Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CGEIT Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following are PRIMARY factors in ensuring the success of an enterprise quality assurance program?

Options:

A.

Enterprise risk appetite and tolerance


B.

Risk management and control frameworks


C.

Continuous improvement plans


D.

A process maturity framework and documented procedures


Expert Solution
Questions # 77:

An enterprise plans to expand into new markets in countries lacking data privacy regulations, increasing risk exposure. Which of the following is the BEST course of action for the CIO?

Options:

A.

Identify business risk appetite and tolerance levels.


B.

Quantify the risk impact and evaluate possible countermeasures.


C.

Limit the personal data available to the high-risk countries.


D.

Mandate the strengthening of user access controls.


Expert Solution
Questions # 78:

A global financial enterprise has been experiencing a substantial number of information security incidents that have directly affected its business reputation. Which of the following should be the IT governance board's FIRST course of action?

Options:

A.

Require revisions to how security incidents are managed by the IT department.


B.

Request an IT security assessment to identify the main security gaps.


C.

Execute an IT maturity assessment of the security process.


D.

Mandate an update to the enterprise's IT security policy.


Expert Solution
Questions # 79:

Which of the following is MOST important to effectively initiate IT-enabled change?

Options:

A.

Establish a change management process.


B.

Obtain top management support and ownership.


C.

Ensure compliance with corporate policy.


D.

Benchmark against best practices.


Expert Solution
Questions # 80:

An enterprise is initiating efforts to improve system availability to mitigate IT risk to the business. Which of the following results would be MOST important to report to the CIO to measure progress?

Options:

A.

Incident severity and downtime trend analysis


B.

Probability and seventy of each IT risk


C.

Financial losses and bad press releases


D.

Customer and stakeholder complaints over time


Expert Solution
Questions # 81:

Which of the following is the MOST important driver of IT governance?

Options:

A.

Effective internal controls


B.

Management transparency


C.

Quality measurement


D.

Technical excellence


Expert Solution
Questions # 82:

Risk management strategies are PRIMARILY adopted to:

Options:

A.

avoid risks for business and IT assets.


B.

take necessary precautions for claims and losses.


C.

achieve acceptable residual risk levels.


D.

achieve compliance with legal requirements.


Expert Solution
Questions # 83:

The board of a start-up company has directed the CIO to develop a technology resource acquisition and management policy. Which of the following should be the MOST important consideration during the development of this policy?

Options:

A.

Enterprise growth plans


B.

Industry best practices


C.

Organizational knowledge retention


D.

IT staff competencies


Expert Solution
Questions # 84:

The board directed the CIO to ensure that required IT resources are available to execute a new enterprise strategy. Which of the following should be done FIRST to support this initiative?

Options:

A.

Implement an IT capability strategy


B.

Perform a gap analysis


C.

Develop a capacity management plan


D.

Develop a resource management plan


Expert Solution
Questions # 85:

Two large financial institutions with different corporate cultures are engaged in a merger. From a governance perspective, which of the following should be the GREATEST concern?

Options:

A.

Technology infrastructure


B.

Risk appetite


C.

Combined cost of operations


D.

Enterprise architecture (EA) integration


Expert Solution
Questions # 86:

Which of the following is the BEST method for determining an enterprise's current appetite for risk?

Options:

A.

Interviewing senior management


B.

Evaluating the balanced scorecard


C.

Reviewing recent audit findings


D.

Assessing social media adoption


Expert Solution
Questions # 87:

The use of new technology in an enterprise will require specific expertise and updated system development processes. There is concern that IT is not properly sourced. Which of the following should be the FIRST course of action?

Options:

A.

Perform a risk assessment on potential outsourcing.


B.

Update the enterprise architecture (EA) with the new technology.


C.

Review the IT balanced scorecard for sourcing opportunities.


D.

Assess the gap between current and required staff competencies.


Expert Solution
Questions # 88:

Senior management wants to expand offshoring to include IT services as other types of business offshoring have already resulted in significant financial benefits for the enterprise. The CIO is currently midway through a successful five-year strategy that relies heavily on internal IT resources. What should the CIO do NEXT?

Options:

A.

Reevaluate the offshoring strategy.


B.

Abandon the current IT strategy.


C.

Continue with the existing IT strategy.


D.

Reevaluate the current IT strategy.


Expert Solution
Questions # 89:

IT has launched new portfolio management policies and processes to improve the alignment of IT projects with enterprise goals. The latest audit report indicates that no improvement has been made due to confusion in the decision-making process. Which of the following is the BEST course of action for the CIO?

Options:

A.

Deliver prioritization and facilitation training.


B.

Implement a performance management framework.


C.

Create an IT portfolio management risk framework.


D.

Develop and communicate an accountability matrix.


Expert Solution
Questions # 90:

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

Options:

A.

Authenticating access to information assets based on roles or business rules.


B.

Implementing multi-factor authentication controls


C.

Granting access to information based on information architecture


D.

Engaging an audit of logical access controls and related security policies


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions