IT processes?

A.

Perform a maturity assessment.

B.

Implement a RACI model.

C.

Refine the human resource management plan.

D.

Update the IT strategy.

Full Access
Question # 108

Which of the following roles should be responsible for data normalization when it is found that a new system includes duplicates of data items?

A.

Business system owner

B.

Data steward

C.

Database administrator (DBA)

D.

Application manager

Full Access
Question # 109

An enterprise is trying to increase the maturity of its IT process from being ad hoc to being repeatable. Which of the following is the PRIMARY benefit of this change?

A.

Process optimization is embedded across the organization.

B.

Required outcomes are mapped to business objectives.

C.

Process performance is measured in business terms.

D.

Required outcomes are more frequently achieved.

Full Access
Question # 110

During an IT strategy review, a new CIO determined that numerous important internal processes have not been updated for several years and should be reexamined. Which of the following would be the BEST approach to address this concern?

A.

Implement a process review policy.

B.

Assemble a project review team

C.

Verify that the processes are still needed

D.

Map the processes to a capability maturity model.

Full Access
Question # 111

An IT steering committee is presented with an audit finding that new software applications are delivered on time but consistently have unacceptable levels of defects. Which of the following would be the BEST direction from the committee?

A.

Implement performance indicators.

B.

Evaluate the change management process.

C.

Establish code peer reviews.

D.

Evaluate the quality assurance process.

Full Access
Question # 112

Which of the following would be the BEST way to facilitate the adoption of strong IT governance practices throughout a multi-divisional enterprise?

A.

Ensuring each divisional policy is consistent with corporate policy

B.

Ensuring divisional governance fosters continuous improvement processes

C.

Mandating data standardization across the distributed enterprise

D.

Documenting and communicating key management practices across divisions

Full Access
Question # 113

An IT steering committee wants the enterprise's mobile workforce to use cloud-based file storage to save non-sensitive corporate data, removing the need for remote access to that information. Before this change is implemented, what should be included in the data management policy?

A.

A mandate for periodic employee training on how to classify corporate data files

B.

A mandate for the encryption of all corporate data files at rest that contain sensitive data

C.

A process for blocking access to cloud-based apps if inappropriate content is discovered

D.

A requirement to scan approved cloud-based apps for inappropriate content

Full Access
Question # 114

Which of the following is the MOST important benefit of developing an information architecture model consistent with enterprise strategy?

A.

It identifies information architecture priorities.

B.

It support and facilitates decision making.

C.

It enables information architecture roadmap updates.

D.

It optimizes information delivery and storage costs.

Full Access
Question # 115

A recent benchmarking analysis has indicated an IT organization is retaining more data and spending significantly more on data retention than its competitors. Which of the following would BEST ensure the optimization of retention costs?

A.

Requiring that all business cases contain data deletion and retention plans

B.

Revalidating the organization's risk tolerance and re-aligning the retention policy

C.

Moving all high-risk and medium-risk data backups to cloud storage

D.

Redefining the retention policy to align with industry best practices

Full Access
Question # 116

An enterprise has identified potential environmental disasters that could occur in the area where its data center is located. Which of the following should be done NEXT?

A.

Implement an early warning detection and notification system.

B.

Assess the likelihood and impact on the data center.

C.

Relocate the data center to minimize the threat.

D.

Assess how the data center is protected against the threat.

Full Access
Question # 117

Which of the following is MOST important when an IT-enabled business initiative involves multiple business functions?

A.

Defining cross-departmental budget allocation

B.

Conducting a systemic risk assessment

C.

Developing independent business cases

D.

Establishing a steering committee with business representation

Full Access
Question # 118

A healthcare enterprise that is subject to strict compliance requirements has decided to outsource several key IT services to third-party providers. Which of the following would be the BEST way to assess compliance and avoid reputational damage?

A.

Require quarterly reports from the providers demonstrating compliance.

B.

Require documentation that the providers have adequate controls in place.

C.

Exercise the right to perform an audit.

D.

Impose monetary penalties for noncompliance.

Full Access
Question # 119

The CEO of a large enterprise has announced me commencement of a major business expansion that will double the size of the organization. IT will need to support the expected demand expansion. What should the CIO do FIRST?

A.

Review the resource utilization matrix.

B.

Recruit IT resources based on the expansion decision.

C.

Embed IT personnel in the business units.

D.

Update the IT strategic plan to align with the decision.

Full Access
Question # 120

The MOST important aspect of an IT governance framework to ensure that IT supports repeatable business processes is:

A.

earned value management.

B.

quality management,

C.

resource management.

D.

risk management

Full Access
Question # 121

In a large enterprise, which of the following is the MOST effective way to understand the business activities associated with the enterprise's information architecture?

A.

Reviewing IT design with business process managers

B.

Reviewing business strategy with senior management

C.

Mapping business processes within a framework

D.

Aligning business objectives to organizational strategy

Full Access
Question # 122

Which of the following would be the BEST way to facilitate the successful adoption of a new technology across the enterprise?

A.

Ensure the use of a business case

B.

Review business goals.

C.

Establish an IT balanced scorecard.

D.

Highlight the risk the new technology will address.

Full Access
Question # 123

What is the BEST criterion for prioritizing IT risk remediation when resource requirements are equal?

A.

Deviation from IT standards

B.

IT strategy alignment

C.

IT audit recommendations

D.

Impact on business

Full Access
Question # 124

Which of the following would be MOST helpful to an enterprise that wants to standardize how sensitive corporate data is handled?

A.

Information classification framework

B.

Enterprise risk policy

C.

Enterprise risk management (ERM) framework

D.

Information security policy

Full Access
Question # 125

An enterprise is determining the objectives for an IT training improvement initiative from a governance prosected. it would be MOST important to ensure that:

A.

policies and processes address both enterprise requirements and professional growth

B.

courses of instruction that will maximize employee productivity are identified

C.

several different training strategies are created for final approval by the CIO

D.

IT employees are surveyed and interviewed to identify development needs

Full Access
Question # 126

The MOST effective way to ensure that IT supports the agile needs of an enterprise is to:

A.

perform process modeling.

B.

outsource infrastructure management.

C.

develop a robust enterprise architecture (EA).

D.

implement open-source systems.

Full Access
Question # 127

Which of the following IT governance actions would be the BEST way to minimize the likelihood of IT failures jeopardizing the corporate value of an IT-dependent organization?

A.

Implement an IT risk management framework.

B.

Install an IT continuous monitoring solution.

C.

Define IT performance management measures.

D.

Benchmark IT strategy against industry peers.

Full Access
Question # 128

Which of the following is the BEST way to maximize the value of an enterprise’s information asset base?

A.

Seek additional opportunities to leverage existing information assets.

B.

Facilitate widespread user access to all information assets

C.

Regularly purge information assets to minimize maintenance costs

D.

Implement an automated information management platform

Full Access
Question # 129

Following a strategic planning session, new IT objectives were announced. Which of the following is the MOST effective way for the CIO to ensure these objectives are cascaded to IT personnel?

A.

Communicate the new IT objectives during a staff meeting.

B.

Define individual performance measures related to the IT objectives.

C.

Establish IT management's performance measures based on the IT objectives.

D.

Update the IT balanced scorecard to align with the new IT objectives.

Full Access
Question # 130

Reviewing which of the following should be the FIRST step when evaluating the possibility of outsourcing an IT system?

A.

Outsourcing strategy

B.

Outsourced business processes

C.

Service level agreements (SLAs)

D.

IT staff skill sets

Full Access
Question # 131

The PRIMARY objective of promoting business ethics within the IT enterprise should be to ensure:

A.

trust among internal and external stakeholders.

B.

employees act more responsibly.

C.

corporate social responsibility.

D.

legal and regulatory compliance.

Full Access
Question # 132

Which of the following is the MOST important aspect of business ethics?

A.

Ensuring fair and consistent vendor management practices

B.

Providing equal opportunities to employees

C.

Protecting stakeholders' interests

D.

Complying with legal and regulatory requirements

Full Access
Question # 133

An IT steering committee is evaluating whether a third-party supplier is delivering the correct level of service Reviewing which of the following will provide the BEST information to the committee?

A.

Key performance indicators (KPIs)

B.

Service portfolio management

C.

Vendor status reports

D.

Operational cost reduction reports

Full Access
Question # 134

An enterprise has decided to execute a risk self-assessment to identify improvement opportunities for current IT services. Which of the following is MOST important to address in the assessment?

A.

Related business risk

B.

Residual IT risk

C.

Mapping of business objectives to IT risk

D.

IT capability and performance measures

Full Access
Question # 135

An enterprise is about to complete a major acquisition, and a decision has been made that both companies will be using the parent company's IT infrastructure. Which of the following should be done NEXT?

A.

Update the enterprise architecture (EA).

B.

Perform a business impact analysis (BIA.

C.

Conduct a gap analysis.

D.

Develop a communication plan to support the merger.

Full Access
Question # 136

Which of the following would BEST help a CIO enhance the competencies of an IT business analytics team?

A.

Understanding current staff skill sets and identifying gaps

B.

Creating operational processes and identifying resources

C.

Defining the IT architecture and identifying training areas

D.

Establishing team goals and identifying the proper structure

Full Access
Question # 137

The BEST way to decide how to prioritize issues identified in an IT risk and control self-assessment (CSA) is to understand the risk and:

A.

impact to the enterprise.

B.

criticality of IT services affected.

C.

number of IT systems affected.

D.

funds required for remediation.

Full Access
Question # 138

Which of the following is a PRIMARY responsibility of the CIO when an enterprise plans to replace its enterprise resource applications?

A.

Reviewing the IT application portfolio

B.

Evaluating and selecting application vendors

C.

Ensuring IT architecture requirements are considered

D.

Establishing software quality criteria

Full Access
Question # 139

Which of the following is the BEST indication that information security requirements are taken into consideration when developing IT processes?

A.

The database is deployed in a distributed processing platform

B.

The information architecture incorporates data classification

C.

Customer profiles are stored with a domestic service provider

D.

The integrity of sensitive information is periodically reviewed

Full Access
Question # 140

Which of the following BEST supports an enterprise's ability to comply with privacy laws and regulations?

A.

Complete inventory of enterprise data

B.

Implementation of a breach notification process

C.

Accurate classification of enterprise data

D.

Robust enterprise policy related to data retention

Full Access
Question # 141

Which of the following should be the PRIMARY governance objective for selecting key risk indicators (KRIs) related to legal and regulatory compliance?

A.

Identifying the risk of noncompliance

B.

Demonstrating sound risk management practices

C.

Measuring IT alignment with enterprise risk management (ERM)

D.

Ensuring the effectiveness of IT compliance controls

Full Access
Question # 142

Which of the following is the MOST important consideration when developing a new IT service'?

A.

Return on investment (ROI)

B.

Resource requirements.

C.

Service level agreements (SLAs)

D.

Economies of scale

Full Access
Question # 143

Which of the following is MOST important to consider when planning to implement a cloud-based application for sharing documents with internal and external parties?

A.

Cloud implementation model

B.

User experience

C.

Information ownership

D.

Third-party access rights

Full Access
Question # 144

An IT strategy committee has reviewed an audit report indicating sales employees are using personal smartphones to conduct corporate business. Although the committee appreciates the business benefits, it is also concerned with the security risk. To deliver the business benefit, what should be the committee's FIRST recommendation?

A.

Document procedures for securing personal devices.

B.

Improve training courses on securing corporate information.

C.

Perform a risk assessment on personal device data protection.

D.

Update the corporate security policy to include personal devices.

Full Access
Question # 145

When developing an IT training plan, which of the following is the BEST way to ensure that resource skills requirements are identified?

A.

Extract training requirements from deficiencies reported in customer service satisfaction surveys.

B.

Ask managers to determine IT training requirements annually.

C.

Determine training needs based on the capabilities to support the IT strategy.

D.

Survey employees for IT skills requirements based upon technology trends.

Full Access
Question # 146

Which of the following is MOST important for IT governance to have in place to ensure the enterprise can maintain operations during extensive system downtime?

A.

Fault-tolerant hardware

B.

An incident response plan

C.

A crisis communications plan

D.

A business continuity plan (BCP)

Full Access
Question # 147

The MAIN responsibility of the board of directors regarding the management of enterprise risk is to:

A.

ensure a risk process exists which addresses the risk appetite.

B.

sustain investment in staff training regarding IT risk.

C.

promote a benefits-driven culture throughout the enterprise.

D.

maintain awareness of IT risk to the business.

Full Access
Question # 148

Facing financial struggles, a CEO mandated severe budget cuts. A decision was also made to immediately change the enterprise strategic focus to put more reliance on mobile, cloud, and wireless services in an effort to boost revenue. The IT steering committee has asked the CIO tosuggest adjustments to the current IT project portfolio to allow support for the new direction despite fewer funds. What should the CIO advise the committee to do FIRST?

A.

Ask business stakeholders to discuss their vision for the new strategy.

B.

Cancel projects with a net present value (NPV) below a defined threshold.

C.

Conduct a risk assessment against the potential new services.

D.

Start re-allocating budget to projects involving mobile or cloud.

Full Access
Question # 149

An enterprise's global IT program management office (PMO) has recently discovered that several IT projects are being run within a specific region without knowledge of the PMO. The projects are on time, on budget, and will deliver the proposed benefits to the specific region. Which of the following should be the PRIMARY concern of the PMO?

A.

Inability to reduce the impact to the risk level of the global portfolio

B.

Projects may not follow system development life cycle (SDLC)

C.

Lack of control and impact to the overall PMO budget

Full Access
Question # 150

A data governance strategy has been defined by the IT strategy committee which includes privacy objectives related to access controls, authorized use. and data collection. Which of the following should the committee do NEXT?

A.

Mandate data privacy training for employees.

B.

Establish a data privacy budget

C.

Perform a data privacy impact assessment.

D.

Mandate the creation of a data privacy policy.

Full Access
Question # 151

What is the BEST way for an IT governance board to establish standards of behavior for the adoption of artificial intelligence (Al)?

A.

Direct the creation and approval of an ethical use policy.

B.

Review and update the data privacy policy to align with industry standards.

C.

Include specific ethics clauses in vendor agreements and contracts.

D.

Include ethics topics within onboarding and awareness training.

Full Access
Question # 152

Which of the following would a CIO use to present the overall view of IT performance to the board of directors?

A.

Balanced scorecard

B.

Key risk indicators (KRIs)

C.

Maturity model

D.

Key performance indicators (KPIs)

Full Access
Question # 153

After shifting from lease to purchase of IT infrastructure and software licenses, an enterprise has to pay for unexpected lease extensions causing significant cost overruns. The BEST direction for the IT steering committee would be to establish;

A.

an end-of-life program to remove aging infrastructure from the environment.

B.

budget cuts to compensate for the cost overruns.

C.

a program to annually review financial policy on overruns.

D.

a policy to consider total cost of ownership (TCO) in investment decisions.

Full Access
Question # 154

A project sponsor has circumvented the request for proposal (RFP) selection process. Which of the following is the MOST likely reason for this control gap?

A.

Inadequate stage-gate reviews

B.

Inadequate board oversight

C.

Lack of accountability for policy adherence

D.

Lack of a legal and regulatory review process

Full Access
Question # 155

When evaluating the process for acquiring third-party IT resources, management identified several suppliers with repeated downtime issues impacting the enterprise. Which of the following is the BEST approach to help ensure future service delivery in accordance with business objectives?

A.

Establish key performance indicators (KPls)

B.

Appoint a procurement oversight committee

C.

Establish key risk indicators (KRIs).

D.

Implement contract monitoring.

Full Access
Question # 156

Which of the following should senior management do FIRST when developing and managing digital applications for a new enterprise?

A.

Establish an architecture review board.

B.

Define the risk appetite

C.

Develop key risk indicators (KRIs).

D.

Implement a sourcing program.

Full Access
Question # 157

Which of the following would be MOST useful for prioritizing IT improvement initiatives to achieve desired business outcomes?

A.

Budget variance analysis

B.

Enterprise architecture (EA)

C.

IT skills matrix

D.

Portfolio management

Full Access
Question # 158

Right-to-audit clauses are intended to ensure the vendor:

A.

aligns staff skill sets adequately.

B.

maintains adequate budget for risk management.

C.

addresses compliance requirements.

D.

optimizes IT operations for service delivery

Full Access
Question # 159

Which of the following is the BEST indication that enterprise value is being derived from IT?

A.

IT strategy supports continuous improvement initiatives

B.

Metrics are established for IT performance.

C.

Rate of return for projects is achieved.

D.

IT services enable business strategy.

Full Access
Question # 160

Which of the following is the BEST way to implement effective IT risk management?

A.

Align with business risk management processes.

B.

Establish a risk management function.

C.

Minimize the number of IT risk management decision points.

D.

Adopt risk management processes.

Full Access
Question # 161

A root-cause analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators. Who should be accountable for resolving the situation?

A.

HR training director

B.

HR recruitment manager

C.

Chief information officer

D.

(CIO) Business process owner

Full Access
Question # 162

Which of the following is the GREATEST benefit of using a quantitative risk assessment method?

A.

It uses resources more efficiently

B.

It can be used to assess risks against non-tangible assets

C.

It reduces subjectivity

D.

It helps in prioritizing risk response action plans

Full Access
Question # 163

Which of the following IT governance practices would BEST support IT and enterprise strategic alignment?

A.

An IT communication plan is continuously updated

B.

External consultants regularly review the IT portfolio

C.

Senior management regularly reviews the IT portfolio

D.

IT service level agreements (SLAs) are periodically updated

Full Access
Question # 164

An enterprise's decision to move to a virtualized architecture will have the GREATEST impact on:

A.

system life cycle management.

B.

asset classification.

C.

vendor management

D.

vulnerability management.

Full Access
Question # 165

The CIO of a large enterprise has taken the necessary steps to align IT objectives with business objectives. What is the BEST way for the CIO to ensure these objectives are delivered effectively by IT staff?

A.

Map the IT objectives to an industry-accepted framework.

B.

Enhance Ihe budget for training based on the IT objectives.

C.

Include the IT objectives in staff performance plans.

D.

Include CIO sign-off of the objectives as part of the IT strategic plan.

Full Access
Question # 166

Which of the following would be the BEST way for an IT steering committee to monitor the adoption of a new enterprise IT strategy?

A.

Establish key performance indicators (KPIs).

B.

Establish key risk indicators (KRIs).

C.

Schedule ongoing audit reviews.

D.

Implement service level agreements (SLAs)

Full Access
Question # 167

Which of the following is MOST important for an enterprise to review when classifying information assets?

A.

Procedures for information handling

B.

Requirements for information retention.

C.

Media used for storage and backup

D.

Impact of information exposure

Full Access
Question # 168

An internal audit revealed a widespread perception that the enterprise's IT governance reporting lacks transparency Which of the following should the CIO do FIRST?

A.

Add stakeholder transparency metrics to the balanced scorecard

B.

Develop a communication and awareness strategy

C.

Meet with key stakeholders to understand their concerns

D.

Adopt an industry-recognized template to standardize reports.

Full Access
Question # 169

Which of the following is MOST important to document for a business ethics program?

A.

Guiding principles and best practices

B.

Violation response matrix

C.

Whistle-blower protection protocols.

D.

Employee awareness and training content

Full Access
Question # 170

Which of the following should a new CIO do FIRST to ensure information assets are effectively governed?

A.

Quantify the business value of information assets

B.

Perform an information gap analysis

C.

Review information classification procedures

D.

Evaluate information access methods

Full Access
Question # 171

An enterprise has developed a new digital strategy to improve fraud detection. Which of the following is MOST important to consider when updating the information architecture?

A.

Resource constraints related to implementing the digital strategy.

B.

The business use cases supporting the digital strategy

C.

Changes to the legacy business and data architectures

D.

The history of fraud incidents and their root causes

Full Access
Question # 172

To enable IT to deliver adequate services and maintain availability of a web-facing infrastructure, an IT governance committee should FIRST establish:

A.

web operations procedures.

B.

business continuity plans (BCPs).

C.

key performance indicators (KPIs).

D.

customer survey processes.

Full Access
Question # 173

An enterprise-wide strategic plan has been approved by the board of directors. Which of the following would BEST support the planning of IT investments required for the enterprise?

A.

Service-oriented architecture

B.

Enterprise architecture (EA)

C.

Contingency planning

D.

Enterprise balanced scorecard

Full Access
Question # 174

A large enterprise has been experiencing high turnover of skilled IT personnel, resulting in a significant loss of knowledge within the IT department. Which of the following is the BEST governance action to address this concern?

A.

Update the IT resource management plan.

B.

Revise IT strategic objectives.

C.

Update IT employee compensation packages.

D.

Mandate the use of employee contracts.

Full Access
Question # 175

Which of the following is MOST important to review during IT strategy development?

A.

Industry best practices

B.

IT balanced scorecard

C.

Current business environment

D.

Data flows that indicate areas requiring IT support

Full Access
Question # 176

Which of the following is the BEST way to ensure the continued usefulness of IT governance reports for stakeholders?

A.

Conduct quarterly audits and adjust reporting based on findings.

B.

Establish a standard process for providing feedback.

C.

Rely on IT leaders to advise when adjustments should be made.

D.

Issue frequent service level satisfaction surveys.

Full Access
Question # 177

The BEST way to manage continuous improvement of governance-related processes is to:

A.

assess existing process resource capacities.

B.

define accountability based on roles and responsibilities.

