Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CGEIT Questions and Answers

Question # 6

A new chief information officer (CIO) of an enterprise recommends implementing portfolio management after realizing there is no process in place for evaluating investments prior to selection. What should be the PRIMARY strategic goal driving this decision?

A.

Maximize value from the combined investments.

B.

Standardize processes for investment evaluation.

C.

Align investments to the enterprise architecture (EA).

D.

Enable transparency within the investment process.

Full Access
Question # 7

A CIO is planning to implement an enterprise resource planning (ERP) system at the request of the business. Of the following, who is accountable for providing sponsorship for the IT-enabled change across the enterprise?

A.

CEO

B.

Human resource (HR) director

C.

IT strategy committee

D.

CIO

Full Access
Question # 8

The accountability for a business continuity program for business-critical systems is BEST assigned to the:

A.

enterprise risk manager.

B.

chief executive officer (CEO).

C.

director of internal audit.

D.

chief information officer (CIO).

Full Access
Question # 9

An IT governance committee realizes there are antiquated technologies in use throughout the enterprise. Which of the following is the BEST group to evaluate the recommendations to address these shortcomings?

A.

Enterprise architecture (EA) review board

B.

Business process improvement workgroup

C.

Audit committee

D.

Risk management committee

Full Access
Question # 10

A strategic IT-enabled investment is failing due to unforeseen technology problems. What should be the board of directors' FIRST course of action?

A.

Terminate the investment.

B.

Assess the business risk and options.

C.

Approve an investment budget increase.

D.

Revise the investment selection process.

Full Access
Question # 11

A CIO of an enterprise is concerned that IT and the business have different priorities. Which of the following would BEST demonstrate the current state of strategic alignment?

A.

IT maturity model

B.

Business case

C.

Balanced scorecard

D.

IT investment status

Full Access
Question # 12

Which of the following will BEST enable an IT steering committee to monitor the achievement of overall IT objectives on a continuous basis?

A.

Defined service level agreements (SLAs)

B.

Project portfolio dashboards

C.

Key performance indicators (KPIs)

D.

IT user survey results

Full Access
Question # 13

An independent consultant has been hired to conduct an ad hoc audit of an enterprise’s information security office with results reported to the IT governance committee and the board Which of the following is MOST important to provide to the consultant before the audit begins?

A.

Acceptance of the audit risks and opportunities

B.

The scope and stakeholders of the audit

C.

The organizational structure of the security office

D.

The policies and framework used by the security office

Full Access
Question # 14

The PRIMARY benefit of integrating IT resource planning into enterprise strategic planning is that it enables the enterprise to:

A.

allocate resources efficiently to achieve desired goals.

B.

adjust business goals depending upon resource availability.

C.

prioritize resource allocation based on sourcing strategy.

D.

develop tactical plans to achieve resource optimization.

Full Access
Question # 15

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

A.

Require an update to enterprise data policies.

B.

Request an impact analysis.

C.

Review documented data interdependence.

D.

Validate against existing architecture.

Full Access
Question # 16

A strategic systems project was implemented several months ago. Which of the following is the BEST reference for the IT steering committee as they evaluate its level of success?

A.

Stakeholder satisfaction surveys

B The project's net present value (NPV)

B.

The project's business case

C.

Operating metrics of the new system

Full Access
Question # 17

The CIO in a large enterprise is seeking assurance that significant IT risk is being proactively monitored and does not exceed agreed risk tolerance levels. The BEST way to provide this ongoing assurance is to require the development of:

A.

an IT risk appetite statement.

B.

a risk management policy.

C.

key risk indicators (KRIs).

D.

a risk register.

Full Access
Question # 18

An IT investment review board wants to ensure that IT will be able to support business initiatives. Each initiative is comprised of several interrelated IT projects. Which of the following would help ensure that the initiatives meet their goals?

A.

Review of project management methodology

B.

Review of the business case for each initiative

C.

