Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Isaca > Isaca Certification > CGEIT

CGEIT Certified in the Governance of Enterprise IT Exam Question and Answers

Question # 4

Which of the following metrics is MOST useful to ensure IT services meet business requirements?

A.

Number of discontinued business transformation programs

B.

Frequency Of IT services risk profile updates

C.

Frequency Of IT policy updates

D.

Number of business disruptions due to IT incidents

Full Access
Question # 5

An enterprise wants to implement metrics to monitor the performance of its IT portfolio. Whose input is MOST important to consider when establishing these metrics?

A.

Project management office (PMO).

B.

IT executives.

C.

The chief executive officer (CEO).

D.

Business unit stakeholders.

Full Access
Question # 6

An analysis of an organization s security breach is complete. The results indicate that the quality of the code used for updates to its primary customer-facing software has been declining and security flaws were introduced. The FIRST IT governance action to correct this problem should be to review:

A.

compliance with the user testing process.

B.

the change management control framework.

C.

the qualifications of developers to write secure code.

D.

the incident response plan.

Full Access
Question # 7

Which of the following is the BEST way for a CIO to ensure that the work of IT employees is aligned with approved IT directives?

A.

Mandate technical training related to the IT objectives.

B.

Have business leaders present their departments' objectives.

C.

Include relevant IT goals in individual performance objectives.

D.

Request a progress review of IT objectives by internal audit.

Full Access
Question # 8

A healthcare enterprise is procuring Internet of Things (IoT) devices to be used across its facilities. Which of the following is MOST important to establish before vendors are engaged to provide the devices?

A.

Product compliance criteria

B.

Patient training

C.

Physical security audits

D.

Vendor delivery timelines

Full Access
Question # 9

Which of the following BEST helps to ensure that IT standards will be consistently applied across the enterprise?

A.

Enterprise risk management (ERM) reviews.

B.

Mandatory systems development training.

C.

Business case reviews by the steering committee.

D.

Established enterprise architecture (EA) practices.

Full Access
Question # 10

The BEST way for a CIO to justify maintaining and supporting social media platforms is by demonstrating:

A.

how social media technology fits into the IT investment management process.

B.

that service level agreements (SLAs) for social media technologies have been met.

C.

the IT performance Of social media technologies.

D.

the value derived from investment in social media technologies.

Full Access
Question # 11

Which of the following is the BEST way for a CIO to assess the consistency of IT processes against industry benchmarks to determine where to focus improvement initiatives?

A.

Utilizing a capability maturity model

B.

Evaluating the current balanced scorecard

C.

Reviewing key performance measures

D.

Reviewing IT process audit results

Full Access
Question # 12

An enterprise has launched a digitization effort requiring a single view of customer information across all product lines. Which of the following should be done FIRST to enable this initiative?

A.

Develop funding estimates for integrating applications

B.

Modify the future state enterprise architecture (EA)

C.

Assess the current data standards that are in use for applications

D.

Audit the infrastructure architecture for integration points

Full Access
Question # 13

An enterprise's current business continuity plan (BCP) fails to consider many common crisis events. What would be MOST helpful to address this situation?

A.

Engage stakeholders in scenario development

B.

Review the root cause analysis

C.

Require further walk-through tests

D.

Review and update the crisis communication plan

Full Access
Question # 14

Which of the following is the BEST way for an IT steering committee to monitor the adoption of a new enterprise IT strategy?

A.

Implement service level agreements (SLAs).

B.

Establish key performance indicators (KPIs).

C.

Schedule ongoing audit reviews.

D.

Establish key risk indicators (KRIs).

Full Access
Question # 15

A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:

confirm process owners' acceptance of residual risk.

perform an internal and external network penetration test.

obtain IT security approval on security policy exceptions.

A.

benchmark policy against industry best practice.

Full Access
Question # 16

Which of the following BEST helps to ensure that IT policies are

aligned with organizational strategies?

A.

The policies are approved by the board of directors.

B.

The policies are developed using a top-down approach.

C.

The policies are updated annually.

D.

The policies are periodically audited.

Full Access
Question # 17

A regulatory audit of an IT department has identified discrepancies between processes described in the procedures and what is actually done by system administrators.

The discrepancies were caused by recent IT application changes. Which of the following would be the BEST way to prevent the recurrence of similar findings in the future?

A.

Assign the responsibility for periodic revisions and changes to process owners.

B.

Require each IT employee to confirm compliance with IT procedures on an annual basis.

C.

Include the update of documentation within the change management framework.

D.

Establish high-level procedures to minimize process changes.

Full Access
Question # 18

An IT team is having difficulty meeting new demands placed on the department as a result of a major and radical shift in enterprise business strategy. Which of the following is the ClO's BEST course of action to address this situation?

A.

Utilize third parties for non-value-added processes.

B.

Align the business strategy with the IT strategy.

C.

Review the current IT strategy.

D.

Review the IT risk appetite.

Full Access
Question # 19

An enterprise has learned of a new regulation that may impact delivery of one of its core technology services. Which of the following should be done FIRST?

A.

Request an action plan from the risk team.

B.

Determine whether the board wants to comply with the regulation.

C.

Update the risk management framework.

D.

Assess the risk associated with the new regulation.

Full Access
Question # 20

Which of the following will BEST enable an enterprise to convey IT governance direction and objectives?

A.

Skills and competencies

B.

Principles and policies

C.

Corporate culture

D.

Business processes

Full Access
Question # 21

An enterprise is exploring a new business opportunity. Which of the following is the BEST way to help ensure related IT projects deliver the business requirements?

A.

Hire a business consultant to manage the projects.

B.

Develop a policy to enforce the processes and procedures.

C.

Implement stage-gate reviews that require business sign-off.

D.

Focus on maturing processes and developing procedures.

Full Access
Question # 22

Which of the following would BEST help to prevent an IT system from becoming obsolete before its planned return on investment (ROI)?

A.

Obtaining independent assurance that the IT system conforms to business requirements

B.

Defining IT and business goals to ensure value delivery as required

C.

Managing the benefit realization through the entire life cycle

D.

Ordering an external audit for the IT system early in the roll out

Full Access
Question # 23

Which of the following is the FIRST step when developing an IT risk management framework?

A.

Promoting a culture of risk awareness

B.

Establishing a risk control library

C.

Aligning to enterprise risk management (ERM)

D.

Establishing risk appetite

Full Access
Question # 24

Which of the following would be the GREATEST obstacle for effective implementation of an enterprise's information security policy?

A.

Corporate culture

B.

Threats to corporate information

C.

Utilization of cloud-based applications

D.

Geographically dispersed staff

Full Access
Question # 25

Which of the following is the MOST important consideration regarding IT measures as part of an IT strategic plan?

A.

Data collection for the metrics is automated.

B.

The metrics can be traced to enterprise goals.

C.

Minimum target levels are realistic.

D.

Thresholds align to key risk indicators (KRIs).

Full Access
Question # 26

Which of the following would be MOST helpful to review when determining how to allocate IT resources during a resource shortage?

A.

IT strategic plan

B.

IT skills inventory

C.

IT organizational structure

D.

IT skill development plan

Full Access
Question # 27

What is the BEST way to demonstrate alignment of IT projects with long-term business objectives?

A.

Service level agreements (SLAs)

B.

Portfolio management

C.

Enterprise architecture (EA)

D.

Business impact analysis (BIA)

Full Access
Question # 28

Which of the following BEST facilitates the adoption of an IT governance program in an enterprise?

A.

Defining clear roles and responsibilities for the participants

B.

Using a comprehensive business case for the initiative

C.

Communicating the planned IT strategy to stakeholders

D.

Addressing the behavioral and cultural aspects of change

Full Access
Question # 29

Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application. Which of the following is the BEST way to increase the chances of a successful delivery?

A.

Implement a release and deployment plan

B.

Ask the application owner to update the risk register

C.

Create a baseline configuration of the new application

D.

Perform user acceptance testing (UAT)

Full Access
Question # 30

When a shortfall of IT resources is identified, the FIRST course of action is to;

A.

perform a business impact analysis (BIA).

B.

reallocate the budget to close the gap in resources.

C.

reduce business requirements.

D.

negotiate best pricing for contracted resources.

Full Access
Question # 31

An enterprise is evaluating both a virtual reality (VR) project and an augmented reality (AR) project. Which of the following should be the MOST important objective when evaluating these two projects within IT portfolio management?

A.

Maximizing the earned value of IT investments

B.

Determining which IT project to discontinue

C.

Implementing efficient and effective solutions

D.

Reducing the risk exposure of the projects

Full Access
Question # 32

The board directed the CIO to ensure that required IT resources are available to execute a new enterprise strategy. Which of the following should be done FIRST to support this initiative?

A.

Implement an IT capability strategy

B.

Perform a gap analysis

C.

Develop a capacity management plan

D.

Develop a resource management plan

Full Access
Question # 33

Which of the following would BEST help assess the effectiveness of a newly established IT governance framework?

A.

Develop a business case for the program portfolio.

B.

Evaluate key performance indicator (KPI) results.

C.

Benchmark the IT governance framework to industry best practice.

D.

Review results of IT audit reports.

Full Access
Question # 34

Which of the following is MOST important to ensure when aligning IT and enterprise resource management processes?

A.

IT sourcing processes are in place

B.

IT provides input for business strategy development

C.

IT resources are mapped to business priorities

D.

IT resource monitoring and oversight is in place

Full Access
Question # 35

When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?

A.

Standardization

B.

Replication

C.

Segregation

D.

Sanitization

Full Access
Question # 36

Which of the following BEST enables an enterprise to minimize the risks of intellectual property theft and loss of sensitive information when acquiring Internet of Things (IoT) hardware and software components?

A.

Review the data classification policy and relevant documentation

B.

Terminate contracts with suppliers from sanctioned regions of the world

C.

Require nondisclosure agreements (NDAs) from all suppliers

D.

Integrate supply chain cyber risk management processes

Full Access
Question # 37

An enterprise’s IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

A.

Business to help define IT goals.

B.

IT and business to define risks.

C.

Business to fund IT services.

D.

IT to define business objectives.

Full Access
Question # 38

Which of the following is MOST important to consider when monitoring the performance of IT resources?

A.

Business impact analysis (BIA)

B.

End-user feedback

C.

Centralized log analysis

D.

Service level requirements

Full Access
Question # 39

Which of the following BEST enables an enterprise to achieve the benefits of implementing new Internet of Things (loT) technology?

A.

IT project charter

B.

Change management

C.

Emerging technology roadmap

D.

Enterprise architecture (EA)

Full Access
Question # 40

Which of the following has the GREATEST impact on the design of an IT governance framework?

A.

IT performance metrics

B.

Resource allocation

C.

Business leadership

D.

Business risk

Full Access
Question # 41

An IT steering committee is concerned about staff saving data files containing sensitive corporate information on publicly available cloud file storage applications. Which of the following should be done FIRST to address this concern?

A.

Create a secure corporate cloud file storage and sharing solution.

B.

Block corporate access to cloud file storage applications.

C.

Require staff training on data classification policies.

D.

Revise the data management policy to prohibit this practice.

Full Access
Question # 42

An internal auditor conducts an assessment of a two-year-old IT risk management program. Which of the following findings should be of MOST concern to the CIO?

A.

Organizational responsibility for IT risk management is not clearly defined.

B.

None of the members of the IT risk management team have risk management-related certifications.

C.

Only a few key risk indicators (KRIs) identified by the IT risk management team are being monitored and the rest will be on a phased schedule.

D.

IT risk training records are not properly retained in accordance with established schedules

Full Access
Question # 43

Which of the following is the GREATEST expected strategic organizational benefit from the standardization of technical platforms?

A.

Reduces IT operational training costs

B.

Reduces response time

C.

Optimizes infrastructure investments

D.

Meets regulatory compliance requirements

Full Access
Question # 44

An enterprise learns that some of its business divisions have been approaching technology vendors for cloud services, resulting in duplicate support contracts and underutilization of IT services. Which of the following should be done FIRST to address this issue?

A.

Review the enterprise IT procurement policy.

B.

Re-negotiate contracts with vendors to request discounts.

C.

Require updates to the IT procurement process.

D.

Conduct an audit to investigate utilization of cloud services.

Full Access
Question # 45

Which of the following BEST enables informed IT investment decisions?

A.

Business case

B.

Technology roadmap

C.

Program plan

D.

Risk classification

Full Access
Question # 46

Which of the following is MOST important to include in the customer dimension of an IT balanced scorecard?

A.

Business value creation

B.

Stakeholder satisfaction

C.

Maintenance of IT operations

D.

Support for corporate customers

Full Access
Question # 47

Which of the following is the PRIMARY role of the CEO in IT governance?

A.

Establishing enterprise strategic goals

B.

Managing the risk governance process

C.

Evaluating return on investment (ROI)

D.

Nominating IT steering committee membership

Full Access
Question # 48

A series of cyber events impacting internet-facing business services has been successfully contained. To minimize future business risk exposure, which of the following should the board require of the IT team?

A.

Review the internet service provider (ISP) contract.

B.

Purchase cybersecurity insurance.

C.

Conduct a business impact analysis (BIA).

D.

Perform a root cause analysis.

Full Access
Question # 49

Which of the following is the PRIMARY consideration for an enterprise when deciding whether to adopt a qualitative risk assessment method?

The method identifies areas to immediately address vulnerabilities.

The method provides specific objective measurements of exposure.

The method enables an analysis Of recommended controls.

A.

The method provides a platform for all departments to contribute to the risk assessment.

Full Access
Question # 50

What is the BEST way for a board of directors to improve its ability to identify material changes to the enterprise IT risk profile?

A.

Require management to present a comprehensive list of risks.

B.

Require the implementation of a security incident and event management (SIEM) tool.

C.

Review the key risk indicators (KRIs) on a regular basis.

D.

Focus on key performance indicators (KPIs) that predict future business performance.

Full Access
Question # 51

An enterprise has an overarching enterprise architecture (EA) document. The CIO is concerned that EA is not leveraged in recent IT-enabled investments. Which of the following would BEST help to address these concerns and enforce the leveraging of EA?

A.

Form a team to update EA regularly.

B.

Require EA review at key milestones.

C.

Publish and train on the EA document.

D.

Adopt a globally recognized EA framework.

Full Access
Question # 52

A board of directors is concerned with the total cost of IT. Which of the following is MOST important for the CIO to include in an explanation to the board?

A.

A summary of benefits that will be achieved once key IT initiatives are completed.

B.

A mapping of IT employee roles to the balanced scorecard.

C.

A benchmark of IT employee salary costs against comparable organizations.

D.

A breakdown of operational versus capital expenditures.

Full Access
Question # 53

What is the BEST way for IT to achieve compliance with regulatory requirements?

A.

Enforce IT policies and procedures.

B.

Create an IT project portfolio.

C.

Review an IT performance dashboard.

D.

Report on IT audit findings and action plans.

Full Access
Question # 54

Which of the following would be an IT steering committee's BEST course of action upon learning business units have been independently procuring cloud services?

A.

Require cancellation of cloud-based application services not vetted by IT leadership.

B.

Include business unit leadership in the enterprise architecture (EA) review board.

C.

Limit cloud-based application service usage to open source solutions.

D.

Define a procurement strategy based on business unit needs.

Full Access
Question # 55

Which of the following should a new CIO do FIRST to set the strategic direction for IT?

A.

Develop well-defined business cases that include strategic outcomes.

B.

Remap stakeholder analysis and desired expectations.

C.

Review existing enterprise strategic objectives.

D.

Redesign detailed RACI charts of the IT function.

Full Access
Question # 56

An organization requires updates to their IT infrastructure to meet business needs. Which of the following will provide the MOST useful information when planning for the necessary IT investments?

A.

Enterprise architecture (EA)

B.

Risk assessment report

C.

Business user satisfaction metrics

D.

Audit findings

Full Access
Question # 57

Which of the following is the PRIMARY benefit to an enterprise when risk management is practiced effectively throughout the organization?

A.

Decisions are made with an awareness of probability and impact.

B.

IT objectives and goals are aligned to business objectives and goals.

C.

Business opportunity losses are minimized.

D.

Innovative strategic initiatives are encouraged.

Full Access
Question # 58

An enterprise has decided to invest in Internet of Things (IoT) technology as part of its strategic plan. Which of the following presents the GREATEST risk to consider as part of the technical risk management process?

A.

Device vulnerabilities

B.

Technology integration

C.

Device performance

D.

Technology obsolescence

Full Access
Question # 59

After experiencing poor recovery times following a catastrophic event, an enterprise is seeking to improve its disaster recovery capabilities. Which of the following would BEST enable the enterprise to accomplish this objective?

A.

Continuous testing of disaster recovery capabilities with implementation of lessons learned

B.

Increased training and monitoring for disaster recovery personnel who perform below expectations

C.

Annual review and updates to the disaster recovery plan (DRP)

D.

Increased outsourcing of disaster recovery capabilities to ensure reliability

Full Access
Question # 60

When selecting a cloud provider, which of the following provides the MOST comprehensive information regarding the current status and effectiveness of the provider's controls?

A.

Globally recognized certification

B.

Third-party audit report

C.

Control self-assessment (CSA)

D.

Maturity assessment

Full Access
Question # 61

Which of the following would be the BEST way for an enterprise to address new legal and regulatory requirements applicable to IT?

A.

Treat as a risk to be assessed before developing a response.

B.

Benchmark how other IT organizations are treating the new requirements.

C.

Adopt a zero-tolerance approach for noncompliance with regulatory matters.

D.

Use a cost-benefit analysis to determine if compliance is warranted.

Full Access
Question # 62

Which of the following is the PRIMARY objective of quantum computing architecture when addressing complex problems in a short amount of time using specialized algorithms?

A.

To increase revenue

B.

To optimize efficiency

C.

To reduce cyberattacks

D.

To minimize operating costs

Full Access
Question # 63

Which of the following is the MOST important course of action when initiating a procurement process for a Zero Trust solution?

A.

Develop a contracting template for solution procurement.

B.

Conduct a thorough assessment of the vendor's security practices.

C.

Select an industry-recognized solution used by a benchmarked enterprise.

D.

Develop a comprehensive list of required features.

Full Access
Question # 64

A global organization has noticed a significant decrease in the return on IT investments in a particular region. To enhance project governance in this region, the CEO should FIRST

A.

Perform a program benefit calculation and review the project selection methodology

B.

Suspend funding until project managers from better-performing regions can be assigned

C.

Perform an independent review of business cases for each current and proposed project in the region

D.

Work with the region's leadership to better understand why the situation has occurred

Full Access
Question # 65

Which of the following is the BEST way for a CIO to ensure that IT-related training is taken seriously by the IT management team and direct employees?

A.

Develop training programs based on results of an IT staff survey of preferences.

B.

Embed training metrics into the annual performance appraisal process.

C.

Promote IT-specific training awareness program.

D.

Research and identify training needs based on industry trends.

Full Access
Question # 66

When an enterprise plans to deploy mobile device technologies, it is MOST important for leadership to ensure that:

A.

Users agree to an acceptable use policy

B.

Appropriate controls are implemented

C.

The IT policy addresses mobile devices

D.

The project management office (PMO) is engaged

Full Access
Question # 67

The board of an organization has been informed of possible cyberthreats. Which of the following should be the board’s NEXT course of action?

A.

Evaluate the security incident response process

B.

Reevaluate the risk tolerance of the organization

C.

Ask the CIO to report on a risk response

D.

Engage the CIO to evaluate the risk

Full Access
Question # 68

Which of the following BEST provides an enterprise with greater insight into its environmental, social, and governance (ESG) metrics?

A.

Audit committee oversight

B.

Benchmarking against similar industries

C.

Collaborative tools and approaches

D.

Customer satisfaction surveys

Full Access
Question # 69

The PRIMARY objective of establishing outcome measures is to:

A.

Clarify the cause-and-effect relationship of the strategy

B.

Monitor whether the chosen strategy is successful

C.

Understand how the strategy will be achieved

D.

Demonstrate commitment to IT governance

Full Access
Question # 70

Of the following, who is responsible for the achievement of IT strategic objectives?

A.

IT steering committee

B.

Business process owners

C.

Chief information officer (CIO)

D.

Board of directors

Full Access
Question # 71

Which of the following provides the BEST information to assess the effective alignment of IT investments?

A.

IT balanced scorecard

B.

Net present value (NPV).

C.

IT delivery time metrics

D.

Total cost of ownership (TCO)

Full Access
Question # 72

The PRIMARY benefit of using an IT service catalog as part of the IT governance program is that it.

A.

ensures IT effectively meets future business needs,

B.

provides a foundation for measuring IT performance,

C.

improves the ability to allocate IT resources

D.

establishes enterprise performance metrics per service

Full Access
Question # 73

The board of directors of a large organization has directed IT senior management to improve IT governance within the organization. IT senior management's MOST important course of action should be to:

A.

understand the driver that led to a desire to change.

B.

assess the current slate of IT governance within the organization.

C.

review IT strategy and direction.

D.

analyze IT service levels and performance.

Full Access
Question # 74

An enterprise is concerned with the potential for data leakage as a result of increased use of social media in the workplace, and wishes to establish a social media strategy. Which of the following should be the MOST important consideration in developing this strategy?

A.

Criticality of the information

B.

Ensuring that the enterprise architecture (EA) is updated

C.

Data ownership

D.

The balance between business benefits and risk

Full Access
Question # 75

An enterprise has decided to implement an enterprise resource planning (ERP) system to achieve operating and cost efficiencies through global IT standardization. The business units are resistant because they are used to operating autonomously. The CEO has instructed the CIO to move quickly with the implementation to force acceptance with business unit leaders. Which of the following should be the ClO's FIRST step?

A.

Build a governance framework for identifying non-standard processes.

B.

Request funding from the CEO to hire ERP consultants.

C.

Ask the CEO to be the sponsor of the program

D.

Engage a reluctant business unit to conduct a proof-of-concept pilot.

Full Access
Question # 76

The risk committee is overwhelmed by the number of false positives included in risk reports. What action would BEST address this situation?

A.

Conduct a risk assessment

B.

Evaluate key risk indicators (KRIs).

C.

Change the reporting format.

D.

Adjust the IT balanced scorecard

Full Access
Question # 77

Which of the following should senior management do FIRST when developing and managing digital applications for a new enterprise?

A.

Establish an architecture review board.

B.

Define the risk appetite

C.

Develop key risk indicators (KRIs).

D.

Implement a sourcing program.

Full Access
Question # 78

When conducting a risk assessment in support of a new regulatory requirement, the IT risk committee should FIRST consider the:

A.

disruption to normal business operations.

B.

risk profile of the enterprise.

C.

readiness of IT systems to address

D.

the risk cost burden to achieve compliance.

Full Access
Question # 79

An IT value delivery framework PRIMARILY helps an enterprise

A.

increase transparency of value to the enterprise

B.

assist top management in approving IT projects

C.

improve value of successful IT projects

D.

optimize value to the enterprise.

Full Access
Question # 80

Which of the following IT governance actions would be the BEST way to minimize the likelihood of IT failures jeopardizing the corporate value of an IT-dependent organization?

A.

Implement an IT risk management framework.

B.

Install an IT continuous monitoring solution.

C.

Define IT performance management measures.

D.

Benchmark IT strategy against industry peers.

Full Access
Question # 81

A newly appointed CIO has issued a new IT strategic plan. Which of the following is the MOST effective way for the CIO to ensure the IT management team is held accountable for the delivery of the plan?

A.

Update the IT balanced scorecard with key objectives.

B.

Enforce disciplinary action for managers if the plan is not delivered.

C.

Revise the managers' performance goals to include key objectives.

D.

Provide management training on IT Strategic Objectives

Full Access
Question # 82

Which of the following should be established FIRST so that data owners can consistently assess the level of data protection needed across the enterprise?

A.

Data encryption program

B.

Data risk management program

C.

Data retention policy

D.

Data classification policy

Full Access
Question # 83

Which of the following should be done FIRST when designing an IT balanced scorecard?

A.

Develop key performance indicators (KPIs).

B.

Communicate to stakeholders

C.

Analyze the business strategy.

D.

Review the IT resource plan.

Full Access
Question # 84

During an IT strategy review, a new CIO determined that numerous important internal processes have not been updated for several years and should be reexamined. Which of the following would be the BEST approach to address this concern?

A.

Implement a process review policy.

B.

Assemble a project review team

C.

Verify that the processes are still needed

D.

Map the processes to a capability maturity model.

Full Access
Question # 85

An enterprise has learned of a new regulation that may impact delivery of one of its core technology services Which of the following should the done FIRST?

A.

Update the risk management framework

B.

Determine whether the board wants to comply with the regulation

C.

Assess the risk associated with the new regulation

D.

Request an action plan from the risk team

Full Access
Question # 86

A major data leakage incident at an enterprise has resulted in a mandate to strengthen and enforce current data governance practices. Which of the following should be done FIRST to achieve this objective?

A.

Assess data security controls.

B.

Review data logs.

C.

Analyze data quality.

D.

Verify data owners.

Full Access
Question # 87

When establishing an enterprise data model, the BEST way to ensure the integrity of data is to:

A.

classify information using an agreed-upon schema.

B.

implement the highest level of protection to data across the enterprise.

C.

establish a privileged access management platform.

D.

implement a data loss prevention (DLP) program.

Full Access
Question # 88

Which of the following would BEST help a CIO enhance the competencies of an IT business analytics team?

A.

Understanding current staff skill sets and identifying gaps

B.

Creating operational processes and identifying resources

C.

Defining the IT architecture and identifying training areas

D.

Establishing team goals and identifying the proper structure

Full Access
Question # 89

An enterprise has performed a business impact analysis (BIA) considering a number of risk scenarios Which of the following should the enterprise do NEXT?

A.

Perform a risk controls gap analysis

B.

Update the disaster recovery plan (DRP)

C.

Verify compliance with relevant legislation

D.

Assess risk mitigation strategies

Full Access
Question # 90

An enterprise has committed to the implementation of a new IT governance model. The BEST way to begin this implementation is to:

A.

identify IT services that currently support the enterprise’s capability.

B.

define policies for data, applications, and organization of infrastructure.

C.

identify the role of IT in supporting the business.

D.

prioritize how much and where to invest in IT.

Full Access
Question # 91

An IT strategy committee wants to ensure stakeholders understand who owns each strategic objective. To enable this understanding, which of the following should be communicated to stakeholders?

A.

A RACI chart

B.

The strategic plan

C.

Performance measure

D.

Risk owners

Full Access
Question # 92

An enterprise is determining the objectives for an IT training improvement initiative from a governance prosected. it would be MOST important to ensure that:

A.

policies and processes address both enterprise requirements and professional growth

B.

courses of instruction that will maximize employee productivity are identified

C.

several different training strategies are created for final approval by the CIO

D.

IT employees are surveyed and interviewed to identify development needs

Full Access
Question # 93

An IT steering committee is preparing to review proposals for projects that implement emerging technologies. In anticipation of the review, the committee should FIRST:

A.

determine if the IT staff can support the emerging technologies.

B.

understand how the emerging technologies will influence risk across the enterprise.

C.

require a capacity plan and framework review for the emerging technologies,

D.

require a review of the enterprise risk management framework.

Full Access
Question # 94

When developing a framework to implement IT governance, which of the following BEST contributes to the successful implementation?

A.

Practical and enforceable policies

B.

Automated compliance tracking

C.

Comprehensive and timely audit reviews

D.

Periodic peer reviews

Full Access
Question # 95

Which of the following is the BEST way to maximize the value of an enterprise’s information asset base?

A.

Seek additional opportunities to leverage existing information assets.

B.

Facilitate widespread user access to all information assets

C.

Regularly purge information assets to minimize maintenance costs

D.

Implement an automated information management platform

Full Access
Question # 96

A newly hired CIO has been told the enterprise has an established IT governance process, but finds it is not being followed. To address this problem, the CIO should FIRST

A.

gain an understanding of the existing governance process and corporate culture.

B.

replace the current governance process with one the CIO has successfully used before.

C.

establish personal relationships with executive-level peers to leverage goodwill,

D.

engage audit to review current governance processes and validate the ClO's concerns.

Full Access
Question # 97

Supply chain management has established a supplier policy requiring multiple technology suppliers. What is the BEST way to ensure the success of this policy?

A.

Identity and select suppliers based on cost.

B.

Align the vendor selection process with the security policy.

C.

Implement a master service agreement.

D.

Align enterprise architecture (EA) and procurement strategies.

Full Access
Question # 98

Which of the following BEST supports the implementation of an effective data classification policy?

A.

Monitoring with key performance indicators (KPIs)

B.

Implementation of data loss prevention (DLP) tools

C.

Clear guidelines adopted by the business

D.

Classification policy approval by the board

Full Access
Question # 99

In a successful enterprise that is profitable in its marketplace and consistently growing in size, the non-IT workforce has grown by 50% in the last two years. The demand for IT staff in the marketplace is more than the supply, and the enterprise is losing staff to rival organizations. Due to the rapid growth. IT has struggled to keep up with the enterprise, and IT procedures and associated job roles are not well-defined. The MOST critical activity for reducing the impact caused by IT staff turnover is to:

A.

document processes and procedures.

B.

outsource the IT operation.

C.

increase compensation for IT staff

D.

hire temporary staff.

Full Access
Question # 100

The CIO of a global technology company is considering introducing a bring your own device (BYOD) program. What should the CIO do FIRST?

A.

Ensure the infrastructure can meet BYOD requirements.

B.

Establish a business case.

C.

Define a clear and inclusive BYOD policy.

D.

Focus on securing data and access to data.

Full Access
Question # 101

An airline wants to launch a new program involving the use of artificial intelligence (Al) and machine learning the mam objective of the program is to use customer behavior to determine new routes and markets Which of the following should be done NEXT?

A.

Consult with the enterprise privacy function

B.

Define the critical success factors (CSFs)

C.

Present the proposal to the IT strategy committee

D.

Perform a business impact analysis (BIA)

Full Access
Question # 102

Which of the following is a responsibility of an IT strategy committee?

A.

Providing oversight on enterprise strategy implementation

B.

Approving the business strategy and its IT implications

C.

Advising the board on the development of IT goals

D.

Tracking projects in the IT investment portfolio

Full Access
Question # 103

An enterprise's decision to move to a virtualized architecture will have the GREATEST impact on:

A.

system life cycle management.

B.

asset classification.

C.

vendor management

D.

vulnerability management.

Full Access
Question # 104

When evaluating the process for acquiring third-party IT resources, management identified several suppliers with repeated downtime issues impacting the enterprise. Which of the following is the BEST approach to help ensure future service delivery in accordance with business objectives?

A.

Establish key performance indicators (KPls)

B.

Appoint a procurement oversight committee

C.

Establish key risk indicators (KRIs).

D.

Implement contract monitoring.

Full Access
Question # 105

Which of the following would be the BEST way to facilitate the successful adoption of a new technology across the enterprise?

A.

Ensure the use of a business case

B.

Review business goals.

C.

Establish an IT balanced scorecard.

D.

Highlight the risk the new technology will address.

Full Access
Question # 106

An enterprise has finalized a major acquisition and a new business strategy in line with stakeholder needs has been introduced to help ensure continuous alignment of IT with the new business strategy the CiO should FIRST

A.

review the existing IT strategy against the new business strategy

B.

revise the existing IT strategy to align with the new business strategy

C.

establish a new IT strategy committee for the new enterprise

D.

assess the IT cultural aspects of the acquired entity

Full Access
Question # 107

After shifting from lease to purchase of IT infrastructure and software licenses, an enterprise has to pay for unexpected lease extensions causing significant cost overruns. The BEST direction for the IT steering committee would be to establish;

A.

an end-of-life program to remove aging infrastructure from the environment.

B.

budget cuts to compensate for the cost overruns.

C.

a program to annually review financial policy on overruns.

D.

a policy to consider total cost of ownership (TCO) in investment decisions.

Full Access
Question # 108

When selecting a vendor to provide services associated with a critical application which of the following is the MOST important consideration with respect to business continuity planning (BCP)?

A.

Procuring a copy of the vendor's BCP during the contracting process

B.

Testing the vendor's BCP and analyzing the results

C.

Obtaining independent audit reports of the vendor's BCP

D.

Evaluating whether the vendor's BCP aligns with the enterprise's BCP

Full Access
Question # 109

When developing a business case for an enterprise resource planning (ERP) implementation, which of the following, if overlooked, causes the GREATEST impact to the enterprise?

A.

Vendor selection

B.

Salvage value of legacy hardware

C.

Interdependent systems

D.

IT best practices

Full Access
Question # 110

Reviewing which of the following should be the FIRST step when evaluating the possibility of outsourcing an IT system?

A.

Outsourcing strategy

B.

Outsourced business processes

C.

Service level agreements (SLAs)

D.

IT staff skill sets

Full Access
Question # 111

Which of the following is the PRIMARY purpose of information governance?

A.

To develop control procedures that help ensure information is adequately protected throughout its life cycle

B.

To monitor the processes that deliver and enhance the value of information assets

C.

To set direction for information management capabilities through prioritization and decision making

D.

To ensure regulatory compliance is maintained while optimizing the utilization of information

Full Access
Question # 112

Which of the following is the BEST approach to assist an enterprise in planning for iT-enabled investments?

A.

Enterprise architecture (EA).

B.

IT process mapping

C.

Task management

D.

Service level management

Full Access
Question # 113

An enterprise has decided to execute a risk self-assessment to identify improvement opportunities for current IT services. Which of the following is MOST important to address in the assessment?

A.

Related business risk

B.

Residual IT risk

C.

Mapping of business objectives to IT risk

D.

IT capability and performance measures

Full Access
Question # 114

A board of directors has just received a report indicating that only a small number of IT initiatives have been completed on time and within budget, A third of the projects were cancelled prior to completion, and more than half will cost almost double their original estimates. An analysis has determined that no one is held responsible for the completion of investmentinitiatives, and there is no consistency in execution. Which of the following would BEST help the enterprise address these problems?

A.

Establishing a project governance framework

B.

Assigning business management to an IT investment review board

C.

Establishing an IT risk management plan

D.

Aligning IT investment priorities to the business

Full Access
Question # 115

Which of the following should be done FIRST when defining responsibilities for ownership of information and systems?

A.

Require an information risk assessment.

B.

Identify systems that are outsourced.

C.

Ensure information is classified.

D.

Require an inventory of information assets.

Full Access
Question # 116

When deciding to develop a system with sensitive data, which of the following is MOST important to include in a business case?

A.

A risk assessment to determine the appropriate controls

B.

Updated enterprise architecture (EA)

C.

Skills gap analysis

D.

The additional cost of encrypting sensitive data

Full Access
Question # 117

A CIO just received a final audit report that indicates there is inconsistent enforcement of the enterprise's mobile device acceptable use policy throughout all business units. Which of the following should be the FIRST step to address this issue?

A.

Incorporate compliance metrics into performance goals.

B.

Review the relevance of existing policy.

C.

Mandate awareness training for all mobile device users.

D.

Implement controls to enforce the policy.

Full Access
Question # 118

An enterprise is about to complete a major acquisition, and a decision has been made that both companies will be using the parent company's IT infrastructure. Which of the following should be done NEXT?

A.

Update the enterprise architecture (EA).

B.

Perform a business impact analysis (BIA.

C.

Conduct a gap analysis.

D.

Develop a communication plan to support the merger.

Full Access
Question # 119

Which of the following is the BEST way to address an IT audit finding that many enterprise application updates lack appropriate documentation?

A.

Enforce change control procedures.

B.

Conduct software quality audits

C.

Review the application development life cycle.

D.

Add change control to the risk register.

Full Access
Question # 120

An IT department outsourced application support and negotiated service level agreements (SLAs) directly with the vendor Although the vendor met the SLAs business owner expectations are not met and senior management cancels the contract This situation can be avoided in the future by:

A.

improving the business requirements gathering process

B.

improving the negotiation process for service level agreements (SLAs)

C.

implementing a vendor performance scorecard

D.

assigning responsibility for vendor management

Full Access
Question # 121

An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?

A.

Calculating the cost of the current solution

B.

Updating the business risk profile

C.

Changing the IT steering committee charter

D.

Revising the business's balanced scorecard

Full Access
Question # 122

Individual business units within an enterprise have been designing their own IT solutions without consulting the IT department. From a governance perspective, what is the GREATEST issue associated with this situation?

A.

Security controls may not meet IT requirements.

B.

The enterprise does not have the skills to manage the solutions.

C.

The solutions conflict with IT goals and objectives.

D.

The solution may conflict with existing enterprise goals.

Full Access
Question # 123

Which of the following is the GREATEST benefit of using a quantitative risk assessment method?

A.

It uses resources more efficiently

B.

It can be used to assess risks against non-tangible assets

C.

It reduces subjectivity

D.

It helps in prioritizing risk response action plans

Full Access
Question # 124

A large organization with branches across many countries is in the midst of an enterprise resource planning (ERP) transformation. The IT organization receives news that the branches in a country where the impact to the enterprise is to be greatest are being sold. What should be the NEXT step?

A.

Update the ERP business case and re-evaluate the ROI.

B.

Cancel the ERP transformation and re-allocate project funds.

C.

Adjust the ERP implementation plan and budget.

D.

Continue with the ERP migration according to plan.

Full Access
Question # 125

Which of the following BEST reflects the ethical values adopted by an IT organization?

A.

IT principles and policies

B.

IT balanced scorecard

C.

IT governance framework

D.

IT goals and objectives

Full Access
Question # 126

Which of the following is MOST important for the effective design of an IT balanced scorecard?

A.

On-demand reporting and continuous monitoring

B.

Consulting with the CIO

C.

Emphasizing the financial results

D.

Identifying appropriate key performance indicators (KPls)

Full Access
Question # 127

Establishing a uniform definition for likelihood and impact through risk management standards PRIMARILY addresses which of the following concerns?

A.

Inconsistent categories of vulnerabilities

B.

Conflicting interpretations of risk levels

C.

Inconsistent data classification

D.

Lack of strategic IT alignment

Full Access
Question # 128

Which of the following BEST lowers costs and improves scalability from an IT enterprise architecture (EA) perspective?

A.

Cost management

B.

IT strategic sourcing

C.

Standardization

D.

Business agility

Full Access
Question # 129

When developing effective metrics for the measurement of solution delivery, it is MOST important to:

A.

establish project controls and monitoring objectives.

B.

perform an objective analysis of the project roadmap.

C.

establish the objectives and expected benefits.

D.

specify quantitative measures for solution delivery.

Full Access
Question # 130

An enterprise's board of directors can BEST manage enterprise risk by:

A.

mandating board-approved enterprise risk management (ERM) modifications.

B.

requiring the establishment of an enterprise risk management (ERM) framework.

C.

requiring the establishment of an enterprise-wide program management office.

D.

ensuring the cost-effectiveness of the internal control system.

Full Access
Question # 131

An enterprise has decided to create its first mobile application. The IT director is concerned about the potential impact of this initiative. Which of the following is the MOST important input for managing the risk associated with this initiative?

A.

Enterprise architecture (EA)

B.

IT risk scorecard

C.

Enterprise risk appetite

D.

Business requirements

Full Access
Question # 132

To generate value for the enterprise, it is MOST important that IT investments are:

A.

aligned with the IT strategic objectives.

B.

approved by the CFO.

C.

consistent with the enterprise's business objectives.

D.

included in the balanced scorecard.

Full Access
Question # 133

Which of the following would be the BEST long-term solution to address the concern regarding loss of experienced staff?

A.

implement knowledge management practices

B.

Establish a mentoring program for IT staff

C.

Determine key risk indicators (KRIs)

D.

Retain key staff as consultants.

Full Access
Question # 134

Which of the following is the PRIMARY responsibility of a data steward?

A.

Ensuring the appropriate users have access to the right data

B.

Developing policies for data governance

C.

Reporting data analysis to the board

D.

Classifying and labeling organizational data assets

Full Access
Question # 135

An enterprise has identified a number of plausible risk scenarios that could result in economic loss associated with major IT investments. Which of the following is the BEST method to assess the risk?

A.

Cost-benefit analysis

B.

Qualitative analysis

C.

Business impact analysis (BIA)

D.

Quantitative analysis

Full Access
Question # 136

An enterprise is planning to outsource data processing for personally identifiable information (Pll). When is the MOST appropriate time to define the requirements for security and privacy of information?

A.

When issuing requests for proposals (RFPs)

B.

After an assessment of the current information architecture.

C.

When developing service level agreements (SLAs)

D.

During the initial vendor selection process

Full Access
Question # 137

A newly hired IT director of a large international enterprise has been asked to provide periodic updates regarding IT risk to the board. Which of the following is the MOST effective way to initially address this request?

A.

Include a complete IT risk register in the monthly letter given to each board member.

B.

Include key IT risks in a dashboard submitted to the board quarterly.

C.

Submit a register of all IT audit findings to board members monthly.

D.

Schedule quarterly meetings to discuss all open IT risks.

Full Access
Question # 138

IT management has reported difficulty retaining qualified IT personnel to support the organization's new strategy Given that outsourcing is not a viable approach, which of the following would be the BEST way for IT governance to address this situation?

A.

Implement an incentive-based employee referral program

B.

Direct the development of a strategic HR plan for IT

C.

Recommend enhancements to the online recruiting platform specific to IT

D.

Work with HR to enhance compensation packages for IT personnel

Full Access
Question # 139

Before establishing IT key nsk indicators (KRls) which of the following should be defined FIRST?

A.

IT resource strategy

B.

IT risk and security framework

C.

IT goals and objectives

D.

IT key performance indicators (KPIs)

Full Access
Question # 140

Facing financial struggles, a CEO mandated severe budget cuts. A decision was also made to immediately change the enterprise strategic focus to put more reliance on mobile, cloud, and wireless services in an effort to boost revenue. The IT steering committee has asked the CIO tosuggest adjustments to the current IT project portfolio to allow support for the new direction despite fewer funds. What should the CIO advise the committee to do FIRST?

A.

Ask business stakeholders to discuss their vision for the new strategy.

B.

Cancel projects with a net present value (NPV) below a defined threshold.

C.

Conduct a risk assessment against the potential new services.

D.

Start re-allocating budget to projects involving mobile or cloud.

Full Access
Question # 141

Due to the recent introduction of personal data protection regulations, an enterprise is required to maintain its employee data in production systems only for a limited time. Which of the following is MOST important to review?

A.

Asset retention policies

B.

Information retention policies

C.

Data archival policies

D.

Data backup and restoration policies

Full Access
Question # 142

Which of the following is the BEST indication that information security requirements are taken into consideration when developing IT processes?

A.

The database is deployed in a distributed processing platform

B.

The information architecture incorporates data classification

C.

Customer profiles are stored with a domestic service provider

D.

The integrity of sensitive information is periodically reviewed

Full Access
Question # 143

Enterprise leadership is concerned with the potential for discrimination against certain demographic groups resulting from the use of machine learning models What should be done FIRST to address this concern?

A.

Obtain stakeholders' input regarding the ethics associated with machine learning

B.

Revise the code of conduct to discourage bias within automated processes

C.

Develop a machine learning policy articulating guidelines for machine learning use

D.

Assess recent case law related to the enterprise's machine learning business strategy

Full Access
Question # 144

Which of the following BEST enables an enterprise to determine how business expectations should be addressed in a governance program?

A.

Business impact analysis (BIA)

B.

Cost-benefit analysis

C.

Enterprise risk analysis

D.

Stakeholder analysis

Full Access
Question # 145

Which of the following should be the FIRST action taken by a newly formed IT governance committee to ensure reports are compliant with regulations and identify key IT risks?

A.

Direct the development of a reporting communication plan.

B.

Develop and monitor IT key risk indicator (KRI) triggers.

C.

Train end users on regulation requirements.

D.

Implement a mechanism to ensure reporting escalation.

Full Access
Question # 146

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

A.

Granting access to information based on information architecture

B.

Engaging an audit of logical access controls and related security policies

C.

Implementing multi-factor authentication controls

D.

Authenticating access to information assets based on roles or business rules

Full Access
Question # 147

Which of the following should be the PRIMARY basis for establishing categories within an information classification scheme?

A.

Information architecture

B.

Industry standards

C.

Information security policy

D.

Business impact

Full Access
Question # 148

Which of the following is the PRIMARY ongoing responsibility of the IT governance function related to risk?

A.

Responding to and controlling all IT risk events

B.

Communicating the enterprise risk management plan

C.

Ensuring IT risk management is aligned with business risk appetite

D.

Verifying that all business units have staff skilled at assessing risk

Full Access
Question # 149

A rail transport company has the worst on-time arrival record in the industry due to an antiquated IT system that controls scheduling. Despite employee resistance, an initiative lo upgrade the technology and related processes has been approved. To maximize employee engagement throughout the project, which of the following should be in place prior to the start of the initiative?

A.

Procurement management plan

B.

Organizational change management plan

C.

Risk response plan

D.

Resource management plan

Full Access
Question # 150

Which of the following is the BEST IT architecture concept to ensure consistency, interoperability, and agility for infrastructure capabilities?

A.

Establishment of an IT steering committee

B.

Standards-based reference architecture and design specifications

C.

Establishment of standard vendor and technology designations

D.

Design of policies and procedures

Full Access
Question # 151

Which of the following responsibilities should be retained within an enterprise when outsourcing a project management office (PMO) function?

A.

Selecting projects

B.

Managing projects

C.

Tracking project cost

D.

Defining project methodology

Full Access
Question # 152

What is the PRIMARY objective for performing an IT due diligence review prior to the acquisition of a competitor?

A.

Document the competitor's governance structure.

B.

