Pass the Isaca Isaca Certification CGEIT Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following situations provides the BEST justification for considering the adoption of a qualitative risk assessment method?

Options:

A.

Determining a quantitative risk score would require complex calculations


B.

It is cost prohibitive to obtain relevant historical quantitative data


C.

There are fewer information assets in the risk register


D.

A higher risk tolerance level has been defined by enterprise leadership


Expert Solution
Questions # 47:

Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?

Options:

A.

Defined roles.


B.

Replicated systems.


C.

A risk register.


D.

Budget allocation.


Expert Solution
Questions # 48:

An enterprise is considering outsourcing non-core IT processes. Which of the following should be the FIRST step?

Options:

A.

Update resource allocation policies.


B.

Issue a formal request for proposal (RFP) to outsourcing vendors.


C.

Establish service-level metrics for outsourced activities.


D.

Conduct a cost-benefit analysis for outsourcing.


Expert Solution
Questions # 49:

Which of the following is the PRIMARY objective of a data protection impact assessment?

Options:

A.

To identify and analyze how data privacy might be affected by business processes.


B.

To evaluate the quality and integrity of personal data stored in an enterprise.


C.

To estimate the value created by personal data as it progresses through its life cycle.


D.

To ensure key business processes and related data interfaces are documented.


Expert Solution
Questions # 50:

A board of directors has mandated that key performance indicators (KPIs) be developed for all IT projects that are created in support of a business objective. Which of the following MUST be reflected in the KPIs to be effective?

Options:

A.

Future-state architecture


B.

Critical success factors (CSFs)


C.

Portfolio management principles


D.

Key risk indicators (KRIs)


Expert Solution
Questions # 51:

When developing IT risk management policies and standards, it is MOST important to align them with:

Options:

A.

The corporate risk culture


B.

The enterprise risk management (ERM) framework


C.

Enterprise goals and objectives


D.

Best practices for IT risk management


Expert Solution
Questions # 52:

Which of the following is the GREATEST benefit of using the life cycle approach to govern information assets?

Options:

A.

Information availability is improved.


B.

Operational costs are maintained.


C.

Compliance with regulatory requirements is ensured.


D.

Overall costs are optimized.


Expert Solution
Questions # 53:

An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:

Options:

A.

for robust change management.


B.

for periodic service provider audits.


C.

for enterprise architecture (EA) updates.


D.

to qualify service providers.


Expert Solution
Questions # 54:

An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?

Options:

A.

Ensure IT has knowledgeable representation and is included in the strategic planning process.


B.

Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.


C.

Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).


D.

Outsource both IT operations and IT development and implement controls based on a standardized framework.


Expert Solution
Questions # 55:

Which of the following is the BEST way to address the risk associated with new IT investments?

Options:

A.

Develop security best practices to protect applications.


B.

Integrate security requirements at the beginning of projects


C.

Establish an enterprise-wide incident response process.


D.

Implement an enterprise-wide security awareness program.


Expert Solution
Questions # 56:

Which of the following is MOST important to ensure that IT project selections meet the enterprise’s business requirements?

Options:

A.

Development of an enterprise architecture (EA).


B.

Business participation in the selection of IT projects.


C.

Implementation of project stage gates.


D.

Creation of thorough business cases prior to IT project selection.


Expert Solution
Questions # 57:

A CIO engages a consulting firm to conduct a benchmark analysis of the organization’s IT governance framework against industry best practices. Several recommendations to improve the maturity of the framework are identified. Which of the following should be the CIO's NEXT course of action?

Options:

A.

Develop a plan to integrate the recommendations


B.

Appoint a project manager to implement the recommendations


C.

Obtain approval from the IT steering committee to implement the recommendations


D.

Evaluate the feasibility of the recommendations


Expert Solution
Questions # 58:

Which of the following is MOST likely to have a negative impact on

accountability for information risk ownership?

Options:

A.

The risk owner is a department manager, and the control owner is a member of the risk owner's staff.


B.

Information risk is assigned to a department, and an individual owner has not been assigned.


C.

The risk owner and the control owner of the information do not work in the same department.


D.

The same person is listed as both the control owner and the risk owner for the information.


Expert Solution
Questions # 59:

Which of the following would BEST help to ensure the appropriate allocation of IT resources to support an enterprise's mission?

Options:

A.

Develop a resource strategy as part of program management.


B.

Prioritize program requirements based on existing resources.


C.

Implement resource planning for each IT project.


D.

Manage resources as part of the portfolio strategy.


Expert Solution
Questions # 60:

An enterprise's IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

Options:

A.

business to help define IT goals.


B.

business to fund IT services.


C.

IT to define business objectives.


D.

IT and business to define risks.


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions