Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CGEIT Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions
Questions # 1:

The CIO of a financial services company is tasked with ensuring IT processes are in compliance with recently instituted regulatory changes. The FIRST course of action should be to:

Options:

A.

align IT project portfolio with regulatory requirements.


B.

create an IT balanced scorecard.


C.

identify the penalties for noncompliance.


D.

perform a current state assessment.


Expert Solution
Questions # 2:

Which of the following situations provides the BEST justification for considering the adoption of a qualitative risk assessment method?

Options:

A.

Determining a quantitative risk score would require complex calculations


B.

It is cost prohibitive to obtain relevant historical quantitative data


C.

There are fewer information assets in the risk register


D.

A higher risk tolerance level has been defined by enterprise leadership


Expert Solution
Questions # 3:

Which of the following is the MOST important consideration regarding IT measures as part of an IT strategic plan?

Options:

A.

Data collection for the metrics is automated.


B.

The metrics can be traced to enterprise goals.


C.

Minimum target levels are realistic.


D.

Thresholds align to key risk indicators (KRIs).


Expert Solution
Questions # 4:

Which of the following is the BEST critical success factor (CSF) to use when changing an IT value management program in an enterprise?

Options:

A.

Documenting the process for the board of directors' approval


B.

Adopting the program by using an incremental approach


C.

Implementing the program through the enterprise's change plan


D.

Aligning the program to the business requirements


Expert Solution
Questions # 5:

Results of an enterprise's customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise's mobile applications are considered inferior compared to legacy browser-based applications. Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?

Options:

A.

Establish service level agreements (SLAs) with the development team.


B.

Identify key risks and mitigation strategies for mobile applications.


C.

Implement key performance indicators (KPIs) that include application quality.


D.

Identify business requirements concerning mobile applications.


Expert Solution
Questions # 6:

An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:

Options:

A.

for robust change management.


B.

for periodic service provider audits.


C.

for enterprise architecture (EA) updates.


D.

to qualify service providers.


Expert Solution
Questions # 7:

A newly established IT steering committee is concerned whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

Options:

A.

Critical success factors (CSFs)


B.

Performance indicators


C.

Capability maturity levels


D.

Balanced scorecard


Expert Solution
Questions # 8:

Six months ago, an enterprise's CIO reorganized IT to improve service delivery to the business. Which of the following would BEST demonstrate the effectiveness of the reorganization?

Options:

A.

The number of help desk calls


B.

A balanced scorecard


C.

A survey of IT staff


D.

IT cost reduction


Expert Solution
Questions # 9:

When developing IT risk management policies and standards, it is MOST important to align them with:

Options:

A.

The corporate risk culture


B.

The enterprise risk management (ERM) framework


C.

Enterprise goals and objectives


D.

Best practices for IT risk management


Expert Solution
Questions # 10:

In which of the following situations is it acceptable to retain data beyond the stated policy?

Options:

A.

The business created an analytics model based on historical records.


B.

There is a high probability that the enterprise will enter into litigation.


C.

New data privacy regulations are expected in a few months.


D.

A core system database is going through an upgrade.


Expert Solution
Questions # 11:

Which of the following is the BEST way to address the risk associated with new IT investments?

Options:

A.

Develop security best practices to protect applications.


B.

Integrate security requirements at the beginning of projects


C.

Establish an enterprise-wide incident response process.


D.

Implement an enterprise-wide security awareness program.


Expert Solution
Questions # 12:

When determining the desired maturity levels for IT governance processes, it is MOST important to:

Options:

A.

Focus on existing strengths as key drivers for the target levels


B.

Ensure target levels are in line with external competitor benchmarks


C.

Agree on target levels in response to need


D.

Ensure that maturity can be achieved at the lowest cost


Expert Solution
Questions # 13:

An enterprise is concerned about the community impact of its data center noise levels. Which of the following is the enterprise’s BEST course of action?

Options:

A.

Proactively reduce after-hours operations


B.

Pursue acquisition of surrounding properties


C.

Wait for a formal complaint to be filed


D.

Seek input from appropriate stakeholders


Expert Solution
Questions # 14:

Which of the following is the MOST comprehensive method to report on overall IT performance to the board of directors?

Options:

A.

Balanced scorecard


B.

Net present value (NPV)


C.

Performance-based payments


D.

Return on investment (ROI)


Expert Solution
Questions # 15:

What is the BEST way for a board of directors to improve its ability to identify material changes to the enterprise IT risk profile?

Options:

A.

Require management to present a comprehensive list of risks.


B.

Require the implementation of a security incident and event management (SIEM) tool.


C.

Review the key risk indicators (KRIs) on a regular basis.


D.

Focus on key performance indicators (KPIs) that predict future business performance.


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions