Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CGEIT Questions and Answers

Question # 6

Which of the following is MOST important to effectively initiate IT-enabled change?

A.

Establish a change management process.

B.

Obtain top management support and ownership.

C.

Ensure compliance with corporate policy.

D.

Benchmark against best practices.

Full Access
Question # 7

An enterprise has had the same IT governance framework in place for several years. Currently, large and small capital projects go through the same architectural governance reviews. Despite repeated requests to streamline the review process for small capital projects, business units have received no response from IT. The business units have recently escalated this issue to the newly appointed GO. Which of the following should be done FIRST to begin addressing business needs?

A.

Create a central repository for the business to submit requests.

B.

Explain the importance of the IT governance framework.

C.

Assess the impact of the proposed change.

D.

Assign a project team to implement necessary changes.

Full Access
Question # 8

Which of the following is PRIMARILY achieved through performance measurement?

A.

Process improvement

B.

Transparency

C.

Cost efficiency

D.

Benefit realization

Full Access
Question # 9

What is the PRIMARY objective for performing an IT due diligence review prior to the acquisition of a competitor?

A.

Document the competitor's governance structure.

B.

Ensure that the competitor understands significant IT risks.

C.

Assess the status of the risk profile of the competitor.

D.

Determine whether the competitor is using industry-accepted practices.

Full Access
Question # 10

Six months ago, an enterprise's CIO reorganized IT to improve service delivery to the business. Which of the following would BEST demonstrate the effectiveness of the reorganization?

A.

The number of help desk calls

B.

A balanced scorecard

C.

A survey of IT staff

D.

IT cost reduction

Full Access
Question # 11

Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?

A.

Significant gaps are present m the incident documentation.

B.

The incident was not logged in the ticketing system.

C.

Response decisions were made without consulting the appropriate authority.

D.

Response efforts had to be outsourced due to insufficient internal resources.

Full Access
Question # 12

A large organization with branches across many countries is in the midst of an enterprise resource planning (ERP) transformation. The IT organization receives news that the branches in a country where the impact to the enterprise is to be greatest are being sold. What should be the NEXT step?

A.

Update the ERP business case and re-evaluate the ROI.

B.

Cancel the ERP transformation and re-allocate project funds.

C.

Adjust the ERP implementation plan and budget.

D.

Continue with the ERP migration according to plan.

Full Access
Question # 13

A board of directors wants to ensure the enterprise is responsive to changes in its environment that would directly impact critical business processes. Which of the following will BEST facilitate meeting this objective?

A.

Scheduling frequent threat analyses

B.

Monitoring key risk indicators (KRIs)

C.

Regularly reviewing the enterprise risk appetite

D.

Implementing a competitive intelligence tool

Full Access
Question # 14

Which of the following would BEST help to improve an enterprise's ability to manage large IT investment projects?

A.

Creating a change management board

B.

Reviewing and evaluating existing business cases

C.

Implementing a review and approval process for each phase

D.

Publishing the IT approval process online for wider scrutiny

Full Access
Question # 15

Which of the following is the BEST course of action to enable effective resource management?

A.

Conduct an enterprise risk assessment.

B.

Implement a cross-training program.

C.

Assign resources based on business priorities.

D.

Assign resources based on risk appetite.

Full Access
Question # 16

Which of the following is the MOST effective means for IT management to report to executive management regarding the value of IT?

A.

IT process maturity level

B.

Cost-benefit analysis

C.

Resource assessment

D.

Balanced scorecard

Full Access
Question # 17

The BEST way to manage continuous improvement of governance-related processes is to:

A.

assess existing process resource capacities.

B.

define accountability based on roles and responsibilities.

C.

apply effective quality management practices.

D.

require third-party independent reviews.

Full Access
Question # 18

An IT strategy committee wants to ensure that a risk program is successfully implemented throughout the enterprise. Which of the following would BEST support this goal?

A.

A risk management framework

B.

Mandatory risk awareness courses for staff

C.

A risk recognition and reporting policy

D.

Commitment from senior management

Full Access
Question # 19

Which of the following BEST reflects the ethical values adopted by an IT organization?

A.

IT principles and policies

B.

IT balanced scorecard

C.

IT governance framework

D.

IT goals and objectives

Full Access
Question # 20

A healthcare enterprise that is subject to strict compliance requirements has decided to outsource several key IT services to third-party providers. Which of the following would be the BEST way to assess compliance and avoid reputational damage?

A.

Require quarterly reports from the providers demonstrating compliance.

B.

Require documentation that the providers have adequate controls in place.

C.

Exercise the right to perform an audit.

D.

Impose monetary penalties for noncompliance.

Full Access
Question # 21

Which of the following groups should approve the implementation of new technology?

A.

IT steering committee

B.

IT audit department

C.

Portfolio management office

D.

Program management office

Full Access
Question # 22

A CEO determines the enterprise is lagging behind its competitors in consumer mobile offerings, and mandates an aggressive rollout of several new mobile services within the next 12 months. To ensure the IT organization is capable of supporting this business objective, what should the CIO do FIRST?

A.

Request an assessment of current in-house mobile technology skills.

B.

Create a sense of urgency with the IT team that mobile knowledge is mandatory.

C.

Procure contractors with experience in mobile application development.

D.

Task direct reports with creating training plans for their teams.

Full Access
Question # 23

An IT steering committee wants the enterprise's mobile workforce to use cloud-based file storage to save non-sensitive corporate data, removing the need for remote access to that information. Before this change is implemented, what should be included in the data management policy?

A.

A mandate for periodic employee training on how to classify corporate data files

B.

A mandate for the encryption of all corporate data files at rest that contain sensitive data

C.

A process for blocking access to cloud-based apps if inappropriate content is discovered

D.

A requirement to scan approved cloud-based apps for inappropriate content

Full Access
Question # 24

An enterprise has a zero-tolerance policy regarding security. This policy is causing a large number of email attachments to be blocked and is a disruption to enterprise. Which of the following should be the FIRST governance step to address this email issue?

A.

Direct the development of an email usage policy.

B.

Obtain senior management input based on identified risk.

C.

Recommend business sign-off on the zero-tolerance policy.

D.

Introduce an exception process.

Full Access
Question # 25

A large financial institution is considering outsourcing customer call center operations which will allow the chosen vendor to access systems from offshore locations. Which of the following represents the GREATEST risk?

A.

Inconsistent customer service and reporting

B.

Loss of data confidentiality

C.

Lack of network availability

D.

Inadequate business continuity planning

Full Access
Question # 26

Establishing a uniform definition for likelihood and impact through risk management standards PRIMARILY addresses which of the following concerns?

A.

Inconsistent categories of vulnerabilities

B.

Conflicting interpretations of risk levels

C.

Inconsistent data classification

D.

Lack of strategic IT alignment

Full Access
Question # 27

A company is considering selling products online, and the CIO has been asked to advise the board of directors of potential problems with this strategy. Which of the following is the ClO's BEST course of action?

A.

Review the security framework.

B.

Conduct a return on investment (ROI) analysis.

C.

Review the enterprise architecture (EA).

D.

Perform a risk assessment.

Full Access
Question # 28

An enterprise has a large backlog of IT projects. The current strategy is to execute projects as they are submitted, but executive management does not believe this method is optimal. Which of the following is the MOST important action to address this concern?

A.

Implement stage-gating to determine the value of each project.

B.

Establish a performance dashboard that determines business value.

C.

Implement a methodology to prioritize projects based on resource availability.

D.

Create a combined business/IT committee to determine project prioritization.

Full Access
Question # 29

Enterprise IT has overseen the implementation of an array of data services with overlapping functionality leading to business inefficiencies. Which of the following is the MOST likely cause of this situation?

A.

insufficient information architecture

B.

Ineffective project management

C.

An outdated service level agreement (SLA)

D.

An incomplete cost-benefit analysis

Full Access
Question # 30

An enterprise plans to implement a business intelligence (Bl) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

A.

Interface issues between enterprise and Bl applications

B.

Large volumes of data fed from enterprise applications

C.

The need for staff to be trained on the new Bl tool

D.

Data definition and mapping sources from applications

Full Access
Question # 31

To generate value for the enterprise, it is MOST important that IT investments are:

A.

aligned with the IT strategic objectives.

B.

approved by the CFO.

C.

consistent with the enterprise's business objectives.

D.

included in the balanced scorecard.

Full Access
Question # 32

IT has launched new portfolio management policies and processes to improve the alignment of IT projects with enterprise goals. The latest audit report indicates that no improvement has been made due to confusion in the decision-making process. Which of the following is the BEST course of action for the CIO?

A.

Deliver prioritization and facilitation training.

B.

Implement a performance management framework.

C.

Create an IT portfolio management risk framework.

D.

Develop and communicate an accountability matrix.

Full Access
Question # 33

An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?

A.

Revising the business $ balanced store card

B.

Updating the business risk profile

C.

Changing the IT steering committee charter

D.

Calculating the cost of the current solution

Full Access
Question # 34

Which of the following are PRIMARY factors in ensuring the success of an enterprise quality assurance program?

A.

Enterprise risk appetite and tolerance

B.

Risk management and control frameworks

C.

Continuous improvement plans

D.

A process maturity framework and documented procedures

Full Access
Question # 35

Which of the following is the MOST important attribute of an information steward?

A.

The information steward manages the systems that process the relevant data.

B.

The information steward has expertise in managing data quality systems.

C.

The information steward is closely aligned with the business function.

D.

The information steward is part of the information architecture group.

Full Access
Question # 36

A chief technology officer (CTO) wants to ensure IT governance practices adequately address risk management specific to mobile applications. To create the appropriate risk policies for IT, it is MOST important for the CTO to:

A.

understand the enterprise's risk tolerance.

B.

create an IT risk scorecard.

C.

map the business goals to IT risk processes.

D.

identify the mobile technical requirements.

Full Access
Question # 37

Which of the following is MOST critical for the successful implementation of an IT process?

A.

Process framework

B.

Service delivery process model

C.

Objectives and metrics

D.

IT process assessment

Full Access
Question # 38

Which of the following would be of MOST concern regarding the effectiveness of risk management processes?

A.

Key risk indicators (KRIs) are not established.

B.

Risk management requirements are not included in performance reviews.

C.

The plans and procedures are not updated on an annual basis.

D.

There is no framework to ensure effective reporting of risk events.

Full Access
Question # 39

Which of the following is the MOST important consideration for data classification to be successfully implemented?

A.

Users should be provided with clear instructions that are easy to follow and understand.

B.

The data classification tools integrate with other tools that help manage the data.

C.

The classification scheme should be closely aligned with the IT strategic plan.

D.

Senior management should be properly trained in monitoring compliance.

Full Access
Question # 40

Which of the following is the PRIMARY benefit of communicating the IT strategy across the enterprise?

A.

On-time and on-budget delivery of strategic projects

B.

Improvement in IT balanced scorecard performance

C.

Optimization of IT investment in supporting business objectives

D.

Reduced organizational resistance during strategy execution

Full Access
Question # 41

Acceptance of an enterprise's newly implemented IT governance initiatives has been resisted by a functional group requesting more autonomy over technology choices. Which of the following is MOST important to accommodate this need for autonomy?

A.

Continuous improvement processes

B.

Documentation of key management practices

C.

An exception management process

D.

A change control process

Full Access
Question # 42

The use of new technology in an enterprise will require specific expertise and updated system development processes. There is concern that IT is not properly sourced. Which of the following should be the FIRST course of action?

A.

Perform a risk assessment on potential outsourcing.

B.

Update the enterprise architecture (EA) with the new technology.

C.

Review the IT balanced scorecard for sourcing opportunities.

D.

Assess the gap between current and required staff competencies.

Full Access
Question # 43

A multinational enterprise recently purchased a large company located in a different country. When introducing the concept of governance to the new acquisition, it is MOST important that executive management recognize:

A.

language differences.

B.

the use of international standards.

C.

the impact of cultural changes.

D.

globally recognized good practices.

Full Access
Question # 44

An enterprise is planning to replace multiple enterprise resource planning (ERP) systems at various regions with one company-wide ERP system. The main objective of this change is to achieve economies of scale efficiencies resulting in cost reductions. To meet this objective, what is the BEST approach in the planning phase of the project?

A.

Implement an ERP system on shared resources with the lowest cost.

B.

Minimize customization by standardizing ERP processes across regions.

C.

Adopt a best in breed web-based architecture for the ERP system.

D.

Use a service provider to evaluate and implement the new ERP processes.

Full Access
Question # 45

Which of the following BEST reflects mature risk management in an enterprise?

A.

A regularly updated risk register

B.

Ongoing risk assessment

C.

Ongoing investment in risk mitigation

D.

Responsive risk awareness culture

Full Access
Question # 46

An enterprise has been focused on establishing an IT risk management framework. Which of the following should be the PRIMARY motivation behind this objective?

A.

Promoting responsibility throughout the enterprise for managing IT risk.

B.

Increasing the enterprise's risk tolerance level and risk appetite.

C.

Engaging executives in examining IT risk when developing policies.

D.

Maintaining a complete and accurate risk registry to belief manage IT risk

Full Access
Question # 47

Risk management strategies are PRIMARILY adopted to:

A.

avoid risks for business and IT assets.

B.

take necessary precautions for claims and losses.

C.

achieve acceptable residual risk levels.

D.

achieve compliance with legal requirements.

Full Access
Question # 48

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Full Access
Question # 49

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

A.

Require an update to enterprise data policies.

B.

Request an impact analysis.

C.

Review documented data interdependence.

D.

Validate against existing architecture.

Full Access
Question # 50

Who is PRIMARILY accountable for delivering the benefits of an IT-enabled investment program to the enterprise?

A.

Program manager

B.

IT steering committee chair

C.

CIO

D.

Business sponsor

Full Access
Question # 51

Which of the following is the MOST important benefit of developing an information architecture model consistent with enterprise strategy?

A.

It identifies information architecture priorities.

B.

It support and facilitates decision making.

C.

It enables information architecture roadmap updates.

D.

It optimizes information delivery and storage costs.

Full Access
Question # 52

Senior management wants to promote investment in IT, but is uncertain that associated risks are being properly identified. The BEST way to address this concern is to:

A.

engage an external consultant to develop risk scenarios.

B.

appoint an IT representative to the business risk committee.

C.

assign an IT cost controller to the finance department.

D.

ensure business cases are developed by IT.

Full Access
Question # 53

The board of directors of an enterprise has approved a three-year IT strategic program to centralize the core business processes of its global entities into one core system. Which of the following should be the ClO's NEXT step?

A.

Engage a team to perform a business impact analysis (BIA).

B.

Require the development of a risk management plan.

C.

Determine resource requirements for program implementation.

D.

Require the development of a program roadmap.

Full Access
Question # 54

An enterprise considers implementing a system that uses a technology that is not in line with its IT strategy. The business case indicates significant benefit to the enterprise. Which of the following is the BEST way to manage this situation within an IT governance framework?

A.

Update the IT strategy to align with the new technology.

B.

Initiate an operational change request.

C.

Reject based on non-alignment.

D.

Address as part of an architecture exception process.

Full Access
Question # 55

When developing effective metrics for the measurement of solution delivery, it is MOST important to:

A.

establish project controls and monitoring objectives.

B.

perform an objective analysis of the project roadmap.

C.

establish the objectives and expected benefits.

D.

specify quantitative measures for solution delivery.

Full Access
Question # 56

An IT audit reveals inconsistent maintenance of data privacy in enterprise systems primarily due to a lack of data sensitivity categorizations. Once the categorizations are defined, what is the BEST long-term strategic response by IT governance to address this problem?

A.

Standardize data classification processes throughout the enterprise.

B.

Incorporate enterprise privacy categorizations into contracts.

C.

Require business impact analyses (BIAs) for enterprise systems.

D.

Reassess the data governance policy.

Full Access
Question # 57

Results of an enterprise's customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise's mobile applications are considered inferior compared to legacy browser-based applications. Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?

A.

Establish service level agreements (SLAs) with the development team.

B.

Identify key risks and mitigation strategies for mobile applications.

C.

Implement key performance indicators (KPIs) that include application quality.

D.

Identify business requirements concerning mobile applications.

Full Access
Question # 58

Which of the following would be the PRIMARY impact on IT governance when a business strategy is changed?

A.

Performance outcomes of IT objectives

B.

IT governance structure

C.

Maturity level of IT processes

D.

Relationship level with IT outsourcers

Full Access
Question # 59

Which of the following is the MOST valuable input when quantifying the loss associated with a major risk event?

A.

Key risk indicators (KRIs)

B.

IT environment threat modeling

C.

Business impact analysis (BIA) report

D.

Recovery time objectives (RTOs)

Full Access
Question # 60

The PRIMARY benefit of integrating IT resource planning into enterprise strategic planning is that it enables the enterprise to:

A.

allocate resources efficiently to achieve desired goals.

B.

adjust business goals depending upon resource availability.

C.

prioritize resource allocation based on sourcing strategy.

D.

develop tactical plans to achieve resource optimization.

Full Access
Question # 61

Which of the following is the PRIMARY element in sustaining an effective governance framework?

A.

Identification of optimal business resources

B.

Establishment of a performance metric system

C.

Ranking of critical business risks

D.

Assurance of the execution of business controls

Full Access
Question # 62

Prior to setting IT objectives, an enterprise MUST have established its:

A.

architecture.

B.

policies.

C.

strategies.

D.

controls.

Full Access
Question # 63

A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?

A.

Mitigate and track data-related issues and risks.

B.

Modify legal and regulatory data requirements.

C.

Define data protection and privacy practices.

D.

Assess the information governance framework.

Full Access
Question # 64

An audit report has revealed that data scientists are analyzing sensitive "big data" files using an offsite cloud because corporate servers do not have the necessary processing capabilities. A review of policies indicates this practice is not prohibited. Which of the following should be the FIRST strategic action to address the report?

A.

Authorize a risk analysis of the practice.

B.

Update data governance practices.

C.

Revise the information security policy.

D.

Recommend the use of a private cloud.

Full Access
Question # 65

Which of the following would BEST enable business innovation through IT?

A.

Outsourcing of IT to a strategic business partner

B.

Business participation in IT strategy development

C.

Adoption of a standardized business development life cycle

D.

IT participation in business strategy development

Full Access
Question # 66

The IT department has determined that problems with a business report are due to quality issues within a set of data to whom should IT refer the matter for resolution?

A.

Internal audit

B.

Data architect

C.

Business analyst

D.

Data steward

Full Access
Question # 67

An enterprise has committed to the implementation of a new IT governance model. The BEST way to begin this implementation is to:

A.

identify IT services that currently support the enterprise’s capability.

B.

define policies for data, applications, and organization of infrastructure.

C.

identify the role of IT in supporting the business.

D.

prioritize how much and where to invest in IT.

Full Access
Question # 68

An enterprise's board of directors can BEST manage enterprise risk by:

A.

mandating board-approved enterprise risk management (ERM) modifications.

B.

requiring the establishment of an enterprise risk management (ERM) framework.

C.

requiring the establishment of an enterprise-wide program management office.

D.

ensuring the cost-effectiveness of the internal control system.

Full Access
Question # 69

An enterprise has entered into a new market which brings additional regulatory compliance requirements. What should be done FIRST to address these requirements?

A.

Outsource the compliance process.

B.

Appoint a compliance officer.

C.

Update the organization's risk profile.

D.

Have executive management monitor compliance.

Full Access
Question # 70

Facing financial struggles, a CEO mandated severe budget cuts. A decision was also made to immediately change the enterprise strategic focus to put more reliance on mobile, cloud, and wireless services in an effort to boost revenue. The IT steering committee has asked the CIO tosuggest adjustments to the current IT project portfolio to allow support for the new direction despite fewer funds. What should the CIO advise the committee to do FIRST?

A.

Ask business stakeholders to discuss their vision for the new strategy.

B.

Cancel projects with a net present value (NPV) below a defined threshold.

C.

Conduct a risk assessment against the potential new services.

D.

Start re-allocating budget to projects involving mobile or cloud.

Full Access
Question # 71

An enterprise is concerned with the potential for data leakage as a result of increased use of social media in the workplace, and wishes to establish a social media strategy. Which of the following should be the MOST important consideration in developing this strategy?

A.

Criticality of the information

B.

Ensuring that the enterprise architecture (EA) is updated

C.

Data ownership

D.

The balance between business benefits and risk

Full Access
Question # 72

Which of the following should be the FIRST action taken by a newly formed IT governance committee to ensure reports are compliant with regulations and identify key IT risks?

A.

Direct the development of a reporting communication plan.

B.

Develop and monitor IT key risk indicator (KRI) triggers.

C.

Train end users on regulation requirements.

D.

Implement a mechanism to ensure reporting escalation.

Full Access
Question # 73

When considering an IT change that would enable a potential new line of business, the FIRST strategic step for IT governance would be to ensure agreement among the stakeholders regarding:

A.

objectives to achieve goals.

B.

metrics to measure effectiveness

C.

a vision for the future state,

D.

a change response plan

Full Access
Question # 74

As part of the implementation of IT governance, the board of an enterprise should establish an IT strategy committee to:

A.

provide input to and ensure alignment of the enterprise and IT strategies.

B.

ensure IT risks inherent in the enterprise strategy implementation are managed

C.

drive IT strategy development and take responsibility for implementing the IT strategy.

D.

assume governance accountability for the business strategy on behalf of the board

Full Access
Question # 75

Which of the following should be the PRIMARY governance objective for selecting key risk indicators (KRIs) related to legal and regulatory compliance?

A.

Identifying the risk of noncompliance

B.

Demonstrating sound risk management practices

C.

Measuring IT alignment with enterprise risk management (ERM)

D.

Ensuring the effectiveness of IT compliance controls

Full Access
Question # 76

Which of the following is the BEST outcome measure to determine the effectiveness of IT nsk management processes?

A.

Frequency of updates to the IT risk register

B.

Time lag between when IT risk is identified and the enterprise's response

C.

Number of events impacting business processes due to delays in responding to risks

D.

Percentage of business users satisfied with the quality of risk training

Full Access
Question # 77

When selecting a vendor to provide services associated with a critical application which of the following is the MOST important consideration with respect to business continuity planning (BCP)?

A.

Procuring a copy of the vendor's BCP during the contracting process

B.

Testing the vendor's BCP and analyzing the results

C.

Obtaining independent audit reports of the vendor's BCP

D.

Evaluating whether the vendor's BCP aligns with the enterprise's BCP

Full Access
Question # 78

Which of the following is the PRIMARY purpose of an effective set of key risk indicators (KRIs)?

A.

Identifying possible future adverse impacts on the enterprise

B.

Evaluating existing technology for risk monitoring capabilities

C.

Establishing executive level buy-in of the risk program

D.

Quantifying the productivity of the risk management team

Full Access
Question # 79

The PRIMARY objective of promoting business ethics within the IT enterprise should be to ensure:

A.

trust among internal and external stakeholders.

B.

employees act more responsibly.

C.

corporate social responsibility.

D.

legal and regulatory compliance.

Full Access
Question # 80

Which of the following is MOST important for IT governance to have in place to ensure the enterprise can maintain operations during extensive system downtime?

A.

Fault-tolerant hardware

B.

An incident response plan

C.

A crisis communications plan

D.

A business continuity plan (BCP)

Full Access
Question # 81

An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?

A.

Calculating the cost of the current solution

B.

Updating the business risk profile

C.

Changing the IT steering committee charter

D.

Revising the business's balanced scorecard

Full Access
Question # 82

Which of the following is MOST important to the successful implementation of enterprise architecture (EA)?

A.

Developing data modeling tools

B.

Managing the challenge of change

C.

Reducing the cost of IT investments

D.

Establishing key performance indicators (KPIs)

Full Access
Question # 83

Which of the following is the BEST way to ensure all enterprise employees understand the corporate code of business conduct?

A.

Conduct scheduled and random compliance audits.

B.

Mandate annual ethics training that includes an exam.

C.

Require external business activities be documented and reported.

D.

Distribute a copy of the code and require a signature.

Full Access
Question # 84

Which of the following would provide the MOST useful information to understand the associated risks when implementing a new digital transformation strategy?

A.

Risk policy

B.

Risk framework

C.

Risk heat map

D.

Risk register

Full Access
Question # 85

Which of the following should be the FIRST step in updating an IT strategic plan?

A.

Revise the enterprise architecture (EA).

B.

Review IT performance objectives and indicators.

C.

Evaluate IT capabilities and resources.

D.

Identify changes in enterprise goals.

Full Access
Question # 86

Which of the following should be the FIRST step in planning an IT governance implementation?

A.

Assign decision-making responsibilities.

B.

Obtain necessary business funding.

C.

Define key business performance indicators.

D.

Identify business drivers.

Full Access
Question # 87

An enterprise has identified a number of plausible risk scenarios that could result in economic loss associated with major IT investments. Which of the following is the BEST method to assess the risk?

A.

Cost-benefit analysis

B.

Qualitative analysis

C.

Business impact analysis (BIA)

D.

Quantitative analysis

Full Access
Question # 88

Which of the following decisions would be made by the IT strategy committee?

A.

Communication plan for a major IT initiative

B.

Cloud implementation and support plan

C.

Enterprise risk management (ERM) framework

D.

Composition of the investment portfolio

Full Access
Question # 89

The FIRST step in aligning resource management to the enterprise's IT strategic plan would be to

A.

develop a responsible, accountable, consulted and informed (RACI) chart

B.

assign appropriate roles and responsibilities

C.

perform a gap analysis

D.

identify outsourcing opportunities

Full Access
Question # 90

Which of the following is MOST important to document for a business ethics program?

A.

Guiding principles and best practices

B.

Violation response matrix

C.

Whistle-blower protection protocols.

D.

Employee awareness and training content

Full Access
Question # 91

Which of the following BEST supports enterprise decision making for IT resource allocation?

A.

IT-related regulatory requirements

B.

Enterprise IT strategy

C.

Enterprise IT risk assessment

D.

IT balanced scorecard

Full Access
Question # 92

Which of the following BEST indicates that a change management process has been implemented successfully?

A.

Maturity levels

B.

Degree of control

C.

Process performance

D.

Outcome measures

Full Access
Question # 93

Which of the following would be the MOST effective way to ensure IT capabilities are appropriately aligned with business requirements for specific business processes?

A.

Establishing key performance indicators {KPIs)

B.

Requiring Internal IT architecture and design reviews

C.

Requiring architecture and design reviews with business process stakeholders

D.

Issuing a management mandate that IT and business process stakeholders work together

Full Access
Question # 94

A business has outsourced IT operations to several third-party providers, but service level agreements (SLAs) are not clearly defined in all cases. Which of the following is the GREATEST risk to the business?

A.

Costs are not measurable.

B.

Third parties could provide overlapping services.

C.

The scope of work is not clearly defined.

D.

Quality of services is not enforceable.

Full Access
Question # 95

The PRIMARY benefit of using an IT service catalog as part of the IT governance program is that it.

A.

ensures IT effectively meets future business needs,

B.

provides a foundation for measuring IT performance,

C.

improves the ability to allocate IT resources

D.

establishes enterprise performance metrics per service

Full Access
Question # 96

Which of the following is the PRIMARY responsibility of a data steward?

A.

Ensuring the appropriate users have access to the right data

B.

Developing policies for data governance

C.

Reporting data analysis to the board

D.

Classifying and labeling organizational data assets

Full Access
Question # 97

Which of the following provides the BEST evidence of an IT risk-aware culture across an enterprise?

A.

Business staff report identified IT risks.

B.

IT risks are communicated to the business.

C.

IT risk-related policies are published.

D.

The IT infrastructure is resilient.

Full Access
Question # 98

The CIO of a large enterprise has taken the necessary steps to align IT objectives with business objectives. What is the BEST way for the CIO to ensure these objectives are delivered effectively by IT staff?

A.

Map the IT objectives to an industry-accepted framework.

B.

Enhance Ihe budget for training based on the IT objectives.

C.

Include the IT objectives in staff performance plans.

D.

Include CIO sign-off of the objectives as part of the IT strategic plan.

Full Access
Question # 99

Which of the following is MOST important to review during IT strategy development?

A.

Industry best practices

B.

IT balanced scorecard

C.

Current business environment

D.

Data flows that indicate areas requiring IT support

Full Access
Question # 100

Enterprise leadership is concerned with the potential for discrimination against certain demographic groups resulting from the use of machine learning models What should be done FIRST to address this concern?

A.

Obtain stakeholders' input regarding the ethics associated with machine learning

B.

Revise the code of conduct to discourage bias within automated processes

C.

Develop a machine learning policy articulating guidelines for machine learning use

D.

Assess recent case law related to the enterprise's machine learning business strategy

Full Access
Question # 101

IT maturity models measure:

A.

performance.

B.

value.

C.

capabilities.

D.

outcome.

Full Access
Question # 102

Individual business units within an enterprise have been designing their own IT solutions without consulting the IT department. From a governance perspective, what is the GREATEST issue associated with this situation?

A.

Security controls may not meet IT requirements.

B.

The enterprise does not have the skills to manage the solutions.

C.

The solutions conflict with IT goals and objectives.

D.

The solution may conflict with existing enterprise goals.

Full Access
Question # 103

When conducting a risk assessment in support of a new regulatory requirement, the IT risk committee should FIRST consider the:

A.

disruption to normal business operations.

B.

risk profile of the enterprise.

C.

readiness of IT systems to address

D.

the risk cost burden to achieve compliance.

Full Access
Question # 104

Which of the following should be the FIRST consideration for an enterprise faced with a pandemic situation resulting in a mandatory remote work environment?

A.

Reviewing and testing disaster recovery plans (DRPs)

B.

Ensuring staff has the necessary technology to be productive

C.

Ensuring remote work policies are updated and communicated

D.

Revising IT performance monitoring metrics

Full Access
Question # 105

An enterprise is planning to outsource data processing for personally identifiable information (Pll). When is the MOST appropriate time to define the requirements for security and privacy of information?

A.

When issuing requests for proposals (RFPs)

B.

After an assessment of the current information architecture.

C.

When developing service level agreements (SLAs)

D.

During the initial vendor selection process

Full Access
Question # 106

An enterprise has decided to implement an enterprise resource planning (ERP) system to achieve operating and cost efficiencies through global IT standardization. The business units are resistant because they are used to operating autonomously. The CEO has instructed the CIO to move quickly with the implementation to force acceptance with business unit leaders. Which of the following should be the ClO's FIRST step?

A.

Build a governance framework for identifying non-standard processes.

B.

Request funding from the CEO to hire ERP consultants.

C.

Ask the CEO to be the sponsor of the program

D.

Engage a reluctant business unit to conduct a proof-of-concept pilot.

Full Access
Question # 107

An enterprise-wide strategic plan has been approved by the board of directors. Which of the following would BEST support the planning of IT investments required for the enterprise?

A.

Service-oriented architecture

B.

Enterprise architecture (EA)

C.

Contingency planning

D.

Enterprise balanced scorecard

Full Access
Question # 108

Which of the following BEST supports an enterprise's ability to comply with privacy laws and regulations?

A.

Complete inventory of enterprise data

B.

Implementation of a breach notification process

C.

Accurate classification of enterprise data

D.

Robust enterprise policy related to data retention

Full Access
Question # 109

An IT strategy committee wants to ensure stakeholders understand who owns each strategic objective. To enable this understanding, which of the following should be communicated to stakeholders?

A.

A RACI chart

B.

The strategic plan

C.

Performance measure

D.

Risk owners

Full Access
Question # 110

Which of the following would be the BEST long-term solution to address the concern regarding loss of experienced staff?

A.

implement knowledge management practices

B.

Establish a mentoring program for IT staff

C.

Determine key risk indicators (KRIs)

D.

Retain key staff as consultants.

Full Access
Question # 111

Which of the following BEST facilitates governance oversight of data protection measures?

A.

Information ownership

B.

Information classification

C.

Information custodianship

D.

Information life cycle management

Full Access
Question # 112

An IT department has forwarded a request to the IT strategy committee for funding of a discretionary Investment. The committee's MOST important consideration should be to evaluate:

A.

the technical feasibility of the investment.

B.

the business and technical scope of the investment •

C.

whether the investment supports corporate goals

D.

whether the investment aligns with the enterprise architecture (EA).

Full Access
Question # 113

Which of the following should be the FIRST step for executive management to take in communicating what is considered acceptable use with regard to personally owned devices for company business?

A.

Require employees to read and sign a disclaimer.

B.

Develop and disseminate an applicable policy.

C.

Post awareness messages throughout the facility.

D.

Provide training on how to protect data on personal devices.

Full Access
Question # 114

Which of the following is a PRIMARY responsibility of the CIO when an enterprise plans to replace its enterprise resource applications?

A.

Reviewing the IT application portfolio

B.

Evaluating and selecting application vendors

C.

Ensuring IT architecture requirements are considered

D.

Establishing software quality criteria

Full Access
Question # 115

To develop appropriate measures to improve organizational performance, the measures MUST be:

A.

a result of benchmarking and comparative analysis.

B.

accepted by and meaningful to the stakeholders.

C.

based on existing and validated data sources.

D.

approved by the IT steering committee.

Full Access
Question # 116

Establishing a uniform definition for likelihood and impact BEST enables an enterprise to:

A.

reduce variance in the assessment of risk.

B.

develop key risk indicators (KRIs).

C.

prioritize threat assessment.

D.

reduce risk appetite and tolerance levels.

Full Access
Question # 117

Which of the following is the BEST indication that information security requirements are taken into consideration when developing IT processes?

A.

The database is deployed in a distributed processing platform

B.

The information architecture incorporates data classification

C.

Customer profiles are stored with a domestic service provider

D.

The integrity of sensitive information is periodically reviewed

Full Access
Question # 118

Which of the following would BEST support an enterprise's initiative to incorporate desired organizational behaviors into the IT governance framework?

A.

Enterprise code of ethics

B.

Risk mitigation strategies and action plans

C.

Documented consequences for noncompliance

D.

Enterprise RACI matrix

Full Access
Question # 119

Reviewing which of the following should be the FIRST step when evaluating the possibility of outsourcing an IT system?

A.

Outsourcing strategy

B.

Outsourced business processes

C.

Service level agreements (SLAs)

D.

IT staff skill sets

Full Access
Question # 120

Which of the following should be the PRIMARY goal of implementing an IT strategic planning process?

A.

Determining benefits from IT deployments

B.

Optimizing IT resources to drive innovation

C.

Directing business strategy to achieve goals

D.

Translating business needs into IT initiatives

Full Access
Question # 121

Which of the following would be MOST useful for prioritizing IT improvement initiatives to achieve desired business outcomes?

A.

Budget variance analysis

B.

Enterprise architecture (EA)

C.

IT skills matrix

D.

Portfolio management

Full Access
Question # 122

An enterprise's decision to move to a virtualized architecture will have the GREATEST impact on:

A.

system life cycle management.

B.

asset classification.

C.

vendor management

D.

vulnerability management.

Full Access
Question # 123

Which of the following activities MUST be completed before developing an IT strategic plan?

A.

Review the enterprise business plan

B.

Align the enterprise vision statement with business processes

C.

Develop an enterprise architecture (EA) framework

D.

Review the enterprise risk tolerance level

Full Access
Question # 124

Which of the following is the MOST important input for designing a development program to help IT employees improve their ability to respond to business needs?

A.

Capability maturity model

B.

Cost-benefit analysis

C.

Skills competency assessment

D.

Annual performance evaluation

Full Access
Question # 125

When developing an IT training plan, which of the following is the BEST way to ensure that resource skills requirements are identified?

A.

Extract training requirements from deficiencies reported in customer service satisfaction surveys.

B.

Ask managers to determine IT training requirements annually.

C.

Determine training needs based on the capabilities to support the IT strategy.

D.

Survey employees for IT skills requirements based upon technology trends.

Full Access
Question # 126

To enable IT to deliver adequate services and maintain availability of a web-facing infrastructure, an IT governance committee should FIRST establish:

A.

web operations procedures.

B.

business continuity plans (BCPs).

C.

key performance indicators (KPIs).

D.

customer survey processes.

Full Access
Question # 127

An enterprise has finalized a major acquisition and a new business strategy in line with stakeholder needs has been introduced to help ensure continuous alignment of IT with the new business strategy the CiO should FIRST

A.

review the existing IT strategy against the new business strategy

B.

revise the existing IT strategy to align with the new business strategy

C.

establish a new IT strategy committee for the new enterprise

D.

assess the IT cultural aspects of the acquired entity

Full Access
Question # 128

Despite an adequate training budget. IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?

A.

Provide incentives for IT staff to attend outside conferences and training

B.

Create a standard-setting center of excellence for IT.

C.

Require human resources (HR) to recruit new talent using an established IT skills matrix.

D.

Establish an agreed-upon skills development plan with each employee

Full Access
Question # 129

Which of the following is the BEST indicator of effective IT governance?

A.