Ensure that the competitor understands significant IT risks.

C.

Assess the status of the risk profile of the competitor.

D.

Determine whether the competitor is using industry-accepted practices.

Full Access
Question # 153

A business case indicates an enterprise would reduce costs by implementing a bring your own device (BYOD) program allowing employees to use personal devices for email. Which of the following should be the FIRST governance action?

A.

Assess the enterprise architecture (EA).

B.

Update the network infrastructure.

C.

Update the BYOD policy.

D.

Assess the BYOD risk.

Full Access
Question # 154

Which of the following is the BEST indication of effective IT-business strategic alignment?

A.

Business management is involved as IT strategies are developed.

B.

IT senior management is required to report to the board.

C.

Business strategy is documented to allow IT architecture to be designed quickly.

D.

IT-business collaboration results in a strategy focused on IT cost reduction.

Full Access
Question # 155

An enterprise decides to accept the IT risk of a subsidiary located in another country even though it exceeds the enterprise's risk appetite. Which of the following would be the BEST justification for this decision?

A.

Risk framework alignment

B.

Local market common practices

C.

Compliance with local regulations

D.

Technical gaps among subsidiaries

Full Access
Question # 156

A board of directors is concerned that a major IT implementation has the potential to significantly disrupt enterprise operations. Which of the following would be MOST helpful in identifying the extent of the potential impact of the disruption?

A.

An analysis of the current enterprise risk appetite

B.

An earned value analysis (EVA) of the implementation

C.

A risk assessment of the implementation

D.

A review of lessons learned from previous implementations

Full Access
Question # 157

An executive sponsor of a partially completed IT project has learned that the financial assumptions supporting the project have changed. Which of the following governance actions should be taken FIRST?

A.

Schedule an interim project review.

B.

Request a risk assessment.

C.

Re-evaluate the project in the portfolio.

D.

Request an update to the business case

Full Access
Question # 158

An audit report has revealed that data scientists are analyzing sensitive "big data" files using an offsite cloud because corporate servers do not have the necessary processing capabilities. A review of policies indicates this practice is not prohibited. Which of the following should be the FIRST strategic action to address the report?

A.

Authorize a risk analysis of the practice.

B.

Update data governance practices.

C.

Revise the information security policy.

D.

Recommend the use of a private cloud.

Full Access
Question # 159

A financial institution with a highly regarded reputation for protecting customer interests has recently deployed a mobile payments program. Which of the following key risk indicators (KRIs) would be of MOST interest to the CIO?

A.

Number of failed software updates on mobile devices

B.

Percentage of incomplete transactions

C.

Failure rate of point-of-sale systems

D.

Total volume of suspicious transactions

Full Access
Question # 160

A strategic systems project was implemented several months ago. Which of the following is the BEST reference for the IT steering committee as they evaluate its level of success?

A.

Stakeholder satisfaction surveysB The project's net present value (NPV)

B.

The project's business case

C.

Operating metrics of the new system

Full Access
Question # 161

The board and senior management of a new enterprise recently met to formalize an IT governance framework. The board of directors' FIRST step in implementing IT governance is to ensure that:

A.

an IT balanced scorecard is implemented.

B.

a portfolio of IT-enabled investments is developed.

C.

IT roles and responsibilities are established.

D.

IT policies and procedures are defined.

Full Access
Question # 162

Which of the following would provide the BEST input for prioritizing strategic IT improvement initiatives?

A.

Business dependency assessment

B.

Business process analysis

C.

Business case evaluation

D.

Business impact analysis (BIA)

Full Access
Question # 163

Risk management strategies are PRIMARILY adopted to:

A.

avoid risks for business and IT assets.

B.

take necessary precautions for claims and losses.

C.

achieve acceptable residual risk levels.

D.

achieve compliance with legal requirements.

Full Access
Question # 164

Which of the following would be the PRIMARY impact on IT governance when a business strategy is changed?

A.

Performance outcomes of IT objectives

B.

IT governance structure

C.

Maturity level of IT processes

D.

Relationship level with IT outsourcers

Full Access
Question # 165

Which of the following is the BEST method for making a strategic decision to invest in cloud services?

A.

Prepare a business case.

B.

Prepare a request for information (RFI),

C.

Benchmarking.

D.

Define a balanced scorecard.

Full Access
Question # 166

Which of the following is the MOST effective means for IT management to report to executive management regarding the value of IT?

A.

IT process maturity level

B.

Cost-benefit analysis

C.

Resource assessment

D.

Balanced scorecard

Full Access
Question # 167

Which of the following represents the GREATEST challenge to implementing IT governance?

A.

Determining the best practice to follow

B.

Planning the project itself

C.

Developing a business case

D.

Applying behavioral change management

Full Access
Question # 168

Which of the following is the MOST effective way to manage risks within the enterprise?

A.

Assign individuals responsibilities and accountabilities for management of risks.

B.

Make staff aware of the risks in their area and risk management techniques.

C.

Provide financial resources for risk management systems.

D.

Document procedures and reporting processes.

Full Access
Question # 169

The use of an IT balanced scorecard enables the realization of business value of IT through:

A.

business value and control mechanisms.

B.

outcome measures and performance drivers.

C.

financial measures and investment management.

D.

vision and alignment with corporate programs.

Full Access
Question # 170

An enterprise plans to implement a business intelligence (Bl) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

A.

Interface issues between enterprise and Bl applications

B.

Large volumes of data fed from enterprise applications

C.

The need for staff to be trained on the new Bl tool

D.

Data definition and mapping sources from applications

Full Access
Question # 171

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Full Access
Question # 172

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

A.

Require an update to enterprise data policies.

B.

Request an impact analysis.

C.

Review documented data interdependence.

D.

Validate against existing architecture.

Full Access
Question # 173

IT has launched new portfolio management policies and processes to improve the alignment of IT projects with enterprise goals. The latest audit report indicates that no improvement has been made due to confusion in the decision-making process. Which of the following is the BEST course of action for the CIO?

A.

Deliver prioritization and facilitation training.

B.

Implement a performance management framework.

C.

Create an IT portfolio management risk framework.

D.

Develop and communicate an accountability matrix.

Full Access
Question # 174

Which of the following is the MOST important consideration for data classification to be successfully implemented?

A.

Users should be provided with clear instructions that are easy to follow and understand.

B.

The data classification tools integrate with other tools that help manage the data.

C.

The classification scheme should be closely aligned with the IT strategic plan.

D.

Senior management should be properly trained in monitoring compliance.

Full Access
Question # 175

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

A.

Authenticating access to information assets based on roles or business rules.

B.

Implementing multi-factor authentication controls

C.

Granting access to information based on information architecture

D.

Engaging an audit of logical access controls and related security policies

Full Access
Question # 176

Which of the following would be MOST important to update if a decision is made to ban end user-owned devices in the workplace?

A.

Employee nondisclosure agreement

B.

Enterprise risk appetite statement

C.

Enterprise acceptable use policy

D.

Orientation training materials

Full Access
Question # 177

Which of the following are PRIMARY factors in ensuring the success of an enterprise quality assurance program?

A.

Enterprise risk appetite and tolerance

B.

Risk management and control frameworks

C.

Continuous improvement plans

D.

A process maturity framework and documented procedures

Full Access
Question # 178

Which of the following is MOST important when an IT-enabled business initiative involves multiple business functions?

A.

Defining cross-departmental budget allocation

B.

Conducting a systemic risk assessment

C.

Developing independent business cases

D.

Establishing a steering committee with business representation

Full Access
Question # 179

Which of the following MOST effectively demonstrates operational readiness to address information security risk issues?

A.

Executive management has announced an information security risk initiative.

B.

IT management has communicated the need for information security risk management to the business.

C.

A policy has been communicated stating enterprise commitment and readiness to address information security risk.

D.

Procedures have been established for assessing and mitigating information security risks.

Full Access
Question # 180

Which of the following is the PRIMARY benefit of communicating the IT strategy across the enterprise?

A.

On-time and on-budget delivery of strategic projects

B.

Improvement in IT balanced scorecard performance

C.

Optimization of IT investment in supporting business objectives

D.

Reduced organizational resistance during strategy execution

Full Access
Question # 181

An enterprise plans to expand into new markets in countries lacking data privacy regulations, increasing risk exposure. Which of the following is the BEST course of action for the CIO?

A.

Identify business risk appetite and tolerance levels.

B.

Quantify the risk impact and evaluate possible countermeasures.

C.

Limit the personal data available to the high-risk countries.

D.

Mandate the strengthening of user access controls.

Full Access
Question # 182

An enterprise learns that a new privacy regulation was recently published to protect customers in the event of a breach involving personally identifiable information (Pll). The IT risk management team's FIRST course of action should be to:

A.

evaluate the risk appetite for the new regulation.

B.

define the risk tolerance for the new regulation.

C.

determine if the new regulation introduces new risk.

D.

assign a risk owner for the new regulation.

Full Access
Question # 183

The PRIMARY reason for an enterprise to adopt an IT governance framework is to:

A.

assure IT sustains and extends the enterprise strategies and objectives.

B.

expedite IT investments among other competing business investments.

C.

establish IT initiatives focused on the business strategy.

D.

allow IT to optimize confidentiality, integrity, and availability of information assets.

Full Access
Question # 184

The MOST successful IT performance metrics are those that:

A.

measure financial results.

B.

measure all areas.

C.

are approved by the stakeholders.

D.

contain objective measures.

Full Access
Question # 185

An IT steering committee is presented with an audit finding that new software applications are delivered on time but consistently have unacceptable levels of defects. Which of the following would be the BEST direction from the committee?

A.

Implement performance indicators.

B.

Evaluate the change management process.

C.

Establish code peer reviews.

D.

Evaluate the quality assurance process.

Full Access
Question # 186

An organization's board of directors has questioned the value provided by IT key performance indicators (KPIs). Which of the following is the BEST way to determine whether the KPIs adequately support organizational objectives?

A.

Define a strategy for IT measurement.

B.

Define policies and procedures around current KPIs.

C.

Review the KPIs with key business executives.

D.

Work directly with the CEO to identify what measures should be used.

Full Access
Question # 187

Best practice states that IT governance MUST:

A.

enforce consistent policy across the enterprise.

B.

be applied in the same manner throughout the enterprise.

C.

apply consistent target levels of maturity to processes.

D.

be a component of enterprise governance.

Full Access
Question # 188

Which of the following BEST reflects mature risk management in an enterprise?

A.

A regularly updated risk register

B.

Ongoing risk assessment

C.

Ongoing investment in risk mitigation

D.

Responsive risk awareness culture

Full Access
Question # 189

The CIO of an enterprise learns the payroll server of a competitor has been the victim of ransomware. To help plan for the possibility of ransomed corporate data, what should be the ClO's FIRST course of action?

A.

Require development of key risk indicators (KRls).

B.

Develop a policy to address ransomware.

C.

Request a targeted risk assessment.

D.

Back up corporate data to a secure location.

Full Access
Question # 190

Which of the following is the MOST valuable input when quantifying the loss associated with a major risk event?

A.

Key risk indicators (KRIs)

B.

IT environment threat modeling

C.

Business impact analysis (BIA) report

D.

Recovery time objectives (RTOs)

Full Access
Question # 191

As the required core competencies of the IT workforce are anticipated and identified, what is the NEXT step in strengthening the department's human resource assets?

A.

Develop a responsible, accountable, consulted, and informed (RACI) chart.

B.

Create an effective recruitment, retention, and training program.

C.

Commit to the board performance metrics and bonus structure.

D.

Develop personnel requirements for third-party assurance.

Full Access
Question # 192

Two large financial institutions with different corporate cultures are engaged in a merger. From a governance perspective, which of the following should be the GREATEST concern?

A.

Technology infrastructure

B.

Risk appetite

C.

Combined cost of operations

D.

Enterprise architecture (EA) integration

Full Access
Question # 193

Which of the following is the PRIMARY element in sustaining an effective governance framework?

A.

Identification of optimal business resources

B.

Establishment of a performance metric system

C.

Ranking of critical business risks

D.

Assurance of the execution of business controls

Full Access
Question # 194

Which of the following is the MOST comprehensive method to report on overall IT performance to the board of directors?

A.

Balanced scorecard

B.

Net present value (NPV)

C.

Performance-based payments

D.

Return on investment (ROI)

Full Access
Question # 195

An enterprise is implementing a new IT governance program. Which of the following is the BEST way to increase the likelihood of its success?

A.

The IT steering committee approves the implementation efforts.

B.

The CIO communicates why IT governance is important to the enterprise.

C.

Implementation follows an IT audit recommendation.

D.

The CIO issues a mandate for adherence to the program.

Full Access
Question # 196

The board of directors has mandated the use of geolocation software to track mobile assets assigned to employees who travel outside of their home country. To comply with this mandate, the IT steering committee should FIRST request

A.

the inclusion of mandatory training for remote device users.

B.

an architectural review to determine appropriate solution design.

C.

an assessment to determine if data privacy protection is addressed.

D.

an update to the acceptable use policy.

Full Access
Question # 197

The board of a start-up company has directed the CIO to develop a technology resource acquisition and management policy. Which of the following should be the MOST important consideration during the development of this policy?

A.

Enterprise growth plans

B.

Industry best practices

C.

Organizational knowledge retention

D.

IT staff competencies

Full Access
Question # 198

The BEST way to manage continuous improvement of governance-related processes is to:

A.

assess existing process resource capacities.

B.

define accountability based on roles and responsibilities.

C.

apply effective quality management practices.

D.

require third-party independent reviews.

Full Access
Question # 199

Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?

A.

Significant gaps are present m the incident documentation.

B.

The incident was not logged in the ticketing system.

C.

Response decisions were made without consulting the appropriate authority.

D.

Response efforts had to be outsourced due to insufficient internal resources.

Full Access
Question # 200

Which of the following would be of MOST concern regarding the effectiveness of risk management processes?

A.

Key risk indicators (KRIs) are not established.

B.

Risk management requirements are not included in performance reviews.

C.

The plans and procedures are not updated on an annual basis.

D.

There is no framework to ensure effective reporting of risk events.

Full Access
Question # 201

Which of the following groups should approve the implementation of new technology?

A.

IT steering committee

B.

IT audit department

C.

Portfolio management office

D.

Program management office

Full Access
Question # 202

A CEO determines the enterprise is lagging behind its competitors in consumer mobile offerings, and mandates an aggressive rollout of several new mobile services within the next 12 months. To ensure the IT organization is capable of supporting this business objective, what should the CIO do FIRST?

A.

Request an assessment of current in-house mobile technology skills.

B.

Create a sense of urgency with the IT team that mobile knowledge is mandatory.

C.

Procure contractors with experience in mobile application development.

D.

Task direct reports with creating training plans for their teams.

Full Access
Question # 203

A CEO is concerned that IT costs have significantly exceeded budget without resulting benefits. The root causes are an overlap of IT projects and a lack of alignment with business demands. Which of the following would BEST enable remediation of this situation?

A.

Require IT business cases be approved by the board of directors.

B.

Assign a set of key risk indicators (KRIs) to each new IT project.

C.

Conduct a performance assessment of IT projects.

D.

Implement an IT portfolio management policy.

Full Access
Question # 204

Of the following, who should be responsible for ensuring the regular review of quality management performance against defined quality metrics?

A.

Process owners

B.

Risk management team

C.

Internal auditors

D.

Executive management

Full Access