Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CGEIT Questions and Answers

Question # 6

An enterprise decides to accept the IT risk of a subsidiary located in another country even though it exceeds the enterprise's risk appetite. Which of the following would be the BEST justification for this decision?

A.

Risk framework alignment

B.

Local market common practices

C.

Compliance with local regulations

D.

Technical gaps among subsidiaries

Full Access
Question # 7

Which of the following should be the MAIN governance focus when implementing a newly approved bring your own device (BYOD) policy?

A.

Recommending mobile applications that will increase business productivity

B.

Training employees on the enterprise's chosen mobile device management system

C.

Educating employees on the increased IT security risk to the enterprise

D.

Understanding knowledge gaps of IT employees to support different mobile platforms

Full Access
Question # 8

Which of the following is the MOST effective approach to ensure senior management sponsorship of IT risk management?

A.

Benchmark risk framework against best practices.

B.

Calculate financial impact for each IT risk finding.

C.

Periodically review the IT risk register entries.

D.

Integrate IT risk into enterprise risk management (ERM).

Full Access
Question # 9

The IT program manager does not see the value of conducting risk assessments for a new major IT project. The manager is reluctant to cooperate with internal auditors and the newly formed steering committee. Midway through the project, program requirements were changed because the CEO is a friend of a vendor and wants to implement this vendor's new technology. This decision will cause the current IT program budget to be insufficient and will be shown as overspending.

After the requirement change request, the IT program manager should FIRST:

A.

obtain confirmation from the business and a decision by the steering committee.

B.

request additional funding from the business owner to cover the additional scope.

C.

report the matter to internal audit as a program deviation to be reviewed.

D.

align IT with the business and agree to the business request.

Full Access
Question # 10

Which of the following is PRIMARILY achieved through performance measurement?

A.

Process improvement

B.

Transparency

C.

Cost efficiency

D.

Benefit realization

Full Access
Question # 11

Which of the following BEST reflects the ethical values adopted by an IT organization?

A.

IT principles and policies

B.

IT balanced scorecard

C.

IT governance framework

D.

IT goals and objectives

Full Access
Question # 12

An enterprise made a significant change to its business operating model that resulted in a new strategic direction. Which of the following should be reviewed FIRST to ensure IT congruence with the new business strategy?

A.

IT risk appetite

B.

Enterprise project management framework

C.

IT investment portfolio

D.

Information systems architecture

Full Access
Question # 13

It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?

A.

Enterprise architecture (EA)

B.

Enterprise risk framework

C.

IT service management

D.

IT project roadmap

Full Access
Question # 14

To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?

A.

IT staff morale

B.

Core IT processes

C.

Outsourcer's reputation

D.

New service level agreements (SLAs)

Full Access
Question # 15

To reduce the risk of reputational damage through inappropriate use of social media by employees outside of the workplace, the enterprise approach regarding social media should PRIMARILY focus on;

A.

implementing preventative controls.

B.

developing policies on social media.

C.

implementing a review of processes utilizing social media.

D.

ensuring each use of social media is approved by management.

Full Access
Question # 16

An enterprise is planning to replace multiple enterprise resource planning (ERP) systems at various regions with one company-wide ERP system. The main objective of this change is to achieve economies of scale efficiencies resulting in cost reductions. To meet this objective, what is the BEST approach in the planning phase of the project?

A.

Implement an ERP system on shared resources with the lowest cost.

B.

Minimize customization by standardizing ERP processes across regions.

C.

Adopt a best in breed web-based architecture for the ERP system.

D.

Use a service provider to evaluate and implement the new ERP processes.

Full Access
Question # 17

An enterprise plans to implement a business intelligence (Bl) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

A.

Interface issues between enterprise and Bl applications

B.

Large volumes of data fed from enterprise applications

C.

The need for staff to be trained on the new Bl tool

D.

Data definition and mapping sources from applications

Full Access
Question # 18

Which of the following is the PRIMARY element in sustaining an effective governance framework?

A.

Identification of optimal business resources

B.

Establishment of a performance metric system

C.

Ranking of critical business risks

D.

Assurance of the execution of business controls

Full Access
Question # 19

An enterprise has decided to create its first mobile application. The IT director is concerned about the potential impact of this initiative. Which of the following is the MOST important input for managing the risk associated with this initiative?

A.

Enterprise architecture (EA)

B.

IT risk scorecard

C.

Enterprise risk appetite

D.

Business requirements

Full Access
Question # 20

While assessing the feasibility of introducing new IT practices and standards into the IT governance framework, it is CRITICAL to understand an organization's:

A.

culture.

B.

level of outsourcing.

C.

enterprise architecture (EA).

D.

maturity of IT processes.

Full Access
Question # 21

A regulatory audit assessed an enterprise's main transactional application as noncompliant. In addition to fines and required corrections, an agreement was reached to implement a set of governance controls over IT. Accountability for these controls is BEST assigned to which of the following?

A.

CIO

B.

Internal audit director

C.

Application users

D.

The board of directors

Full Access
Question # 22

Which of the following is the MOST important attribute of an information steward?

A.

The information steward manages the systems that process the relevant data.

B.

The information steward has expertise in managing data quality systems.

C.

The information steward is closely aligned with the business function.

D.

The information steward is part of the information architecture group.

Full Access
Question # 23

Which of the following provides the BEST assurance on the effectiveness of IT service management processes?

A.

Performance of incident response

B.

Continuous monitoring

C.

Key risk indicators (KRIs)

D.

Compliance with internal controls

Full Access
Question # 24

A review of the effectiveness of IT governance within an enterprise has revealed that several innovation improvement initiatives are failing. An analysis shows a lack of stakeholder buy-in to the improvements. Implementing which of the following would have prevented this problem?

A.

An IT project roadmap

B.

An IT risk management program

C.

A change management program

D.

A service delivery framework

Full Access
Question # 25

Which of the following would BEST help to improve an enterprise's ability to manage large IT investment projects?

A.

Creating a change management board

B.

Reviewing and evaluating existing business cases

C.

Implementing a review and approval process for each phase

D.

Publishing the IT approval process online for wider scrutiny

Full Access
Question # 26

Of the following, who should approve the criteria for information quality within an enterprise?

A.

Information architect

B.

Information analyst

C.

Information steward

D.

Information owner

Full Access
Question # 27

The BEST way to manage an outsourced vendor relationship is by:

A.

conducting periodic risk assessments.

B.

reviewing annual independent third-party reports.

C.

providing clear objectives and transparency.

D.

analyzing performance statistics from the vendor.

Full Access
Question # 28

A strategic IT-enabled investment is failing due to unforeseen technology problems. What should be the board of directors' FIRST course of action?

A.

Terminate the investment.

B.

Assess the business risk and options.

C.

Approve an investment budget increase.

D.

Revise the investment selection process.

Full Access
Question # 29

Which of the following is the BEST method for determining an enterprise's current appetite for risk?

A.

Interviewing senior management

B.

Evaluating the balanced scorecard

C.

Reviewing recent audit findings

D.

Assessing social media adoption

Full Access
Question # 30

A large financial institution is considering outsourcing customer call center operations which will allow the chosen vendor to access systems from offshore locations. Which of the following represents the GREATEST risk?

A.

Inconsistent customer service and reporting

B.

Loss of data confidentiality

C.

Lack of network availability

D.

Inadequate business continuity planning

Full Access
Question # 31

Which of the following are PRIMARY factors in ensuring the success of an enterprise quality assurance program?

A.

Enterprise risk appetite and tolerance

B.

Risk management and control frameworks

C.

Continuous improvement plans

D.

A process maturity framework and documented procedures

Full Access
Question # 32

Which of the following is the MOST effective means for IT management to report to executive management regarding the value of IT?

A.

IT process maturity level

B.

Cost-benefit analysis

C.

Resource assessment

D.

Balanced scorecard

Full Access
Question # 33

Results of an enterprise's customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise's mobile applications are considered inferior compared to legacy browser-based applications. Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?

A.

Establish service level agreements (SLAs) with the development team.

B.

Identify key risks and mitigation strategies for mobile applications.

C.

Implement key performance indicators (KPIs) that include application quality.

D.

Identify business requirements concerning mobile applications.

Full Access
Question # 34

An IT risk assessment for a large healthcare group revealed an increased risk of unauthorized disclosure of information. Which of the following should be established FIRST to address the risk?

A.

Data encryption tools

B.

Data loss prevention tools

C.

Data classification policy

D.

Data retention policy

Full Access
Question # 35

Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?

A.

Poor desktop service delivery

B.

Data retention

C.

Redundant systems

D.

Poor business decisions

Full Access
Question # 36

Which of the following represents the GREATEST challenge to implementing IT governance?

A.

Determining the best practice to follow

B.

Planning the project itself

C.

Developing a business case

D.

Applying behavioral change management

Full Access
Question # 37

An enterprise has been focused on establishing an IT risk management framework. Which of the following should be the PRIMARY motivation behind this objective?

A.

Promoting responsibility throughout the enterprise for managing IT risk.

B.

Increasing the enterprise's risk tolerance level and risk appetite.

C.

Engaging executives in examining IT risk when developing policies.

D.

Maintaining a complete and accurate risk registry to belief manage IT risk

Full Access
Question # 38

A large retail chain realizes that while there has not been any loss of data, IT security has not been a priority and should become a key goal for the enterprise. What should be the FIRST high-level initiative for a newly created IT strategy committee in order to support this business goal?

A.

Identifying gaps in information asset protection

B.

Defining data archiving and retrieval policies

C.

Recruiting and training qualified IT security staff

D.

Modernizing internal IT security practices

Full Access
Question # 39

Which of the following is the MOST valuable input when quantifying the loss associated with a major risk event?

A.

Key risk indicators (KRIs)

B.

IT environment threat modeling

C.

Business impact analysis (BIA) report

D.

Recovery time objectives (RTOs)

Full Access
Question # 40

The BEST way to ensure an IT steering committee meets enterprise objectives is to:

A.

require a member of the committee to have IT governance expertise.

B.

benchmark against industry best practices.

C.

establish key performance indicators (KPIs).

D.

have key business stakeholders represented on the committee.

Full Access
Question # 41

What is the PRIMARY objective for performing an IT due diligence review prior to the acquisition of a competitor?

A.

Document the competitor's governance structure.

B.

Ensure that the competitor understands significant IT risks.

C.

Assess the status of the risk profile of the competitor.

D.

Determine whether the competitor is using industry-accepted practices.

Full Access
Question # 42

Which of the following BEST lowers costs and improves scalability from an IT enterprise architecture (EA) perspective?

A.

Cost management

B.

IT strategic sourcing

C.

Standardization

D.

Business agility

Full Access
Question # 43

Which of the following BEST reflects mature risk management in an enterprise?

A.

A regularly updated risk register

B.

Ongoing risk assessment

C.

Ongoing investment in risk mitigation

D.

Responsive risk awareness culture

Full Access
Question # 44

Which of the following is the MOST important reason for selecting IT key risk indicators (KRIs)?

A.

Demonstrating the effectiveness of IT risk policies

B.

Assessing the current IT controls model

C.

Enabling comparison against similar IT KRIs

D.

Increasing the probability of achieving IT goals

Full Access
Question # 45

Which of the following is the MOST important driver of IT governance?

A.

Effective internal controls

B.

Management transparency

C.

Quality measurement

D.

Technical excellence

Full Access
Question # 46

An executive management team has determined the need to implement an IT governance framework, beginning with the maturity assessment process. The PRIMARY purpose for maturity assessment is to:

A.

Benchmark IT performance.

B.

Identify gaps in performance.

C.

Support impact analysis.

D.

Identify gaps in capability.

Full Access
Question # 47

Which of the following is MOST important for the effective design of an IT balanced scorecard?

A.

On-demand reporting and continuous monitoring

B.

Consulting with the CIO

C.

Emphasizing the financial results

D.

Identifying appropriate key performance indicators (KPls)

Full Access
Question # 48

Due to continually missed service level agreements (SLAs), an enterprise plans to terminate its contract with a vendor providing IT help desk services. The enterprise s IT department willassume the help desk-related responsibilities. Which of the following would BEST facilitate this transition?

A.

Requiring the enterprise architecture (EA) be updated

B.

Validating that the balanced scorecard is still meaningful

C.

Ensuring IT will operate at a lower cost than the vendor

D.

Ensuring a change management plan is in place

Full Access
Question # 49

Which of the following is the BEST course of action to enable effective resource management?

A.

Conduct an enterprise risk assessment.

B.

Implement a cross-training program.

C.

Assign resources based on business priorities.

D.

Assign resources based on risk appetite.

Full Access
Question # 50

Which of the following is the BEST method for making a strategic decision to invest in cloud services?

A.

Prepare a business case.

B.

Prepare a request for information (RFI),

C.

Benchmarking.

D.

Define a balanced scorecard.

Full Access
Question # 51

When implementing an IT governance framework, which of the following would BEST ensure acceptance of the framework?

A.

Factoring in the effects of enterprise culture

B.

Using subject matter experts

C.

Using industry-accepted practices

D.

Complying with regulatory requirements

Full Access
Question # 52

A CIO must determine if IT staff have adequate skills to deliver on key strategic objectives. Which of the following will provide the MOST useful information?

A.

Employee performance metrics

B.

Project risk reports

C.

Gap analysis results

D.

Training program statistics

Full Access
Question # 53

The CIO of an enterprise learns the payroll server of a competitor has been the victim of ransomware. To help plan for the possibility of ransomed corporate data, what should be the ClO's FIRST course of action?

A.

Require development of key risk indicators (KRls).

B.

Develop a policy to address ransomware.

C.

Request a targeted risk assessment.

D.

Back up corporate data to a secure location.

Full Access
Question # 54

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Full Access
Question # 55

An IT steering committee wants the enterprise's mobile workforce to use cloud-based file storage to save non-sensitive corporate data, removing the need for remote access to that information. Before this change is implemented, what should be included in the data management policy?

A.

A mandate for periodic employee training on how to classify corporate data files

B.

A mandate for the encryption of all corporate data files at rest that contain sensitive data

C.

A process for blocking access to cloud-based apps if inappropriate content is discovered

D.

A requirement to scan approved cloud-based apps for inappropriate content

Full Access
Question # 56

Which of the following is the MOST effective way to manage risks within the enterprise?

A.

Assign individuals responsibilities and accountabilities for management of risks.

B.

Make staff aware of the risks in their area and risk management techniques.

C.

Provide financial resources for risk management systems.

D.

Document procedures and reporting processes.

Full Access
Question # 57

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

A.

Require an update to enterprise data policies.

B.

Request an impact analysis.

C.

Review documented data interdependence.

D.

Validate against existing architecture.

Full Access
Question # 58

An enterprise has established a new department to oversee the life cycle of activities that support data management objectives. Which of the following should be done NEXT?

A.

Develop a business continuity plan (BCP).

B.

Assess the current data business model.

C.

Review data privacy requirements.

D.

Establish a RACI chart

Full Access
Question # 59

A recent benchmarking analysis has indicated an IT organization is retaining more data and spending significantly more on data retention than its competitors. Which of the following would BEST ensure the optimization of retention costs?

A.

Requiring that all business cases contain data deletion and retention plans

B.

Revalidating the organization's risk tolerance and re-aligning the retention policy

C.

Moving all high-risk and medium-risk data backups to cloud storage

D.

Redefining the retention policy to align with industry best practices

Full Access
Question # 60

A CIO has been asked to modify an organization's IT performance measurement system to reflect recent changes in technology, including the movement of some data processing to a cloud solution. Which of the following is the PRIMARY consideration when designing such a measurement system?

A.

Ensuring that cost of measurement and reporting is minimized

B.

Ensuring the measurement system maps to the enterprise architecture (EA)

C.

Adequately defining the scope of services moved to the cloud

D.

Correctly understanding stakeholder needs for IT-related measurement

Full Access
Question # 61

A healthcare enterprise that is subject to strict compliance requirements has decided to outsource several key IT services to third-party providers. Which of the following would be the BEST way to assess compliance and avoid reputational damage?

A.

Require quarterly reports from the providers demonstrating compliance.

B.

Require documentation that the providers have adequate controls in place.

C.

Exercise the right to perform an audit.

D.

Impose monetary penalties for noncompliance.

Full Access
Question # 62

Which of the following would provide the BEST input for prioritizing strategic IT improvement initiatives?

A.

Business dependency assessment

B.

Business process analysis

C.

Business case evaluation

D.

Business impact analysis (BIA)

Full Access
Question # 63

From an IT governance perspective, which of the following would be the MOST significant impact of moving all IT applications to an external Software as a Service (SaaS) cloud provider?

A.

The integration of the IT department with business lines

B.

The shift from service delivery to service management

C.

The improvement Of IT service alignment with business

D.

The necessity to update key risk indicators (KRIs)

Full Access
Question # 64

A healthcare enterprise is procuring Internet of Things (IoT) devices to be used across its facilities. Which of the following is MOST important to establish before vendors are engaged to provide the devices?

A.

Product compliance criteria

B.

Patient training

C.

Physical security audits

D.

Vendor delivery timelines

Full Access
Question # 65

Which of the following characteristics would BEST indicate that an IT process is a good candidate for outsourcing?

A.

Strategic processes that require expert professionals

B.

Processes with higher risk to the enterprise

C.

Non-strategic processes that are not documented

D.

Operational processes that are well-defined

Full Access
Question # 66

Which of the following is the BEST way to manage the risk associated with outsourcing critical IT services?

A.

Ensure vendors hold information security certifications.

B.

Define controls within service level agreements (SLAs).

C.

Conduct quarterly performance reviews.

D.

Ensure exit clauses are added to the contract.

Full Access
Question # 67

A large enterprise has decided to use an emerging technology that needs to be integrated with the current IT infrastructure. Which of the following is the BEST way to prevent adverse effects to the enterprise resulting from the new technology?

A.

Develop key performance indicators (KPIs).

B.

Update the risk appetite statement

C.

Develop key risk indicators (KRIs).

D.

Implement service level agreements (SLAs)

Full Access
Question # 68

Which of the following should be the CIO’s GREATEST consideration when making changes to the IT strategy?

A.

Have key stakeholders been consulted?

B.

Has the impact to the enterprise architecture (EA) been assessed?

C.

Have IT risk metrics been adjusted?

D.

Has the investment portfolio been revised?

Full Access
Question # 69

The BEST way for a CIO to justify maintaining and supporting social media platforms is by demonstrating:

A.

how social media technology fits into the IT investment management process.

B.

that service level agreements (SLAs) for social media technologies have been met.

C.

the IT performance Of social media technologies.

D.

the value derived from investment in social media technologies.

Full Access
Question # 70

An enterprise has well-designed procurement and vendor risk management policies that are intended to prevent biased decision-making. However, a pattern of ethical violations indicates that vendor selection may have been inappropriately influenced by non-work-related incentives provided to decision makers. Which of the following should be done FIRST in response to this issue?

A.

Revise the procurement and vendor risk management policies.

B.

Conduct a root cause analysis and remediate based on findings.

C.

Document the critical success factors (CSFs) for the procurement policies.

D.

Establish and communicate strict penalties for biased vendor selection.

Full Access
Question # 71

A publicly traded enterprise wants to demonstrate that its board of directors is providing adequate strategic oversight of IT. Which of the following BEST supports this objective?

A.

Annual IT governance communication to all staff.

B.

Press releases targeted at large investors.

C.

Inclusion of IT governance reporting in the annual report.

D.

Annual presentation of IT performance metrics.

Full Access
Question # 72

An enterprise has an ongoing issue of corporate applications not delivering the expected benefits due to missing key functionality. As a result, many groups are using spreadsheets and databases instead of approved enterprise applications to store and manipulate information. Which of the following will BEST improve the success rate of future IT initiatives?

A.

Engage the business user community in acceptance testing Of acquired applications.

B.

Engage stakeholders to identify and validate business requirements.

C.

Establish a process for risk and value management.

D.

Prohibit the use of non-approved alternate software solutions.

Full Access
Question # 73

Senior management wants to expand offshoring to include IT services as other types of business offshoring have already resulted in significant financial benefits for the enterprise. The CIO is currently midway through a successful five-year strategy that relies heavily on internal IT resources. What should the CIO do NEXT?

A.

Reevaluate the offshoring strategy.

B.

Abandon the current IT strategy.

C.

Continue with the existing IT strategy.

D.

Reevaluate the current IT strategy.

Full Access
Question # 74

A newly established IT steering committee is concerned whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

A.

Critical success factors (CSFs)

B.

Performance indicators

C.

Capability maturity levels

D.

Balanced scorecard

Full Access
Question # 75

Which of the following would be the GREATEST obstacle for effective implementation of an enterprise's information security policy?

A.

Corporate culture

B.

Threats to corporate information

C.

Utilization of cloud-based applications

D.

Geographically dispersed staff

Full Access
Question # 76

Which method BEST enables an enterprise to estimate the benefits of a new Software as a Service (SaaS) application?

A.

Monte Carlo analysis

B.

Total cost of ownership (TCO)

C.

Expected monetary value

D.

Heuristic methods

Full Access
Question # 77

An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?

A.

Ensure IT has knowledgeable representation and is included in the strategic planning process.

B.

Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.

C.

Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).

D.

Outsource both IT operations and IT development and implement controls based on a standardized framework.

Full Access
Question # 78

Executive management is concerned that IT has not achieved its performance targets. At the end of the fiscal year, it was noted the reason was largely due to insufficient spending on key IT initiatives. Which of the following would help to alleviate the issue for the coming year?

A.

Key risk indicators (KRIs)

B.

Stage gate reviews

C.

Lag indicators

D.

Lead indicators

Full Access
Question # 79

When conducting a risk assessment in support of a new regulatory

requirement, the IT risk committee should FIRST consider the:

A.

cost burden to achieve compliance.

B.

readiness of IT systems to address the risk.

C.

risk profile of the enterprise.

D.

disruption to normal business operations.

Full Access
Question # 80

An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:

A.

for robust change management.

B.

for periodic service provider audits.

C.

for enterprise architecture (EA) updates.

D.

to qualify service providers.

Full Access
Question # 81

An airline wants to launch a new program involving the use of artificial intelligence (Al) and machine learning the mam objective of the program is to use customer behavior to determine new routes and markets Which of the following should be done NEXT?

A.

Consult with the enterprise privacy function

B.

Define the critical success factors (CSFs)

C.

Present the proposal to the IT strategy committee

D.

Perform a business impact analysis (BIA)

Full Access
Question # 82

An IT strategy committee wants to evaluate how well the IT department supports the business strategy. Which of the following is the BEST method for making this determination?

A.

Capability maturity assessment

B.

Customer survey analysis

C.

IT balanced scorecard reporting

D.

IT controls assurance program

Full Access
Question # 83

An enterprise has developed a new digital strategy to improve fraud detection. Which of the following is MOST important to consider when updating the information architecture?

A.

Resource constraints related to implementing the digital strategy.

B.

The business use cases supporting the digital strategy

C.

Changes to the legacy business and data architectures

D.

The history of fraud incidents and their root causes

Full Access
Question # 84

An assessment reveals that enterprise risk management (ERM) practices are being applied inconsistently by IT staff. Which of the following would be the MOST effective corrective action?

A.

Require ERM orientation sessions

B.

Request the development of an IT risk register template.

C.

Request a complete skills reassessment for all IT staff.

D.

Update the ERM framework.

Full Access
Question # 85

The responsibility for the development of a business continuity plan (BCP) is BEST assigned to the:

A.

business risk manager.

B.

business owner.

C.

chief executive officer (CEO).

D.

IT systems owner.

Full Access
Question # 86

Before establishing IT key nsk indicators (KRls) which of the following should be defined FIRST?

A.

IT resource strategy

B.

IT risk and security framework

C.

IT goals and objectives

D.

IT key performance indicators (KPIs)

Full Access
Question # 87

An enterprise's global IT program management office (PMO) has recently discovered that several IT projects are being run within a specific region without knowledge of the PMO. The projects are on time, on budget, and will deliver the proposed benefits to the specific region. Which of the following should be the PRIMARY concern of the PMO?

A.

Inability to reduce the impact to the risk level of the global portfolio

B.

Projects may not follow system development life cycle (SDLC)

C.

Lack of control and impact to the overall PMO budget

Full Access
Question # 88

An internal audit revealed a widespread perception that the enterprise's IT governance reporting lacks transparency Which of the following should the CIO do FIRST?

A.

Add stakeholder transparency metrics to the balanced scorecard

B.

Develop a communication and awareness strategy

C.

Meet with key stakeholders to understand their concerns

D.

Adopt an industry-recognized template to standardize reports.

Full Access
Question # 89

IT maturity models measure:

A.

performance.

B.

value.

C.

capabilities.

D.

outcome.

Full Access
Question # 90

Which of the following would be the BEST long-term solution to address the concern regarding loss of experienced staff?

A.

implement knowledge management practices

B.

Establish a mentoring program for IT staff

C.

Determine key risk indicators (KRIs)

D.

Retain key staff as consultants.

Full Access
Question # 91

The PRIMARY reason for periodically evaluating IT resource staffing requirements is to:

A.

ascertain the IT function has sufficient skilled staff to maintain daily operations.

B.

ensure the enterprise has sufficient resources to address changing business and IT needs.

C.

verify that human resource recruitment and retention processes meet enterprise IT objectives.

D.

confirm IT-related responsibilities are defined for the enterprise's business and IT staff.

Full Access
Question # 92

While monitoring an enterprise's IT projects portfolio, it is discovered that a project is 75% complete, but all budgeted resources have been expended. Which of the following is the MOST important task to perform?

A.

Review the IT investments.

B.

Reorganize the IT projects portfolio.

C.

Re-evaluate the business case.

D.

Review the IT governance structure.

Full Access
Question # 93

Before an IT strategy committee can approve an IT risk assessment framework, which of the following is MOST important to have established?

A.

An enterprise risk mitigation strategy

B.

Leading and lagging risk indicators

C.

IT performance metrics and standards

D.

Enterprise definitions for risk impact and probability

Full Access
Question # 94

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

A.

Authenticating access to information assets based on roles or business rules.

B.

Implementing multi-factor authentication controls

C.

Granting access to information based on information architecture

D.

Engaging an audit of logical access controls and related security policies

Full Access
Question # 95

Which of the following should be the MOST important consideration when defining an information architecture?

A.

Frequency and quantity of information updates

B.

Information to justify business cases

C.

Incorporation of emerging technologies

D.

Access to and exchange of information

Full Access
Question # 96

Which of the following roles has PRIMARY accountability for the security related to data assets?

A.

Database administrator

B.

Data owner

C.

Data analyst

D.

Security architect

Full Access
Question # 97

Which of the following MUST be established before implementing an information architecture that restricts access to data based on sensitivity?

A.

Risk and control frameworks

B.

Probability and impact analysis

C.

Classification and ownership

D.

Security and privacy policies

Full Access
Question # 98

An IT audit report indicates that a lack of IT employee risk awareness is creating serious security issues in application design and configuration. Which of the following would be the BEST key risk indicator (KRI) to show progress in IT employee behavior?

A.

Number of IT employees attending security training sessions

B.

Results of application security testing

C.

Number of reported security incidents

D.

Results of application security awareness training quizzes

Full Access
Question # 99

An IT governance committee wants to ensure there is a clear description of the "data owner" in the enterprise data policy. Which of the following would BEST define the owner of data stored in an external cloud?

A.

The business leader who is most impacted by the loss of data.

B.

The risk manager who is responsible for protecting data stored in the cloud.

C.

The contract manager who monitors the security of the cloud provider.

D.

The vendor who submits the data to the organization via online forms

Full Access
Question # 100

An enterprise has a centralized IT function but also allows business units to have their own technology operations, resulting in duplicate technologies and conflicting priorities. Which of the following should be done FIRST to reduce the complexity of the IT landscape?

Promote automation tools used by the business units.

A.

Conduct strategic planning with business units.

B.

Migrate all in-house systems to an external cloud environment.

C.

Standardize technology architecture on common products.

Full Access
Question # 101

An enterprise plans to migrate its applications and data to an external cloud environment. Which of the following should be the ClO's PRIMARY focus before the migration?

A.

Reviewing the information governance framework

B.

Selecting best-of-breed cloud offerings

C.

Updates the enterprise architecture (EA) repository

D.

Conducting IT staff training to manage cloud workloads

Full Access
Question # 102

The GREATEST benefit associated with a decision to implement performance metrics for key IT assets is the ability to:

A.

establish the span of control during the life cycle of IT assets.

B.

determine the average cost of controls for protection of IT assets.

C.

compare the performance Of IT assets against industry best practices.

D.

determine the contribution of IT assets in achievement of IT goals.

Full Access
Question # 103

When establishing a risk management process which of the following should be the FIRST step?

A.

Determine the probability of occurrence

B.

Identify threats

C.

Identify assets

D.

Assess risk exposures

Full Access
Question # 104

Reviewing which of the following should be the FIRST step when evaluating the possibility of outsourcing an IT system?

A.

Outsourcing strategy

B.

Outsourced business processes

C.

Service level agreements (SLAs)

D.

IT staff skill sets

Full Access
Question # 105

Which of the following is the MOST important reason to include internal audit as a stakeholder when establishing clear roles for the governance of IT?

A.

Internal audit has knowledge and technical expertise to advise on IT infrastructure.

B.

Internal audit is accountable for the overall enterprise governance of IT.

C.

Internal audit implements controls over IT risks and security.

D.

Internal audit provides input on relevant issues and control processes.

Full Access
Question # 106

An enterprise has committed to the implementation of a new IT governance model. The BEST way to begin this implementation is to:

A.

identify IT services that currently support the enterprise’s capability.

B.

define policies for data, applications, and organization of infrastructure.

C.

identify the role of IT in supporting the business.

D.

prioritize how much and where to invest in IT.

Full Access
Question # 107

When determining the desired maturity levels for IT governance processes, it is MOST important to:

A.

Focus on existing strengths as key drivers for the target levels

B.

Ensure target levels are in line with external competitor benchmarks

C.

Agree on target levels in response to need

D.

Ensure that maturity can be achieved at the lowest cost

Full Access
Question # 108

Which of the following BEST enables informed IT investment decisions?

A.

Business case

B.

Technology roadmap

C.

Program plan

D.

Risk classification

Full Access
Question # 109

New legislation requires an enterprise to report cybersecurity incidents to a government agency within a defined timeline. Which of the following should be the FIRST course of action?

A.

Establish an incident reporting system and hotline.

B.

Require automation of incident reporting to agencies.

C.

Establish a cybersecurity incident manager role.

D.

Understand requirements and definitions for reportable incidents.

Full Access
Question # 110

A domestic healthcare provider has informed IT governance that it is updating its strategy to include telemedicine and teleconsulting for international locations. Which of the following is the PRIMARY governance concern for the enterprise?

A.

Conflicts between regulations in different countries

B.

The ability of the IT infrastructure to support global expansion

C.

The need to update enterprise risk tolerance

D.

Classification of new data by level of sensitivity

Full Access
Question # 111

A CIO engages a consulting firm to conduct a benchmark analysis of the organization’s IT governance framework against industry best practices. Several recommendations to improve the maturity of the framework are identified. Which of the following should be the CIO’s NEXT course of action?

A.

Evaluate the feasibility of the recommendations.

B.

Obtain approval from the IT steering committee to implement the recommendations.

C.

Develop a plan to integrate the recommendations.

D.

Appoint a project manager to implement the recommendations.

Full Access
Question # 112

Which of the following is the PRIMARY benefit to an enterprise when risk management is practiced effectively throughout the organization?

A.

Decisions are made with an awareness of probability and impact.

B.

IT objectives and goals are aligned to business objectives and goals.

C.

Business opportunity losses are minimized.

D.

Innovative strategic initiatives are encouraged.

Full Access
Question # 113

An enterprise is planning to upgrade its current enterprise resource planning (ERP) system to remain competitive within the industry. Which of the following would be MOST helpful to facilitate a successful implementation?

A.

Documenting the current ERP processes and procedures

B.

Reviewing the ERP post-implementation report

C.

Establishing a change and transition planning process

D.

Conducting a comprehensive requirements review

Full Access
Question # 114

Which of the following should be the PRIMARY outcome of IT governance?

A.

Elimination of IT risk

B.

Improved IT risk awareness throughout the enterprise

C.

Quality assurance (QA) of IT processes

D.

Value delivery of IT to the business

Full Access
Question # 115

An enterprise recently approved a bring your own device (BYOD) policy. The IT steering committee has directed IT management to develop a communication plan to disseminate information regarding the associated technical risks. Which of the following is MOST important to include in this communication plan?

A.

A link on the corporate intranet to the BYOD policy

B.

Potential exposures and impacts using common terms

C.

Schedule and content for mandatory training

D.

Disciplinary actions for violation of the BYOD policy

Full Access
Question # 116

Which of the following would provide the MOST useful information to measure the alignment of IT with the enterprise?

A.

Balanced scorecard

B.

Control self-assessment (CSA)

C.

Gap analysis

D.

Audit reports

Full Access
Question # 117

Which of the following should be considered FIRST when assessing the implications of new external regulations on IT compliance?

A.

IT policies and procedures that need revision

B.

Resource burden for implementation

C.

Gaps in skills and experience of IT employees

D.

Impact on contracts with service providers

Full Access
Question # 118

Which of the following is the BEST approach to ensure global regulatory compliance when implementing a new business process?

A.

Use a balanced scorecard to track the business process.

B.

Ensure the appropriate involvement Of the legal department.

C.

Review and revise the business architecture.

D.

Seek approval from the change management board.

Full Access
Question # 119

An enterprise learns that some of its business divisions have been approaching technology vendors for cloud services, resulting in duplicate support contracts and underutilization of IT services. Which of the following should be done FIRST to address this issue?

A.

Review the enterprise IT procurement policy.

B.

Re-negotiate contracts with vendors to request discounts.

C.

Require updates to the IT procurement process.

D.

Conduct an audit to investigate utilization of cloud services.

Full Access
Question # 120

Which of the following is the PRIMARY reason to monitor data classification efforts?

A.

To identify and minimize data security breaches

B.

To identify deviations in the data that are outside risk thresholds

C.

TO ensure alignment with data protection regulations

D.

To ensure assets are protected appropriately

Full Access
Question # 121

Which of the following BEST enables an enterprise to achieve the benefits of implementing new Internet of Things (loT) technology?

A.

IT project charter

B.

Change management

C.

Emerging technology roadmap

D.

Enterprise architecture (EA)

Full Access
Question # 122

Which of the following BEST enables the alignment of user access rights with business requirements?

A.

Data classification policy

B.

Maturity model

C.

System design

D.

Data architecture model

Full Access
Question # 123

A high-tech enterprise is concerned that leading competitors have been successfully recruiting top talent from the enterprise's research and development business unit.

What should the leadership team mandate FIRST?

A.

A SWOT analysis

B.

An incentive and retention program

C.

A root cause analysis

D.

An aggressive talent acquisition program

Full Access
Question # 124

Which of the following BEST demonstrates the effectiveness of enterprise IT governance?

A.

An IT balanced scorecard is used.

B.

Business objectives are achieved.

C.

Business objectives are defined.

D.

IT processes are measured.

Full Access
Question # 125

The CEO of an organization is concerned that there are inconsistencies in the way information assets are classified across the enterprise. Which of the following is be the BEST way for the CIO to address these concerns?

A.

Include data assets in the IT inventory.

B.

Identify data owners across the enterprise.

C.

Require enterprise risk assessments.

D.

Implement enterprise data governance.

Full Access
Question # 126

The PRIMARY reason for implementing an IT governance program in an enterprise is to

A.

balance the demand for information and the ability to deliver.

B.

complies with regulatory requirements

C.

reduce risks due to improved compensating controls.

D.

decrease the scale of investment in information systems due to budgetary controls.

Full Access
Question # 127

Which of the following is the BEST way to address the risk associated with new IT investments?

A.

Develop security best practices to protect applications.

B.

Integrate security requirements at the beginning of projects

C.

Establish an enterprise-wide incident response process.

D.

Implement an enterprise-wide security awareness program.

Full Access
Question # 128

An enterprise that provides standardized outsourced IT services has signed a new contract with a demanding major client. Which of the following is the BEST approach for managing the associated risks within the enterprise's risk tolerance?

A.

Benchmark the services against industry standards, making any necessary adjustments.

B.

Adjust the enterprise's risk tolerance levels to reflect the demands of the client.

C.

Assess historical key performance indicators (KPIs) related to the services provided to establish potential risk scenarios.

D.

Transfer the associated risks to a specialized insurer and ensure the residual risks cannot affect the enterprise's reputation.

Full Access
Question # 129

An enterprise is conducting a SWOT analysis as part of IT strategy development. Which of the following would be MOST helpful to identify opportunities and threats?

A.

Risk appetite

B.

Internal framework assessment

C.

Competitor analysis

D.

Critical success factors (CSF)

Full Access
Question # 130

The PRIMARY objective of building outcome measures is to:

A.

monitor whether the chosen strategy is successful

B.

visualize how the strategy will be achieved.

C.

demonstrate commitment to IT governance.

D.

clarify the cause-and-effect relationship of the strategy.

Full Access
Question # 131

Which of the following is MOST important for IT governance to have in place to ensure the enterprise can maintain operations during extensive system downtime?

A.

Fault-tolerant hardware

B.

An incident response plan

C.

A crisis communications plan

D.

A business continuity plan (BCP)

Full Access
Question # 132

To meet the growing demands of a newly established business unit, IT senior management has been tasked with changing the current IT organization model to

service-oriented. With significant growth expected of the IT organization, which of the following is the MOST important consideration when planning for long-term IT

service delivery?

A.

The IT service delivery model is approved by the business.

B.

An IT risk management process is in place.

C.

IT is able to provide a comprehensive service catalog to the business.

D.

The IT organization is able to sustain business requirements.

Full Access
Question # 133

A board of directors has just received a report indicating that only a small number of IT initiatives have been completed on time and within budget, A third of the projects were cancelled prior to completion, and more than half will cost almost double their original estimates. An analysis has determined that no one is held responsible for the completion of investmentinitiatives, and there is no consistency in execution. Which of the following would BEST help the enterprise address these problems?

A.

Establishing a project governance framework

B.

Assigning business management to an IT investment review board

C.

Establishing an IT risk management plan

D.

Aligning IT investment priorities to the business

Full Access
Question # 134

An enterprise is approaching the escalation date of a major IT risk. The IT steering committee wants to ascertain who is responsible for the risk response. Where should the committee find this information?

A.

Resource management plan

B.

RACl chart

C.

Risk management plan

D.

Risk register

Full Access
Question # 135

An enterprise is contracting with an outsourcing partner for a long-term engagement. The BEST time for the enterprise to plan for the event of contract termination is when:

A.

planning for the contract as part of business continuity.

B.

issues surface in the contractual relationship.

C.

developing the initial contract.

D.

either party decides to terminate the contract.

Full Access
Question # 136

IT management has reported difficulty retaining qualified IT personnel to support the organization's new strategy Given that outsourcing is not a viable approach, which of the following would be the BEST way for IT governance to address this situation?

A.

Implement an incentive-based employee referral program

B.

Direct the development of a strategic HR plan for IT

C.

Recommend enhancements to the online recruiting platform specific to IT

D.

Work with HR to enhance compensation packages for IT personnel

Full Access
Question # 137

A newly appointed CIO has issued a new IT strategic plan. Which of the following is the MOST effective way for the CIO to ensure the IT management team is held accountable for the delivery of the plan?

A.

Update the IT balanced scorecard with key objectives.

B.

Enforce disciplinary action for managers if the plan is not delivered.

C.

Revise the managers' performance goals to include key objectives.

D.

Provide management training on IT Strategic Objectives

Full Access
Question # 138

A multinational enterprise is planning to migrate to cloud-based systems. Which of the following should be of MOST concern to the risk management committee?

A.

Cost considerations

B.

Regulatory compliance

C.

Resource alignment

D.

Security breaches

Full Access
Question # 139

Communicating which of the following to staff BEST demonstrates senior management's commitment to IT governance?

A.

Legal and regulatory requirements

B.

Approved IT investment opportunities

C.

Objectives and responsibilities

D.

Need for enterprise architecture (EA)

Full Access
Question # 140

Which of the following roles should approve major IT purchases to help prevent conflicts of interest?

A.

IT steering committee

B.

Chief information officer (CIO)

C.

Chief compliance officer

D.

Project management office (PMO)

Full Access
Question # 141

An enterprise is replacing its customer relationship management (CRM) system with a cloud-based system. Which of the following should be done FIRST when preparing for data migration"*

A.

Review the enterprise data architecture.

B.

Establish a data quality plan

C.

Consult the quality assurance (QA) function.

D.

Acquire data migration tools.

Full Access
Question # 142

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

A.

Granting access to information based on information architecture

B.

Engaging an audit of logical access controls and related security policies

C.

Implementing multi-factor authentication controls

D.

Authenticating access to information assets based on roles or business rules

Full Access
Question # 143

A CIO of an enterprise is concerned that IT and the business have different priorities. Which of the following would BEST demonstrate the current state of strategic alignment?

A.

IT maturity model

B.

Business case

C.

Balanced scorecard

D.

IT investment status

Full Access
Question # 144

The IT department has determined that problems with a business report are due to quality issues within a set of data to whom should IT refer the matter for resolution?

A.

Internal audit

B.

Data architect

C.

Business analyst

D.

Data steward

Full Access
Question # 145

Which of the following is MOST important to include in IT governance reporting to the board of directors?

A.

Critical risks

B.

Technology cost savings

C.

Threat landscape

D.

Security events

Full Access
Question # 146

IT security is concerned with employees' increasing use of personal equipment for work-related purposes, while employees claim it allows them to be more productive. A decision on whether to modify the enterprise information security policy should be based on:

A.

audit findings.

B.

user access approval procedures.

C.

the impact to security.

D.

a risk and benefit evaluation.

Full Access
Question # 147

The MOST effective way to ensure that IT supports the agile needs of an enterprise is to:

A.

perform process modeling.

B.

outsource infrastructure management.

C.

develop a robust enterprise architecture (EA).

D.

implement open-source systems.

Full Access
Question # 148

Which of the following is the MOST important input for designing a development program to help IT employees improve their ability to respond to business needs?

A.

Capability maturity model

B.

Cost-benefit analysis

C.

Skills competency assessment

D.

Annual performance evaluation

Full Access
Question # 149

An enterprise wants to address the human factors of social engineering risk within the organization. From a governance perspective, which of the following is the BEST way to mitigate this risk?

A.

Distribute the social media information security policy to staff.

B.

Mandate annual security awareness training.

C.

Restrict access to social media.

D.

Mandate security requirements be included in employee contracts.

Full Access
Question # 150

An organization is evaluating vendors to provide mobile device management (MDM) services. Which of the following is a KEY governance consideration for the IT steering committee?

A.

Service level targets align with business requirements.

B.

Employee-owned devices will be covered by the service.

C.

The MDM services are delivered via a cloud.

D.

Technology-owned devices will be covered by the service

Full Access
Question # 151

Which of the following should be the FIRST action taken by a newly formed IT governance committee to ensure reports are compliant with regulations and identify key IT risks?

A.

Direct the development of a reporting communication plan.

B.

Develop and monitor IT key risk indicator (KRI) triggers.

C.

Train end users on regulation requirements.

D.

Implement a mechanism to ensure reporting escalation.

Full Access
Question # 152

Which of the following is the BEST way to address an IT audit finding that many enterprise application updates lack appropriate documentation?

A.

Enforce change control procedures.

B.

Conduct software quality audits

C.

Review the application development life cycle.

D.

Add change control to the risk register.

Full Access
Question # 153

The PRIMARY objective of promoting business ethics within the IT enterprise should be to ensure:

A.

trust among internal and external stakeholders.

B.

employees act more responsibly.

C.

corporate social responsibility.

D.

legal and regulatory compliance.

Full Access
Question # 154

Which of the following is MOST important to review during IT strategy development?

A.

Industry best practices

B.

IT balanced scorecard

C.

Current business environment

D.

Data flows that indicate areas requiring IT support

Full Access
Question # 155

In a large enterprise, which of the following should be responsible for the implementation of an IT balanced scorecard?

A.

Project management office

B.

Chief information officer (CIO)

C.

IT steering committee

D.

Chief risk officer (CRO)

Full Access
Question # 156

An independent consultant has been hired to conduct an ad hoc audit of an enterprise’s information security office with results reported to the IT governance committee and the board Which of the following is MOST important to provide to the consultant before the audit begins?

A.

Acceptance of the audit risks and opportunities

B.

The scope and stakeholders of the audit

C.

The organizational structure of the security office

D.

The policies and framework used by the security office

Full Access
Question # 157

To enable the development of required IT skill sets for the enterprise, it is MOST important to define skill requirements based on:

A.

training needs.

B.

one set of skills applicable to all IT staff.

C.

a best practices framework.

D.

each role within the IT department.

Full Access
Question # 158

Which of the following is the BEST way to ensure all enterprise employees understand the corporate code of business conduct?

A.

Conduct scheduled and random compliance audits.

B.

Mandate annual ethics training that includes an exam.

C.

Require external business activities be documented and reported.

D.

Distribute a copy of the code and require a signature.

Full Access
Question # 159

Which of the following has the GREATEST influence on data quality assurance?

A.

Data stewardship

B.

Data encryption

C.

Data classification

D.

Data modeling

Full Access
Question # 160

An enterprise has entered into a new market which brings additional regulatory compliance requirements. What should be done FIRST to address these requirements?

A.

Outsource the compliance process.

B.

Appoint a compliance officer.

C.

Update the organization's risk profile.

D.

Have executive management monitor compliance.

Full Access
Question # 161

Which of the following BEST supports the implementation of an effective data classification policy?

A.

Monitoring with key performance indicators (KPIs)

B.

Implementation of data loss prevention (DLP) tools

C.

Clear guidelines adopted by the business

D.

Classification policy approval by the board

Full Access
Question # 162

An enterprise has finalized a major acquisition and a new business strategy in line with stakeholder needs has been introduced to help ensure continuous alignment of IT with the new business strategy the CiO should FIRST

A.

review the existing IT strategy against the new business strategy

B.

revise the existing IT strategy to align with the new business strategy

C.

establish a new IT strategy committee for the new enterprise

D.

assess the IT cultural aspects of the acquired entity

Full Access
Question # 163

Which of the following should be the PRIMARY goal of implementing an IT strategic planning process?

A.

Determining benefits from IT deployments

B.

Optimizing IT resources to drive innovation

C.

Directing business strategy to achieve goals

D.

Translating business needs into IT initiatives

Full Access
Question # 164

The CIO of a large enterprise has taken the necessary steps to align IT objectives with business objectives. What is the BEST way for the CIO to ensure these objectives are delivered effectively by IT staff?

A.

Map the IT objectives to an industry-accepted framework.

B.

Enhance the budget for training based on the IT objectives.

C.

Include the IT objectives in staff performance plans.

D.

Include CIO sign-off of the objectives as part of the IT strategic plan.

Full Access
Question # 165

Which of the following IT governance actions would be the BEST way to minimize the likelihood of IT failures jeopardizing the corporate value of an IT-dependent organization?

A.

Implement an IT risk management framework.

B.

Install an IT continuous monitoring solution.

C.

Define IT performance management measures.

D.

Benchmark IT strategy against industry peers.

Full Access
Question # 166

An enterprise has launched a series of critical new IT initiatives that are expected to produce substantial value Which of the following would BEST provide the board with an indication of progress of the IT initiatives?

A.

Portfolio management review

B.

Full life cycle cost-benefit analysis

C.

Demonstration of prototype and user testing

D.

Critical risk and issue walk-through

Full Access
Question # 167

An enterprise has decided to execute a risk self-assessment to identify improvement opportunities for current IT services. Which of the following is MOST important to address in the assessment?

A.

Related business risk

B.

Residual IT risk

C.

Mapping of business objectives to IT risk

D.

IT capability and performance measures

Full Access
Question # 168

An IT steering committee is preparing to review proposals for projects that implement emerging technologies. In anticipation of the review, the committee should FIRST:

A.

determine if the IT staff can support the emerging technologies.

B.

understand how the emerging technologies will influence risk across the enterprise.

C.

require a capacity plan and framework review for the emerging technologies,

D.

require a review of the enterprise risk management framework.

Full Access
Question # 169

What is the BEST criterion for prioritizing IT risk remediation when resource requirements are equal?

A.

Deviation from IT standards

B.

IT strategy alignment

C.

IT audit recommendations

D.

Impact on business

Full Access
Question # 170

An enterprise is planning to outsource data processing for personally identifiable information (Pll). When is the MOST appropriate time to define the requirements for security and privacy of information?

A.

When issuing requests for proposals (RFPs)

B.

After an assessment of the current information architecture.

C.

When developing service level agreements (SLAs)

D.

During the initial vendor selection process

Full Access
Question # 171

Which of the following should occur FIRST in the IT investment process?

A.

Assess each project's impact on the enterprise's investment plan.

B.

Select IT projects that will best support the enterprise's mission.

C.

Analyze IT investments based on past data.

D.

Analyze the risks and benefits of the investment for each IT project.

Full Access
Question # 172

Which of the following provides the BEST evidence of effective IT governance?

A.

Cost savings and human resource optimization

B.

Business value and customer satisfaction

C.

IT risk identification and mitigation

D.

Comprehensive IT policies and procedures

Full Access
Question # 173

Following a strategic planning session, new IT objectives were announced. Which of the following is the MOST effective way for the CIO to ensure these objectives are cascaded to IT personnel?

A.

Communicate the new IT objectives during a staff meeting.

B.

Define individual performance measures related to the IT objectives.

C.

Establish IT management's performance measures based on the IT objectives.

D.

Update the IT balanced scorecard to align with the new IT objectives.

Full Access
Question # 174

An enterprise is adopting a new governance framework. Of the following, the MOST effective method to help ensure that key activities are performed by appropriate resources is through the use of:

A.

a RACI chart.

B.

an organizational breakdown structure.

C.

a work breakdown structure.

Full Access
Question # 175

To develop appropriate measures to improve organizational performance, the measures MUST be:

A.

a result of benchmarking and comparative analysis.

B.

accepted by and meaningful to the stakeholders.

C.

based on existing and validated data sources.

D.

approved by the IT steering committee.

Full Access
Question # 176

An IT strategy committee has reviewed an audit report indicating sales employees are using personal smartphones to conduct corporate business. Although the committee appreciates the business benefits, it is also concerned with the security risk. To deliver the business benefit, what should be the committee's FIRST recommendation?

A.

Document procedures for securing personal devices.

B.

Improve training courses on securing corporate information.

C.

Perform a risk assessment on personal device data protection.

D.

Update the corporate security policy to include personal devices.

Full Access
Question # 177

Which of the following would BEST support an enterprise's initiative to incorporate desired organizational behaviors into the IT governance framework?

A.

Enterprise code of ethics

B.

Risk mitigation strategies and action plans

C.

Documented consequences for noncompliance

D.

Enterprise RACI matrix

Full Access
Question # 178

An enterprise-wide strategic plan has been approved by the board of directors. Which of the following would BEST support the planning of IT investments required for the enterprise?

A.

Service-oriented architecture

B.

Enterprise architecture (EA)

C.

Contingency planning

D.

Enterprise balanced scorecard

Full Access
Question # 179

Which of the following is the BEST indicator for measuring performance when implementing DevSecOps in an enterprise?

A.

Mean time to repair

B.

Percentage of automated tests

C.

Deployments per day

D.

Number of defects released per day

Full Access
Question # 180

In which of the following situations is it acceptable to retain data beyond the stated policy?

A.

The business created an analytics model based on historical records.

B.

There is a high probability that the enterprise will enter into litigation.

C.

New data privacy regulations are expected in a few months.

D.

A core system database is going through an upgrade.

Full Access
Question # 181

Which of the following is the BEST way for a CIO to ensure that the work of IT employees is aligned with approved IT directives?

A.

Mandate technical training related to the IT objectives.

B.

Have business leaders present their departments' objectives.

C.

Include relevant IT goals in individual performance objectives.

D.

Request a progress review of IT objectives by internal audit.

Full Access
Question # 182

Which of the following is the BEST way for a CIO to provide senior business management with increased visibility to the overall performance of the IT operation?

A.

Develop key risk indicators (KRIs).

B.

Provide return on investment (ROI) reports.

C.

Develop key performance indicators (KPIs).

D.

Provide service level agreement (SLA) performance statistics.

Full Access
Question # 183

An interna! health organization has been notified that a data breach has resulted in patient records being published online. Which of the

following is MOST important consideration when determining the process for meeting the organization's legal and regulatory obligations?

A.

Organizational structure, including accountable partes

B.

Data classification and related security policy

C.

Context of the breach, including data ownership and location

D.

Details of how the breach occurred and related incident response efforts

Full Access
Question # 184

A CIO realizes a significant change is required in the way IT responds to key external customers and needs to gain support from the enterprise to address this situation. What should be done FIRST?

A.

Empower key IT staff to implement a solution.

B.

Establish new customer service policies.

C.

Engage customer service training providers.

D.

Engage the IT steering committee.

Full Access
Question # 185

Due to budget cuts, IT has been forced to limit service offerings in the portfolio. There has been significant resistance from business leaders to this decision. Which of the following is the BEST way for the CIO to find a solution that is aligned with business objectives?

A.

Engage an external consultant to document IT’s alignment with the business.

B.

Perform a cost-benefit analysis and communicate results.

C.

Reallocate budget from maintenance projects in the portfolio.

D.

Collaborate with the business to prioritize the IT portfolio.

Full Access
Question # 186

Which of the following BEST supports an IT staff restructure as part of an annual IT strategy review with senior management?

A.

Established IT key performance indicators (KPIs)

B.

IT staff training program requirements

C.

External IT staffing benchmarks

D.

An updated business case for IT resourcing

Full Access
Question # 187

An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:

A.

a common risk management taxonomy.

B.

a common risk organization.

C.

common key risk indicators (KRIs).

D.

common risk mitigation strategies.

Full Access
Question # 188

Which of the following is the FIRST consideration for a CISO when implementing Zero Trust architecture?

A.

Refining relevant business goals.

B.

Limiting the number of privileged accounts.

C.

Selecting a security framework that is relevant to the business.

D.

Defining security projects to address identified control gaps.

Full Access
Question # 189

The PRIMARY objective of establishing outcome measures is to:

A.

Clarify the cause-and-effect relationship of the strategy

B.

Monitor whether the chosen strategy is successful

C.

Understand how the strategy will be achieved

D.

Demonstrate commitment to IT governance

Full Access
Question # 190

A CIO engages a consulting firm to conduct a benchmark analysis of the organization’s IT governance framework against industry best practices. Several recommendations to improve the maturity of the framework are identified. Which of the following should be the CIO's NEXT course of action?

A.

Develop a plan to integrate the recommendations

B.

Appoint a project manager to implement the recommendations

C.

Obtain approval from the IT steering committee to implement the recommendations

D.

Evaluate the feasibility of the recommendations

Full Access
Question # 191

Which of the following would be MOST helpful to review when determining how to allocate IT resources during a resource shortage?

A.

IT strategic plan

B.

IT skills inventory

C.

IT organizational structure

D.

IT skill development plan

Full Access
Question # 192

Of the following, who is responsible for the achievement of IT strategic objectives?

A.

IT steering committee

B.

Business process owners

C.

Chief information officer (CIO)

D.

Board of directors

Full Access
Question # 193

An enterprise is evaluating both a virtual reality (VR) project and an augmented reality (AR) project. Which of the following should be the MOST important objective when evaluating these two projects within IT portfolio management?

A.

Maximizing the earned value of IT investments

B.

Determining which IT project to discontinue

C.

Implementing efficient and effective solutions

D.

Reducing the risk exposure of the projects

Full Access
Question # 194

An enterprise has learned of a new regulation that may impact delivery of one of its core technology services. Which of the following should be done FIRST?

A.

Request an action plan from the risk team.

B.

Determine whether the board wants to comply with the regulation.

C.

Update the risk management framework.

D.

Assess the risk associated with the new regulation.

Full Access
Question # 195

A CIO is planning to implement an enterprise resource planning (ERP) system at the request of the business. Of the following, who is accountable for providing sponsorship for the IT-enabled change across the enterprise?

A.

CEO

B.

Human resource (HR) director

C.

IT strategy committee

D.

CIO

Full Access
Question # 196

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Full Access
Question # 197

A CIO is planning to interview enterprise stakeholders to assess whether the IT strategic plan is continuing to support enterprise business objectives. The CIO would be MOST effective by starting the interview process with:

A.

the executive team.

B.

the internal auditors.

C.

senior IT managers.

D.

business process owners.

Full Access
Question # 198

IT governance within an enterprise is attempting to drive a cultural shift to enhance compliance with IT security policies. The BEST way to support this objective is to ensure that enterprise IT policies are:

A.

communicated on a regular basis.

B.

acknowledged and signed by each employee.

C.

centrally posted and contain detailed instructions.

D.

integrated into individual performance objectives.

Full Access
Question # 199

An enterprise has launched a critical new IT initiative that is expected to produce substantial value. Which of the following would BEST facilitate the reporting of benefits realized by the IT investment to the board?

A.

Balanced scorecard

B.

Milestone chart

C.

Performance management

D.

Critical risk and issue walk through

Full Access
Question # 200

An IT governance committee is reviewing its current risk management policy in light of increased usage of social media within an enterprise. The FIRST task for the governance committee is to:

A.

recommend blocking access to social media.

B.

review current level of social media usage.

C.

initiate an assessment of the impact on the business.

D.

reassess the enterprise's bring your own device (BYOD) policy.

Full Access
Question # 201

Despite an adequate training budget. IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?

A.

Provide incentives for IT staff to attend outside conferences and training

B.

Create a standard-setting center of excellence for IT.

C.

Require human resources (HR) to recruit new talent using an established IT skills matrix.

D.

Establish an agreed-upon skills development plan with each employee

Full Access
Question # 202

A small enterprise has just hired its first CIO, who has been tasked with making the IT department more efficient. What should be the CIO's NEXT step after identifying several new improvement initiatives?

A.

Mandate IT staff training.

B.

Request an IT balanced scorecard.

C.

Require a cost-benefit analysis.

D.

Allocate funding for the initiatives.

Full Access
Question # 203

An enterprise recently implemented a significant change in its business strategy by moving to a technologically advanced product with considerable impact on the business. What should be the FINAL step in completing the changes to IT processes?

A.

Updating the configuration management database (CMDB)

B.

Empowering the business to embrace the changes

C.

Ensuring a return to stabilized business operations

D.

Updating the enterprise architecture (EA)

Full Access
Question # 204

A CIO has recently been made aware of a new regulatory requirement that may affect IT-enabled business activities. Which of the following should be the CIO s FIRST step in deciding the appropriate response to the new requirement?

A.

Revise initiatives that are active to reflect the new requirements.

B.

Confirm there are adequate resources to mitigate compliance requirements.

C.

Consult with legal and risk experts to understand the requirements.

D.

Consult with the board for guidance on the new requirements

Full Access
Question # 205

An enterprise is exploring a new business opportunity. Which of the following is the BEST way to help ensure related IT projects deliver the business requirements?

A.

Hire a business consultant to manage the projects.

B.

Develop a policy to enforce the processes and procedures.

C.

Implement stage-gate reviews that require business sign-off.

D.

Focus on maturing processes and developing procedures.

Full Access
Question # 206

Which of the following provides an enterprise with the BEST understanding of the value proposition for employing a new cloud service?

A.

Key risk indicators (KRIs).

B.

Service level agreements (SLAs).

C.

Return on investment (ROI).

D.

Customer satisfaction surveys.

Full Access
Question # 207

The board of an organization has been informed of possible cyberthreats. Which of the following should be the board’s NEXT course of action?

A.

Evaluate the security incident response process

B.

Reevaluate the risk tolerance of the organization

C.

Ask the CIO to report on a risk response

D.

Engage the CIO to evaluate the risk

Full Access