Establishment of portfolio management

D.

Verification of initiatives against the architecture

Full Access
Question # 19

The board of directors has mandated the use of geolocation software to track mobile assets assigned to employees who travel outside of their home country. To comply with this mandate, the IT steering committee should FIRST request

A.

the inclusion of mandatory training for remote device users.

B.

an architectural review to determine appropriate solution design.

C.

an assessment to determine if data privacy protection is addressed.

D.

an update to the acceptable use policy.

Full Access
Question # 20

An enterprise experiencing issues with data protection and least privilege is implementing enterprise-wide data encryption in response. Which of the following is the BEST approach to ensure all business units work toward remediating these issues?

A.

Develop key performance indicators (KPIs) to measure enterprise adoption.

B.

Integrate data encryption requirements into existing and planned projects.

C.

Assign owners for data governance initiatives.

D.

Mandate the creation of a data governance framework.

Full Access
Question # 21

An enterprise has had the same IT governance framework in place for several years. Currently, large and small capital projects go through the same architectural governance reviews. Despite repeated requests to streamline the review process for small capital projects, business units have received no response from IT. The business units have recently escalated this issue to the newly appointed GO. Which of the following should be done FIRST to begin addressing business needs?

A.

Create a central repository for the business to submit requests.

B.

Explain the importance of the IT governance framework.

C.

Assess the impact of the proposed change.

D.

Assign a project team to implement necessary changes.

Full Access
Question # 22

An enterprise embarked on an aggressive strategy requiring the implementation of several large IT projects impacting multiple business processes across all departments. Initially employees were supportive of the strategy, but there is growing fatigue and frustration with the ongoing new capabilities which must be learned. Which of the following would be the BEST action performed by senior management?

A.

Incorporate an organizational change management program.

B.

Establish "Reward and Recognition" efforts to boost employee morale.

C.

Improve the system development life cycle (SDLC) process.

D.

Assess current business and IT competencies.

Full Access
Question # 23

When developing effective metrics for the measurement of solution delivery, it is MOST important to:

A.

establish project controls and monitoring objectives.

B.

perform an objective analysis of the project roadmap.

C.

establish the objectives and expected benefits.

D.

specify quantitative measures for solution delivery.

Full Access
Question # 24

What is the PRIMARY objective for performing an IT due diligence review prior to the acquisition of a competitor?

A.

Document the competitor's governance structure.

B.

Ensure that the competitor understands significant IT risks.

C.

Assess the status of the risk profile of the competitor.

D.

Determine whether the competitor is using industry-accepted practices.

Full Access
Question # 25

Who is PRIMARILY accountable for delivering the benefits of an IT-enabled investment program to the enterprise?

A.

Program manager

B.

IT steering committee chair

C.

CIO

D.

Business sponsor

Full Access
Question # 26

A multinational enterprise recently purchased a large company located in a different country. When introducing the concept of governance to the new acquisition, it is MOST important that executive management recognize:

A.

language differences.

B.

the use of international standards.

C.

the impact of cultural changes.

D.

globally recognized good practices.

Full Access
Question # 27

Senior management wants to promote investment in IT, but is uncertain that associated risks are being properly identified. The BEST way to address this concern is to:

A.

engage an external consultant to develop risk scenarios.

B.

appoint an IT representative to the business risk committee.

C.

assign an IT cost controller to the finance department.

D.

ensure business cases are developed by IT.

Full Access
Question # 28

Which of the following MOST effectively prevents an IT system from becoming technologically obsolete before its planned return on investment (ROi)?

A.

Requesting periodic third-party assessments of the system throughout its life

B.

Obtaining long-term support commitments from the system platform vendors)

C.

Obtaining independent assurance that the system will conform to future business requirements

D.

Ensuring that the system is maintained in compliance with enterprise architecture (EA) standards

Full Access
Question # 29

Which of the following is the BEST method for making a strategic decision to invest in cloud services?

A.

Prepare a business case.

B.

Prepare a request for information (RFI),

C.

Benchmarking.

D.

Define a balanced scorecard.

Full Access
Question # 30

Before an IT strategy committee can approve an IT risk assessment framework, which of the following is MOST important to have established?

A.

An enterprise risk mitigation strategy

B.

Leading and lagging risk indicators

C.

IT performance metrics and standards

D.

Enterprise definitions for risk impact and probability

Full Access
Question # 31

An enterprise made a significant change to its business operating model that resulted in a new strategic direction. Which of the following should be reviewed FIRST to ensure IT congruence with the new business strategy?

A.

IT risk appetite

B.

Enterprise project management framework

C.

IT investment portfolio

D.

Information systems architecture

Full Access
Question # 32

An enterprise has established a new department to oversee the life cycle of activities that support data management objectives. Which of the following should be done NEXT?

A.

Develop a business continuity plan (BCP).

B.

Assess the current data business model.

C.

Review data privacy requirements.

D.

Establish a RACI chart

Full Access
Question # 33

A board of directors wants to ensure the enterprise is responsive to changes in its environment that would directly impact critical business processes. Which of the following will BEST facilitate meeting this objective?

A.

Scheduling frequent threat analyses

B.

Monitoring key risk indicators (KRIs)

C.

Regularly reviewing the enterprise risk appetite

D.

Implementing a competitive intelligence tool

Full Access
Question # 34

Which of the following is the BEST indication of effective IT-business strategic alignment?

A.

Business management is involved as IT strategies are developed.

B.

IT senior management is required to report to the board.

C.

Business strategy is documented to allow IT architecture to be designed quickly.

D.

IT-business collaboration results in a strategy focused on IT cost reduction.

Full Access
Question # 35

Which of the following provides the BEST evidence of effective IT governance?

A.

Cost savings and human resource optimization

B.

Business value and customer satisfaction

C.

IT risk identification and mitigation

D.

Comprehensive IT policies and procedures

Full Access
Question # 36

To measure the value of IT-enabled investments, an enterprise needs to identify its drivers as defined by its:

A.

technology strategy.

B.

value statements.

C.

service level agreements (SLAs).

D.

business strategy.

Full Access
Question # 37

Which of the following should a CIO review to obtain a holistic view of IT performance when identifying potential gaps in service delivery?

A.

Key performance indicators (KPIs)

B.

Return on investment (ROI) analysis

C.

Service level agreement (SLA) reporting

D.

Staff performance evaluations

Full Access
Question # 38

An enterprise is implementing its first mobile sales channel. Final approval for accepting the associated IT risk should be obtained from which of the following?

  • Risk manager
  • Business sponsor

A.

Chief information officer (CIO)

B.

IT steering committee

Full Access
Question # 39

An enterprise is assessing whether to utilize wearable technology. The enterprise has no prior experience with this technology and has asked the chief technology officer (CTO) to assess the impact to the enterprise. The CTO should FIRST:

A.

understand the enterprise’s risk tolerance.

B.

create an IT risk scorecard.

C.

prioritize wearable technology risk.

Full Access
Question # 40

An IT steering committee is concerned about staff saving data files containing sensitive corporate information on publicly available cloud file storage applications. Which of the following should be done FIRST to address this concern?

A.

Create a secure corporate cloud file storage and sharing solution.

B.

Block corporate access to cloud file storage applications.

C.

Require staff training on data classification policies.

D.

Revise the data management policy to prohibit this practice.

Full Access
Question # 41

Which of the following is the GREATEST expected strategic organizational benefit from the standardization of technical platforms?

A.

Reduces IT operational training costs

B.

Reduces response time

C.

Optimizes infrastructure investments

D.

Meets regulatory compliance requirements

Full Access
Question # 42

An enterprise has a centralized IT function but also allows business units to have their own technology operations, resulting in duplicate technologies and conflicting priorities. Which of the following should be done FIRST to reduce the complexity of the IT landscape?

  • Promote automation tools used by the business units.

A.

Conduct strategic planning with business units.

B.

Migrate all in-house systems to an external cloud environment.

C.

Standardize technology architecture on common products.

Full Access
Question # 43

Within a governance structure for risk management, which of the following activities should be performed by the second line of defense?

A.

Conducting internal and external audits

B.

Implementing controls to manage risk

C.

Monitoring risk and controls

D.

Identifying and assessing risk

Full Access
Question # 44

Which of the following BEST helps to ensure that IT policies are

aligned with organizational strategies?

A.

The policies are approved by the board of directors.

B.

The policies are developed using a top-down approach.

C.

The policies are updated annually.

D.

The policies are periodically audited.

Full Access
Question # 45

Which of the following would BEST help assess the effectiveness of a newly established IT governance framework?

A.

Develop a business case for the program portfolio.

B.

Evaluate key performance indicator (KPI) results.

C.

Benchmark the IT governance framework to industry best practice.

D.

Review results of IT audit reports.

Full Access
Question # 46

Which of the following is the MOST efficient approach for using risk scenarios to evaluate a new business opportunity?

A.

Related risks are consolidated into one scenario for analysis.

B.

Risk events are identified bottom-up and top-down.

C.

Risk identification leverages past audit and compliance reports.

D.

Risk scenario narratives are summarized and limited in length.

Full Access
Question # 47

Which of the following should a new CIO do FIRST to set the strategic direction for IT?

A.

Develop well-defined business cases that include strategic outcomes.

B.

Remap stakeholder analysis and desired expectations.

C.

Review existing enterprise strategic objectives.

D.

Redesign detailed RACI charts of the IT function.

Full Access
Question # 48

Despite an adequate training budget. IT staff are not keeping skills current with emerging technologies critical to the business. Which of the following is the BEST way for the enterprise to address this situation?

A.

Provide incentives for IT staff to attend outside conferences and training

B.

Create a standard-setting center of excellence for IT.

C.

Require human resources (HR) to recruit new talent using an established IT skills matrix.

D.

Establish an agreed-upon skills development plan with each employee

Full Access
Question # 49

Which of the following BEST facilitates the standardization of IT vendor selection?

A.

Cost-benefit analysis

B.

Contract management office

C.

Service level agreements (SLAs)

D.

Procurement framework

Full Access
Question # 50

IT senior management has just received a survey report indicating that more than one third of the organization's key IT staff plan to retire within the next 12 months. Which of the following is the MOST important governance action to prepare for this possibility?

A.

Engage human resources (HR) for recruitment of new staff.

B.

Request the development of a succession plan.

C.

Review motivation drivers for key IT staff.

D.

Evaluate lower-level staff as succession candidates.

Full Access
Question # 51

A CIO just received a final audit report that indicates there is inconsistent enforcement of the enterprise's mobile device acceptable use policy throughout all business units. Which of the following should be the FIRST step to address this issue?

A.

Incorporate compliance metrics into performance goals.

B.

Review the relevance of existing policy.

C.

Mandate awareness training for all mobile device users.

D.

Implement controls to enforce the policy.

Full Access
Question # 52

Individual business units within an enterprise have been designing their own IT solutions without consulting the IT department. From a governance perspective, what is the GREATEST issue associated with this situation?

A.

Security controls may not meet IT requirements.

B.

The enterprise does not have the skills to manage the solutions.

C.

The solutions conflict with IT goals and objectives.

D.

The solution may conflict with existing enterprise goals.

Full Access
Question # 53

A CEO wants to establish a governance framework to facilitate the alignment of IT and business strategies. Which of the following should be a KEY requirement of this framework?

A.

Defined resourcing levels

B.

A defined enterprise architecture (EA)

C.

An outsourcing strategy

D.

A service delivery Strategy

Full Access
Question # 54

Which of the following is MOST important to document for a business ethics program?

A.

Guiding principles and best practices

B.

Violation response matrix

C.

Whistle-blower protection protocols.

D.

Employee awareness and training content

Full Access
Question # 55

Right-to-audit clauses are intended to ensure the vendor:

A.

aligns staff skill sets adequately.

B.

maintains adequate budget for risk management.

C.

addresses compliance requirements.

D.

optimizes IT operations for service delivery

Full Access
Question # 56

Before establishing IT key nsk indicators (KRls) which of the following should be defined FIRST?

A.

IT resource strategy

B.

IT risk and security framework

C.

IT goals and objectives

D.

IT key performance indicators (KPIs)

Full Access
Question # 57

Which of the following decisions would be made by the IT strategy committee?

A.

Communication plan for a major IT initiative

B.

Cloud implementation and support plan

C.

Enterprise risk management (ERM) framework

D.

Composition of the investment portfolio

Full Access
Question # 58

Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?

A.

Poor desktop service delivery

B.

Data retention

C.

Redundant systems

D.

Poor business decisions

Full Access
Question # 59

From a governance perspective, the PRIMARY goal of an IT risk optimization process should be to ensure:

A.

IT risk thresholds are defined in the enterprise architecture (EA).

B.

the IT risk mitigation strategy is approved by management.

C.

IT risk is mapped to the balanced scorecard.

D.

the impact of IT risk to the enterprise is managed.

Full Access
Question # 60

What is the BEST criterion for prioritizing IT risk remediation when resource requirements are equal?

A.

Deviation from IT standards

B.

IT strategy alignment

C.

IT audit recommendations

D.

Impact on business

Full Access
Question # 61

Which of the following is the BEST approach to assist an enterprise in planning for iT-enabled investments?

A.

Enterprise architecture (EA).

B.

IT process mapping

C.

Task management

D.

Service level management

Full Access
Question # 62

Which of the following is the BEST approach when reviewing The security status of a new business acquisition?

A.

Embed IT risk management strategies in service level agreements (SLAs).

B.

Establish a committee to oversee the alignment of IT security in new businesses.

C.

Incorporate IT security objectives to cover additional risks associated with new businesses.

D.

Integrate IT risk assessment into the overall due diligence process.

Full Access
Question # 63

Which of the following would BEST enable business innovation through IT?

A.

Outsourcing of IT to a strategic business partner

B.

Business participation in IT strategy development

C.

Adoption of a standardized business development life cycle

D.

IT participation in business strategy development

Full Access
Question # 64

Of the following, who should approve the criteria for information quality within an enterprise?

A.

Information architect

B.

Information analyst

C.

Information steward

D.

Information owner

Full Access
Question # 65

The BEST way to manage continuous improvement of governance-related processes is to:

A.

assess existing process resource capacities.

B.

define accountability based on roles and responsibilities.

C.

apply effective quality management practices.

D.

require third-party independent reviews.

Full Access
Question # 66

An enterprise is evaluating a Software as a Service (SaaS) solution to support a core business process. There is no outsourcing governance or vendor management in place. What should be the CEO's FIRST course of action?

A.

Ensure the roles and responsibilities to manage service providers are defined.

B.

Establish a contract with the SaaS solution provider.

C.

Instruct management to use the standard procurement process.

D.

Ensure the service level agreements (SLAs) for service providers are defined.

Full Access
Question # 67

A review of the effectiveness of IT governance within an enterprise has revealed that several innovation improvement initiatives are failing. An analysis shows a lack of stakeholder buy-in to the improvements. Implementing which of the following would have prevented this problem?

A.

An IT project roadmap

B.

An IT risk management program

C.

A change management program

D.

A service delivery framework

Full Access
Question # 68

While assessing the feasibility of introducing new IT practices and standards into the IT governance framework, it is CRITICAL to understand an organization's:

A.

culture.

B.

level of outsourcing.

C.

enterprise architecture (EA).

D.

maturity of IT processes.

Full Access
Question # 69

A rail transport company has the worst on-time arrival record in the industry due to an antiquated IT system that controls scheduling. Despite employee resistance, an initiative lo upgrade the technology and related processes has been approved. To maximize employee engagement throughout the project, which of the following should be in place prior to the start of the initiative?

A.

Procurement management plan

B.

Organizational change management plan

C.

Risk response plan

D.

Resource management plan

Full Access
Question # 70

Which of the following is the BEST way to demonstrate that IT strategy supports a new enterprise strategy?

A.

Monitor new key risk indicators (KRIs).

B.

Measure return on IT investments against balanced scorecards.

C.

Review and update the portfolio management process.

D.

Map IT programs to business goals.

Full Access
Question # 71

An enterprise plans to expand into new markets in countries lacking data privacy regulations, increasing risk exposure. Which of the following is the BEST course of action for the CIO?

A.

Identify business risk appetite and tolerance levels.

B.

Quantify the risk impact and evaluate possible countermeasures.

C.

Limit the personal data available to the high-risk countries.

D.

Mandate the strengthening of user access controls.

Full Access
Question # 72

Best practice states that IT governance MUST:

A.

enforce consistent policy across the enterprise.

B.

be applied in the same manner throughout the enterprise.

C.

apply consistent target levels of maturity to processes.

D.

be a component of enterprise governance.

Full Access
Question # 73

It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?

A.

Enterprise architecture (EA)

B.

Enterprise risk framework

C.

IT service management

D.

IT project roadmap

Full Access
Question # 74

Which of the following would provide the BEST input for prioritizing strategic IT improvement initiatives?

A.

Business dependency assessment

B.

Business process analysis

C.

Business case evaluation

D.

Business impact analysis (BIA)

Full Access
Question # 75

An enterprise considering implementing IT governance should FIRST develop the scope of the IT governance program and:

A.

initiate the program using an implementation roadmap.

B.

establish initiatives for business and managers.

C.

acquire the resources that will be required.

D.

communicate the program to stakeholders to gain consensus.

Full Access
Question # 76

Enterprise IT has overseen the implementation of an array of data services with overlapping functionality leading to business inefficiencies. Which of the following is the MOST likely cause of this situation?

A.

insufficient information architecture

B.

Ineffective project management

C.

An outdated service level agreement (SLA)

D.

An incomplete cost-benefit analysis

Full Access
Question # 77

Which of the following is the BEST way to ensure the continued usefulness of IT governance reports for stakeholders?

A.

Conduct quarterly audits and adjust reporting based on findings.

B.

Establish a standard process for providing feedback.

C.

Rely on IT leaders to advise when adjustments should be made.

D.

Issue frequent service level satisfaction surveys.

Full Access
Question # 78

Which of the following BEST reflects mature risk management in an enterprise?

A.

A regularly updated risk register

B.

Ongoing risk assessment

C.

Ongoing investment in risk mitigation

D.

Responsive risk awareness culture

Full Access
Question # 79

Acceptance of an enterprise's newly implemented IT governance initiatives has been resisted by a functional group requesting more autonomy over technology choices. Which of the following is MOST important to accommodate this need for autonomy?

A.

Continuous improvement processes

B.

Documentation of key management practices

C.

An exception management process

D.

A change control process

Full Access
Question # 80

An executive sponsor of a partially completed IT project has learned that the financial assumptions supporting the project have changed. Which of the following governance actions should be taken FIRST?

A.

Schedule an interim project review.

B.

Request a risk assessment.

C.

Re-evaluate the project in the portfolio.

D.

Request an update to the business case

Full Access
Question # 81

Which of the following is the PRIMARY element in sustaining an effective governance framework?

A.

Identification of optimal business resources

B.

Establishment of a performance metric system

C.

Ranking of critical business risks

D.

Assurance of the execution of business controls

Full Access
Question # 82

An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?

A.

Revising the business $ balanced store card

B.

Updating the business risk profile

C.

Changing the IT steering committee charter

D.

Calculating the cost of the current solution

Full Access
Question # 83

Which of the following is the MOST effective way for a CIO to govern business unit deployment of shadow IT applications in a cloud environment?

A.

Implement controls to block the installation of unapproved applications.

B.

Educate the executive team about the risk associated with shadow IT applications.

C.

Provide training to the help desk to identify shadow IT applications.

D.

Review and update the application implementation process.

Full Access
Question # 84

An enterprise considers implementing a system that uses a technology that is not in line with its IT strategy. The business case indicates significant benefit to the enterprise. Which of the following is the BEST way to manage this situation within an IT governance framework?

A.

Update the IT strategy to align with the new technology.

B.

Initiate an operational change request.

C.

Reject based on non-alignment.

D.

Address as part of an architecture exception process.

Full Access
Question # 85

Which of the following is an ADVANTAGE of using strategy mapping?

A.

It provides effective indicators of productivity and growth.

B.

It depicts the maturity levels of processes that support organizational strategy.

C.

It identifies barriers to strategic alignment and links them to specific outcomes.

D.

It depicts the cause-and-effect linked relationships between strategic objectives.

Full Access
Question # 86

The BEST way to manage an outsourced vendor relationship is by:

A.

conducting periodic risk assessments.

B.

reviewing annual independent third-party reports.

C.

providing clear objectives and transparency.

D.

analyzing performance statistics from the vendor.

Full Access
Question # 87

Which of the following MOST effectively demonstrates operational readiness to address information security risk issues?

A.

Executive management has announced an information security risk initiative.

B.

IT management has communicated the need for information security risk management to the business.

C.

A policy has been communicated stating enterprise commitment and readiness to address information security risk.

D.

Procedures have been established for assessing and mitigating information security risks.

Full Access
Question # 88

Due to continually missed service level agreements (SLAs), an enterprise plans to terminate its contract with a vendor providing IT help desk services. The enterprise s IT department will assume the help desk-related responsibilities. Which of the following would BEST facilitate this transition?

A.

Requiring the enterprise architecture (EA) be updated

B.

Validating that the balanced scorecard is still meaningful

C.

Ensuring IT will operate at a lower cost than the vendor

D.

Ensuring a change management plan is in place

Full Access
Question # 89

A company is considering selling products online, and the CIO has been asked to advise the board of directors of potential problems with this strategy. Which of the following is the ClO's BEST course of action?

A.

Review the security framework.

B.

Conduct a return on investment (ROI) analysis.

C.

Review the enterprise architecture (EA).

D.

Perform a risk assessment.

Full Access
Question # 90

An enterprise can BEST assess the benefits of a new IT project through its life cycle by:

A.

calculation of the total cost of ownership.

B.

periodic review of the business case.

C.

periodic measurement of the project slip rate.

D.

calculation of the net present value (NPV).

Full Access
Question # 91

Establishing a uniform definition for likelihood and impact through risk management standards PRIMARILY addresses which of the following concerns?

A.

Inconsistent categories of vulnerabilities

B.

Conflicting interpretations of risk levels

C.

Inconsistent data classification

D.

Lack of strategic IT alignment

Full Access
Question # 92

Which of the following is MOST critical for the successful implementation of an IT process?

A.

Process framework

B.

Service delivery process model

C.

Objectives and metrics

D.

IT process assessment

Full Access
Question # 93

An enterprise has a zero-tolerance policy regarding security. This policy is causing a large number of email attachments to be blocked and is a disruption to enterprise. Which of the following should be the FIRST governance step to address this email issue?

A.

Direct the development of an email usage policy.

B.