Regulatory authorities have given a favorable report on IT controls.

B.

Executive management is involved in important IT decisions and activities.

C.

The chief information security officer (CISO) reports to a board member.

D.

IT management is proactive in reporting IT project status to executive management.

Full Access
Question # 130

Which of the following is the PRIMARY responsibility of a data steward at an enterprise with mature data management programs?

A.

Implementing processes for data collection and use

B.

Ensuring compliance with data privacy laws and regulations

C.

Establishing data quality requirements and metrics

D.

Developing data-related policies and procedures

Full Access
Question # 131

Which of the following is MOST likely to have a negative impact on

accountability for information risk ownership?

A.

The risk owner is a department manager, and the control owner is a member of the risk owner's staff.

B.

Information risk is assigned to a department, and an individual owner has not been assigned.

C.

The risk owner and the control owner of the information do not work in the same department.

D.

The same person is listed as both the control owner and the risk owner for the information.

Full Access
Question # 132

Which of the following BEST enables effective enterprise risk management (ERM)?

A.

Risk register

B.

Risk ownership

C.

Risk tolerance

D.

Risk training

Full Access
Question # 133

A CIO realizes a significant change is required in the way IT responds to key external customers and needs to gain support from the enterprise to address this situation. What should be done FIRST?

A.

Empower key IT staff to implement a solution.

B.

Establish new customer service policies.

C.

Engage customer service training providers.

D.

Engage the IT steering committee.

Full Access
Question # 134

A newly established IT steering committee is concerned whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

A.

Critical success factors (CSFs)

B.

Performance indicators

C.

Capability maturity levels

D.

Balanced scorecard

Full Access
Question # 135

When an enterprise plans to deploy mobile device technologies, it is MOST important for leadership to ensure that:

A.

Users agree to an acceptable use policy

B.

Appropriate controls are implemented

C.

The IT policy addresses mobile devices

D.

The project management office (PMO) is engaged

Full Access
Question # 136

When selecting a cloud provider, which of the following provides the MOST comprehensive information regarding the current status and effectiveness of the provider's controls?

A.

Globally recognized certification

B.

Third-party audit report

C.

Control self-assessment (CSA)

D.

Maturity assessment

Full Access
Question # 137

Which of the following is the MOST important consideration regarding IT measures as part of an IT strategic plan?

A.

Data collection for the metrics is automated.

B.

The metrics can be traced to enterprise goals.

C.

Minimum target levels are realistic.

D.

Thresholds align to key risk indicators (KRIs).

Full Access
Question # 138

Which of the following roles is accountable for the confidentiality, integrity, and availability of information within an enterprise?

A.

Data owner

B.

Lead legal counsel

C.

Risk manager

D.

Data custodian

Full Access
Question # 139

As a result of a new regulatory requirement, an enterprise’s board has mandated that steps be taken to ensure related IT governance activities are performing as originally designed and are continuously improved. Which of the following is the BEST approach?

A.

Mandate ongoing enterprise risk and control self-assessments (CSAs)

B.

Conduct quarterly reviews of the enterprise business architecture

C.

Engage periodic external audit reviews of IT governance processes

D.

Require annual mapping of key IT governance processes

Full Access
Question # 140

An enterprise wants to implement metrics to monitor the performance of its IT portfolio. Whose input is MOST important to consider when establishing these metrics?

A.

Project management office (PMO).

B.

IT executives.

C.

The chief executive officer (CEO).

D.

Business unit stakeholders.

Full Access
Question # 141

An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?

A.

Ensure IT has knowledgeable representation and is included in the strategic planning process.

B.

Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.

C.

Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).

D.

Outsource both IT operations and IT development and implement controls based on a standardized framework.

Full Access
Question # 142

An enterprise has an overarching enterprise architecture (EA) document. The CIO is concerned that EA is not leveraged in recent IT-enabled investments. Which of the following would BEST help to address these concerns and enforce the leveraging of EA?

A.

Form a team to update EA regularly.

B.

Require EA review at key milestones.

C.

Publish and train on the EA document.

D.

Adopt a globally recognized EA framework.

Full Access
Question # 143

An enterprise recently experienced a major breach that was escalated effectively. However, the recovery took far longer than expected, resulting in significant financial loss. Which of the following is MOST likely the root cause of this scenario?

A.

Key performance indicators (KPIs) were not regularly monitored

B.

The recovery point objective (RPO) was not established

C.

The disaster recovery plan (DRP) was not routinely updated

D.

The business continuity plan (BCP) was not recently tested

Full Access
Question # 144

Which of the following should be considered FIRST when assessing the implications of new external regulations on IT compliance?

A.

IT policies and procedures that need revision

B.

Resource burden for implementation

C.

Gaps in skills and experience of IT employees

D.

Impact on contracts with service providers

Full Access
Question # 145

Which of the following is the BEST way for a CIO to provide progress updates on a newly implemented IT strategic plan to the board of directors?

Present an IT summary dashboard.

Present IT critical success factors (CSFs).

Report results Of key risk indicators (KRIs).

A.

Report results of stage-gate reviews.

Full Access
Question # 146

An enterprise made a significant change to its business operating model that resulted in a new strategic direction. Which of the following should be reviewed FIRST to ensure IT congruence with the new business strategy?

A.

IT risk appetite

B.

Enterprise project management framework

C.

IT investment portfolio

D.

Information systems architecture

Full Access
Question # 147

Of the following, who should be responsible for ensuring the regular review of quality management performance against defined quality metrics?

A.

Process owners

B.

Risk management team

C.

Internal auditors

D.

Executive management

Full Access
Question # 148

Which of the following aspects of IT governance BEST addresses the potential intellectual property implications of a cloud service provider having a database in another country?

A.

Contract management

B.

Continuity planning

C.

Data management

D.

Security architecture

Full Access
Question # 149

Which of the following is the BEST way to maximize the value of an enterprise’s information asset base?

A.

Seek additional opportunities to leverage existing information assets.

B.

Facilitate widespread user access to all information assets

C.

Regularly purge information assets to minimize maintenance costs

D.

Implement an automated information management platform

Full Access
Question # 150

An enterprise's global IT program management office (PMO) has recently discovered that several IT projects are being run within a specific region without knowledge of the PMO. The projects are on time, on budget, and will deliver the proposed benefits to the specific region. Which of the following should be the PRIMARY concern of the PMO?

A.

Inability to reduce the impact to the risk level of the global portfolio

B.

Projects may not follow system development life cycle (SDLC)

C.

Lack of control and impact to the overall PMO budget

Full Access
Question # 151

Which of the following roles should be responsible for data normalization when it is found that a new system includes duplicates of data items?

A.

Business system owner

B.

Data steward

C.

Database administrator (DBA)

D.

Application manager

Full Access
Question # 152

An enterprise is trying to increase the maturity of its IT process from being ad hoc to being repeatable. Which of the following is the PRIMARY benefit of this change?

A.

Process optimization is embedded across the organization.

B.

Required outcomes are mapped to business objectives.

C.

Process performance is measured in business terms.

D.

Required outcomes are more frequently achieved.

Full Access
Question # 153

Which of the following should be identified FIRST when determining appropriate IT key risk indicators (KRIs)?

A.

IT-related risk

B.

IT controls

C.

IT threats

D.

IT objectives

Full Access
Question # 154

What should be an IT steering committee's FIRST course of action when an enterprise is considering establishing a virtual reality store to sell its products?

A.

Request a resource gap analysis.

B.

Request development of key risk indicators (KRIs).

C.

Request a threat assessment.

D.

Request a cost-benefit analysis.

Full Access
Question # 155

An enterprise recently approved a bring your own device (BYOD) policy. The IT steering committee has directed IT management to develop a communication plan to disseminate information regarding the associated technical risks. Which of the following is MOST important to include in this communication plan?

A.

A link on the corporate intranet to the BYOD policy

B.

Potential exposures and impacts using common terms

C.

Schedule and content for mandatory training

D.

Disciplinary actions for violation of the BYOD policy

Full Access
Question # 156

A regulatory audit of an IT department has identified discrepancies between processes described in the procedures and what is actually done by system administrators.

The discrepancies were caused by recent IT application changes. Which of the following would be the BEST way to prevent the recurrence of similar findings in the future?

A.

Assign the responsibility for periodic revisions and changes to process owners.

B.

Require each IT employee to confirm compliance with IT procedures on an annual basis.

C.

Include the update of documentation within the change management framework.

D.

Establish high-level procedures to minimize process changes.

Full Access
Question # 157

The board directed the CIO to ensure that required IT resources are available to execute a new enterprise strategy. Which of the following should be done FIRST to support this initiative?

A.

Implement an IT capability strategy

B.

Perform a gap analysis

C.

Develop a capacity management plan

D.

Develop a resource management plan

Full Access
Question # 158

When developing IT risk management policies and standards, it is MOST important to align them with:

A.

Best practices for IT risk management.

B.

The corporate risk culture.

C.

Enterprise goals and objectives.

D.

The enterprise risk management (ERM) framework.

Full Access
Question # 159

Within a governance structure for risk management, which of the following activities should be performed by the second line of defense?

A.

Conducting internal and external audits

B.

Implementing controls to manage risk

C.

Monitoring risk and controls

D.

Identifying and assessing risk

Full Access
Question # 160

Which of the following should be the MOST important consideration when establishing key performance indicators (KPIs) for IT initiatives?

A.

An owner can be assigned

B.

Processes can be optimized

C.

Data collection can be automated

D.

Quality has been evaluated

Full Access
Question # 161

Which of the following should a CIO review to obtain a holistic view of IT performance when identifying potential gaps in service delivery?

A.

Key performance indicators (KPIs)

B.

Return on investment (ROI) analysis

C.

Service level agreement (SLA) reporting

D.

Staff performance evaluations

Full Access
Question # 162

An enterprise’s IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

A.

Business to help define IT goals.

B.

IT and business to define risks.

C.

Business to fund IT services.

D.

IT to define business objectives.

Full Access
Question # 163

The BEST way for a CIO to manage the organizational impact of deploying a new enterprise-wide tool is to implement:

A.

change management.

B.

project management.

C.

risk management.

D.

resource management.

Full Access
Question # 164

An enterprise recently acquired technology that will enable it to offer products to customers through a mobile device application. The business is eager to use this technology as soon as possible for products currently offered through legacy IT systems. What is the CIO's MAIN responsibility?

A.

Ensure proper metrics are established to measure technology usage throughout the enterprise.

B.

Ensure business units are aware of new opportunities available with the acquired technology.

C.

Ensure the enterprise architecture (EA) is reviewed and updated.

D.

Ensure risk associated with implementation and support of the new technology is properly managed.

Full Access
Question # 165

Which of the following is the BEST indication that an implementation plan for a new governance initiative will be successful?

A.

Staff have been trained on the new initiative.

B.

External consultants created the plan.

C.

The plan assigns responsibility for completing milestones.

D.

The plan is designed to engage employees across the enterprise.

Full Access
Question # 166

A small enterprise has just hired its first CIO, who has been tasked with making the IT department more efficient. What should be the CIO's NEXT step after identifying several new improvement initiatives?

A.

Mandate IT staff training.

B.

Request an IT balanced scorecard.

C.

Require a cost-benefit analysis.

D.

Allocate funding for the initiatives.

Full Access
Question # 167

Which of the following is the PRIMARY role of the CEO in IT governance?

A.

Establishing enterprise strategic goals

B.

Managing the risk governance process

C.

Evaluating return on investment (ROI)

D.

Nominating IT steering committee membership

Full Access
Question # 168

Which of the following is MOST important to include in the customer dimension of an IT balanced scorecard?

A.

Business value creation

B.

Stakeholder satisfaction

C.

Maintenance of IT operations

D.

Support for corporate customers

Full Access
Question # 169

An IT steering committee is concerned about staff saving data files containing sensitive corporate information on publicly available cloud file storage applications. Which of the following should be done FIRST to address this concern?

A.

Create a secure corporate cloud file storage and sharing solution.

B.

Block corporate access to cloud file storage applications.

C.

Require staff training on data classification policies.

D.

Revise the data management policy to prohibit this practice.

Full Access
Question # 170

A CIO engages a consulting firm to conduct a benchmark analysis of the organization’s IT governance framework against industry best practices. Several recommendations to improve the maturity of the framework are identified. Which of the following should be the CIO's NEXT course of action?

A.

Develop a plan to integrate the recommendations

B.

Appoint a project manager to implement the recommendations

C.

Obtain approval from the IT steering committee to implement the recommendations

D.

Evaluate the feasibility of the recommendations

Full Access
Question # 171

An ongoing project is on track according to project plan. However, a recent regulation change will have a major impact to the project. The project sponsor's NEXT step should be to:

A.

Seek exemption from the appropriate regulatory body

B.

Perform an impact analysis and update the business case

C.

Submit the project to the IT steering committee for reapproval

D.

Rescope the project to remove work impacted by the regulation

Full Access
Question # 172

Which of the following is the FIRST consideration for a CISO when implementing Zero Trust architecture?

A.

Refining relevant business goals.

B.

Limiting the number of privileged accounts.

C.

Selecting a security framework that is relevant to the business.

D.

Defining security projects to address identified control gaps.

Full Access
Question # 173

Which of the following BEST enables an enterprise to minimize the risks of intellectual property theft and loss of sensitive information when acquiring Internet of Things (IoT) hardware and software components?

A.

Review the data classification policy and relevant documentation

B.

Terminate contracts with suppliers from sanctioned regions of the world

C.

Require nondisclosure agreements (NDAs) from all suppliers

D.

Integrate supply chain cyber risk management processes

Full Access
Question # 174

When an enterprise outsources to a third-party data center, who is accountable for the governance of data retention controls for the data that has been transferred?

A.

The enterprise's internal audit team

B.

The third party's data steward

C.

The third party's control operators

D.

The enterprise's data owner

Full Access
Question # 175

Which of the following is the MOST efficient way for an IT transformation project manager to communicate the project progress with stakeholders?

Establish governance forums within project management.

A.

Include key performance indicators (KPls) in a monthly newsletter.

B.

Share the business case with stakeholders.

C.

Post the project management report to the enterprise intranet site.

Full Access
Question # 176

The BEST way for a CIO to justify maintaining and supporting social media platforms is by demonstrating:

A.

how social media technology fits into the IT investment management process.

B.

that service level agreements (SLAs) for social media technologies have been met.

C.

the IT performance Of social media technologies.

D.

the value derived from investment in social media technologies.

Full Access
Question # 177

Which of the following should be the PRIMARY consideration when implementing an emerging technology with unclear regulatory and compliance requirements?

A.

Enterprise strategic plan

B.

Enterprise architecture (EA) alignment

C.

Enterprise risk appetite

D.

Business impact analysis (BIA) results

Full Access
Question # 178

When conducting a risk assessment in support of a new regulatory

requirement, the IT risk committee should FIRST consider the:

A.

cost burden to achieve compliance.

B.

readiness of IT systems to address the risk.

C.

risk profile of the enterprise.

D.

disruption to normal business operations.

Full Access
Question # 179

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Full Access
Question # 180

Which of the following BEST enables an enterprise to determine an appropriate retention policy for its information assets?

A.

Business and compliance requirements

B.

Business storage and processing needs

C.

Backup and restoration capabilities

D.

External customer data retention requirements

Full Access
Question # 181

Which of the following is the BEST way for a CIO to ensure that IT-related training is taken seriously by the IT management team and direct employees?

A.

Develop training programs based on results of an IT staff survey of preferences.

B.

Embed training metrics into the annual performance appraisal process.

C.

Promote IT-specific training awareness program.

D.

Research and identify training needs based on industry trends.

Full Access
Question # 182

Which of the following is the PRIMARY reason to monitor data classification efforts?

A.

To identify and minimize data security breaches

B.

To identify deviations in the data that are outside risk thresholds

C.

TO ensure alignment with data protection regulations

D.

To ensure assets are protected appropriately

Full Access
Question # 183

A CIO is planning to interview enterprise stakeholders to assess whether the IT strategic plan is continuing to support enterprise business objectives. The CIO would be MOST effective by starting the interview process with:

A.

the executive team.

B.

the internal auditors.

C.

senior IT managers.

D.

business process owners.

Full Access
Question # 184

Which of the following is the BEST way to manage the risk associated with outsourcing critical IT services?

A.

Ensure vendors hold information security certifications.

B.

Define controls within service level agreements (SLAs).

C.

Conduct quarterly performance reviews.

D.

Ensure exit clauses are added to the contract.

Full Access
Question # 185

The board of an enterprise has decided to implement an emerging technology, and employees are extremely concerned about the unknown future of the company. What should be the CIO’s PRIMARY responsibility in addressing these concerns?

A.

Develop and communicate new performance measures.

B.

Define new roles and responsibilities for IT staff.

C.

Initiate IT workforce training on the new technology.

D.

Define and communicate a new IT strategy.

Full Access
Question # 186

When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?

A.

Standardization

B.

Replication

C.

Segregation

D.

Sanitization

Full Access
Question # 187

In a large enterprise, which of the following is the BEST approach to enable effective communication to senior management regarding the project status for a strategic enterprise resource management system implementation?

A.

Project management office with business and IT representatives

B.

Weekly project reports reviewed by business and IT management

C.

Project status updates on the intranet

D.

A steering committee involving business and IT

Full Access
Question # 188

Which of the following should be the CIO’s GREATEST consideration when making changes to the IT strategy?

A.

Have key stakeholders been consulted?

B.

Has the impact to the enterprise architecture (EA) been assessed?

C.

Have IT risk metrics been adjusted?

D.

Has the investment portfolio been revised?

Full Access
Question # 189

The accountability for a business continuity program for business-critical systems is BEST assigned to the:

A.

enterprise risk manager.

B.

chief executive officer (CEO).

C.

director of internal audit.

D.

chief information officer (CIO).

Full Access
Question # 190

A CIO has recently been made aware of a new regulatory requirement that may affect IT-enabled business activities. Which of the following should be the CIO s FIRST step in deciding the appropriate response to the new requirement?

A.

Revise initiatives that are active to reflect the new requirements.

B.

Confirm there are adequate resources to mitigate compliance requirements.

C.

Consult with legal and risk experts to understand the requirements.

D.

Consult with the board for guidance on the new requirements

Full Access
Question # 191

Which of the following would be MOST useful in developing IT strategic plans aligned with technological needs?

A.

Business impact analysis (BIA)

B.

Business case

C.

Enterprise architecture (EA)

D.

Benchmark analysis

Full Access
Question # 192

The board of an organization has been informed of possible cyberthreats. Which of the following should be the board’s NEXT course of action?

A.

Evaluate the security incident response process

B.

Reevaluate the risk tolerance of the organization

C.

Ask the CIO to report on a risk response

D.

Engage the CIO to evaluate the risk

Full Access
Question # 193

Which of the following BEST supports an IT strategy committee’s objective to align employee competencies with planned initiatives?

A.

Set management goals to hire cooperative work experience students.

B.

Specify minimum training hours required for continuing professional education.

C.

Require balanced scorecard concepts training of all employees.

D.

Add achievement of competencies to employee performance goals.

Full Access
Question # 194

Which of the following presents the GREATEST challenge for a large-scale enterprise when procuring Infrastructure as a Service (IaaS)?

A.

Testing the vendor resiliency plan annually

B.

Protecting the enterprise from labor liability

C.

Ensuring the vendor meets corporate requirements

D.

Monitoring key performance indicators (KPIs)

Full Access
Question # 195

Which of the following is the BEST way for an IT steering committee to determine the benefits of an IT investment?

A.

Measure return on investment (ROI) during implementation.

B.

Measure net present value (NPV) during stage gate review.

C.

Measure planned versus actual spend on the project.

D.

Measure value creation throughout the economic life cycle.

Full Access
Question # 196

An enterprise's IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

A.

business to help define IT goals.

B.

business to fund IT services.

C.

IT to define business objectives.

D.

IT and business to define risks.

Full Access
Question # 197

An enterprise recently implemented a significant change in its business strategy by moving to a technologically advanced product with considerable impact on the business. What should be the FINAL step in completing the changes to IT processes?

A.

Updating the configuration management database (CMDB)

B.

Empowering the business to embrace the changes

C.

Ensuring a return to stabilized business operations

D.

Updating the enterprise architecture (EA)

Full Access
Question # 198

Which of the following is the BEST indicator for measuring performance when implementing DevSecOps in an enterprise?

A.

Mean time to repair

B.

Percentage of automated tests

C.

Deployments per day

D.

Number of defects released per day

Full Access
Question # 199

Which of the following is the BEST approach to ensure global regulatory compliance when implementing a new business process?

A.

Use a balanced scorecard to track the business process.

B.

Ensure the appropriate involvement Of the legal department.

C.

Review and revise the business architecture.

D.

Seek approval from the change management board.

Full Access
Question # 200

An enterprise has launched a critical new IT initiative that is expected to produce substantial value. Which of the following would BEST facilitate the reporting of benefits realized by the IT investment to the board?

A.

Balanced scorecard

B.

Milestone chart

C.

Performance management

D.

Critical risk and issue walk through

Full Access
Question # 201

Which of the following is the BEST way for an IT steering committee to monitor the adoption of a new enterprise IT strategy?

A.

Implement service level agreements (SLAs).

B.

Establish key performance indicators (KPIs).

C.

Schedule ongoing audit reviews.

D.

Establish key risk indicators (KRIs).

Full Access
Question # 202

A newly appointed CIO is concerned that IT is too reactive and wants to ensure IT adds value to the enterprise by proactively anticipating business needs. Which of the following will BEST contribute to meeting this objective?

A.

Incorporating IT planning into the enterprise strategic planning process

B.

Implementing an IT portfolio management framework

C.

Involving more IT representation in strategic business case reviews

D.

Including IT management within the program management office

Full Access
Question # 203

In which of the following situations is it acceptable to retain data beyond the stated policy?

A.

The business created an analytics model based on historical records.

B.

There is a high probability that the enterprise will enter into litigation.

C.

New data privacy regulations are expected in a few months.

D.

A core system database is going through an upgrade.

Full Access
Question # 204

An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:

A.

a common risk management taxonomy.

B.

a common risk organization.

C.

common key risk indicators (KRIs).

D.

common risk mitigation strategies.

Full Access