C.

apply effective quality management practices.

D.

require third-party independent reviews.

Full Access
Question # 178

Which of the following are PRIMARY factors in ensuring the success of an enterprise quality assurance program?

A.

Enterprise risk appetite and tolerance

B.

Risk management and control frameworks

C.

Continuous improvement plans

D.

A process maturity framework and documented procedures

Full Access
Question # 179

Before an IT strategy committee can approve an IT risk assessment framework, which of the following is MOST important to have established?

A.

An enterprise risk mitigation strategy

B.

Leading and lagging risk indicators

C.

IT performance metrics and standards

D.

Enterprise definitions for risk impact and probability

Full Access
Question # 180

What is the PRIMARY objective for performing an IT due diligence review prior to the acquisition of a competitor?

A.

Document the competitor's governance structure.

B.

Ensure that the competitor understands significant IT risks.

C.

Assess the status of the risk profile of the competitor.

D.

Determine whether the competitor is using industry-accepted practices.

Full Access
Question # 181

As the required core competencies of the IT workforce are anticipated and identified, what is the NEXT step in strengthening the department's human resource assets?

A.

Develop a responsible, accountable, consulted, and informed (RACI) chart.

B.

Create an effective recruitment, retention, and training program.

C.

Commit to the board performance metrics and bonus structure.

D.

Develop personnel requirements for third-party assurance.

Full Access
Question # 182

To reduce the risk of reputational damage through inappropriate use of social media by employees outside of the workplace, the enterprise approach regarding social media should PRIMARILY focus on;

A.

implementing preventative controls.

B.

developing policies on social media.

C.

implementing a review of processes utilizing social media.

D.

ensuring each use of social media is approved by management.

Full Access
Question # 183

A strategic systems project was implemented several months ago. Which of the following is the BEST reference for the IT steering committee as they evaluate its level of success?

A.

Stakeholder satisfaction surveysB The project's net present value (NPV)

B.

The project's business case

C.

Operating metrics of the new system

Full Access
Question # 184

Best practice states that IT governance MUST:

A.

enforce consistent policy across the enterprise.

B.

be applied in the same manner throughout the enterprise.

C.

apply consistent target levels of maturity to processes.

D.

be a component of enterprise governance.

Full Access
Question # 185

Which of the following BEST reflects mature risk management in an enterprise?

A.

A regularly updated risk register

B.

Ongoing risk assessment

C.

Ongoing investment in risk mitigation

D.

Responsive risk awareness culture

Full Access
Question # 186

Which of the following responsibilities should be retained within an enterprise when outsourcing a project management office (PMO) function?

A.

Selecting projects

B.

Managing projects

C.

Tracking project cost

D.

Defining project methodology

Full Access
Question # 187

Which of the following is the PRIMARY benefit of communicating the IT strategy across the enterprise?

A.

On-time and on-budget delivery of strategic projects

B.

Improvement in IT balanced scorecard performance

C.

Optimization of IT investment in supporting business objectives

D.

Reduced organizational resistance during strategy execution

Full Access
Question # 188

An enterprise has a zero-tolerance policy regarding security. This policy is causing a large number of email attachments to be blocked and is a disruption to enterprise. Which of the following should be the FIRST governance step to address this email issue?

A.

Direct the development of an email usage policy.

B.

Obtain senior management input based on identified risk.

C.

Recommend business sign-off on the zero-tolerance policy.

D.

Introduce an exception process.

Full Access
Question # 189

An enterprise's information security function is making changes to its data retention and backup policies. Which of the following presents the GREATEST risk?

A.

Business data owners were not consulted.

B.

The new policies Increase the cost of data backups.

C.

Data backups will be hosted at third-party locations.

D.

The retention period for data backups is Increased.

Full Access
Question # 190

Which of the following is the PRIMARY benefit to an enterprise when risk management is practiced effectively throughout the organization?

A.

Decisions are made with an awareness of probability and impact.

B.

IT objectives and goals are aligned to business objectives and goals.

C.

Business opportunity losses are minimized.

D.

Innovative strategic initiatives are encouraged.

Full Access
Question # 191

Which of the following is the BEST method for making a strategic decision to invest in cloud services?

A.

Prepare a business case.

B.

Prepare a request for information (RFI),

C.

Benchmarking.

D.

Define a balanced scorecard.

Full Access
Question # 192

An enterprise is initiating efforts to improve system availability to mitigate IT risk to the business. Which of the following results would be MOST important to report to the CIO to measure progress?

A.

Incident severity and downtime trend analysis

B.

Probability and seventy of each IT risk

C.

Financial losses and bad press releases

D.

Customer and stakeholder complaints over time

Full Access
Question # 193

Which of the following is the BEST method to monitor IT governance effectiveness?

A.

Service level management

B.

Balanced scorecard

C.

Risk control self-assessment (CSA)

D.

SWOT analysis

Full Access
Question # 194

A large financial institution is considering outsourcing customer call center operations which will allow the chosen vendor to access systems from offshore locations. Which of the following represents the GREATEST risk?

A.

Inconsistent customer service and reporting

B.

Loss of data confidentiality

C.

Lack of network availability

D.

Inadequate business continuity planning

Full Access
Question # 195

An enterprise has had the same IT governance framework in place for several years. Currently, large and small capital projects go through the same architectural governance reviews. Despite repeated requests to streamline the review process for small capital projects, business units have received no response from IT. The business units have recently escalated this issue to the newly appointed GO. Which of the following should be done FIRST to begin addressing business needs?

A.

Create a central repository for the business to submit requests.

B.

Explain the importance of the IT governance framework.

C.

Assess the impact of the proposed change.

D.

Assign a project team to implement necessary changes.

Full Access
Question # 196

When determining the optimal IT service levels to support business, which of the following is MOST important?

A.

IT capacity utilization and availability.

B.

Cost/benefit to the business.

C.

Available IT budget.

D.

Business user requests

Full Access
Question # 197

When developing effective metrics for the measurement of solution delivery, it is MOST important to:

A.

establish project controls and monitoring objectives.

B.

perform an objective analysis of the project roadmap.

C.

establish the objectives and expected benefits.

D.

specify quantitative measures for solution delivery.

Full Access
Question # 198

A strategic IT-enabled investment is failing due to unforeseen technology problems. What should be the board of directors' FIRST course of action?

A.

Terminate the investment.

B.

Assess the business risk and options.

C.

Approve an investment budget increase.

D.

Revise the investment selection process.

Full Access
Question # 199

An IT strategy committee wants to ensure that a risk program is successfully implemented throughout the enterprise. Which of the following would BEST support this goal?

A.

A risk management framework

B.

Mandatory risk awareness courses for staff

C.

A risk recognition and reporting policy

D.

Commitment from senior management

Full Access
Question # 200

A board of directors wants to ensure the enterprise is responsive to changes in its environment that would directly impact critical business processes. Which of the following will BEST facilitate meeting this objective?

A.

Scheduling frequent threat analyses

B.

Monitoring key risk indicators (KRIs)

C.

Regularly reviewing the enterprise risk appetite

D.

Implementing a competitive intelligence tool

Full Access
Question # 201

Which of the following is the PRIMARY ongoing responsibility of the IT governance function related to risk?

A.

Responding to and controlling all IT risk events

B.

Communicating the enterprise risk management plan

C.

Ensuring IT risk management is aligned with business risk appetite

D.

Verifying that all business units have staff skilled at assessing risk

Full Access
Question # 202

A retail enterprise has cost reduction as its top priority. From a governance perspective, which of the following should be the MOST important consideration when evaluating different IT investment options?

A.

Support for increased sales

B.

Risk associated with each option

C.

Industry best practices

D.

Business value impact

Full Access
Question # 203

An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:

A.

for robust change management.

B.

for periodic service provider audits.

C.

for enterprise architecture (EA) updates.

D.

to qualify service providers.

Full Access
Question # 204

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Full Access
Question # 205

The CIO of an enterprise learns the payroll server of a competitor has been the victim of ransomware. To help plan for the possibility of ransomed corporate data, what should be the ClO's FIRST course of action?

A.

Require development of key risk indicators (KRls).

B.

Develop a policy to address ransomware.

C.

Request a targeted risk assessment.

D.

Back up corporate data to a secure location.

Full Access
Question # 206

Which of the following MUST be established before implementing an information architecture that restricts access to data based on sensitivity?

A.

Risk and control frameworks

B.

Probability and impact analysis

C.

Classification and ownership

D.

Security and privacy policies

Full Access
Question # 207

Risk management strategies are PRIMARILY adopted to:

A.

avoid risks for business and IT assets.

B.

take necessary precautions for claims and losses.

C.

achieve acceptable residual risk levels.

D.

achieve compliance with legal requirements.

Full Access