Obtain senior management input based on identified risk.

C.

Recommend business sign-off on the zero-tolerance policy.

D.

Introduce an exception process.

Full Access
Question # 94

Which of the following would be of MOST concern regarding the effectiveness of risk management processes?

A.

Key risk indicators (KRIs) are not established.

B.

Risk management requirements are not included in performance reviews.

C.

The plans and procedures are not updated on an annual basis.

D.

There is no framework to ensure effective reporting of risk events.

Full Access
Question # 95

Which of the following would provide the MOST useful information to measure the alignment of IT with the enterprise?

A.

Balanced scorecard

B.

Control self-assessment (CSA)

C.

Gap analysis

D.

Audit reports

Full Access
Question # 96

IT governance within an enterprise is attempting to drive a cultural shift to enhance compliance with IT security policies. The BEST way to support this objective is to ensure that enterprise IT policies are:

A.

communicated on a regular basis.

B.

acknowledged and signed by each employee.

C.

centrally posted and contain detailed instructions.

D.

integrated into individual performance objectives.

Full Access
Question # 97

When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?

A.

Standardization

B.

Replication

C.

Segregation

D.

Sanitization

Full Access
Question # 98

What should be an IT steering committee's FIRST course of action when an enterprise is considering establishing a virtual reality store to sell its products?

A.

Request a resource gap analysis.

B.

Request a cost-benefit analysis.

C.

Request development of key risk indicators (KRIs).

D.

Request a threat assessment.

Full Access
Question # 99

Which of the following is the MOST efficient way for an IT transformation project manager to communicate the project progress with stakeholders?

  • Establish governance forums within project management.

A.

Include key performance indicators (KPls) in a monthly newsletter.

B.

Share the business case with stakeholders.

C.

Post the project management report to the enterprise intranet site.

Full Access
Question # 100

Which of the following is the PRIMARY consideration for an enterprise when deciding whether to adopt a qualitative risk assessment method?

  • The method identifies areas to immediately address vulnerabilities.

  • The method provides specific objective measurements of exposure.

  • The method enables an analysis Of recommended controls.

A.

The method provides a platform for all departments to contribute to the risk assessment.

Full Access
Question # 101

An internal auditor conducts an assessment of a two-year-old IT risk management program. Which of the following findings should be of MOST concern to the CIO?

A.

Organizational responsibility for IT risk management is not clearly defined.

B.

None of the members of the IT risk management team have risk management-related certifications.

C.

Only a few key risk indicators (KRIs) identified by the IT risk management team are being monitored and the rest will be on a phased schedule.

D.

IT risk training records are not properly retained in accordance with established schedules

Full Access
Question # 102

Which of the following is MOST important for a CIO to ensure before signing a contract for a new cloud-based customer relationship management (CRM) system?

  • The service provider has been audited for vulnerabilities and threats.

A.

Risk management responsibilities are agreed upon and accepted.

B.

The request for proposal (RFP) has been reviewed for completeness.

C.

A full system functionality check has been completed.

Full Access
Question # 103

Which of the following is the PRIMARY role of the CEO in IT governance?

A.

Evaluating return on investment (ROI)

B.

Nominating IT steering committee membership

C.

Establishing enterprise strategic goals

D.

Managing the risk governance process

Full Access
Question # 104

Which of the following BEST facilitates the adoption of an IT governance program in an enterprise?

A.

Defining clear roles and responsibilities for the participants

B.

Using a comprehensive business case for the initiative

C.

Communicating the planned IT strategy to stakeholders

D.

Addressing the behavioral and cultural aspects of change

Full Access
Question # 105

In a large enterprise, which of the following is the BEST approach to enable effective communication to senior management regarding the project status for a strategic enterprise resource management system implementation?

A.

Project management office with business and IT representatives

B.

Weekly project reports reviewed by business and IT management

C.

Project status updates on the intranet

D.

A steering committee involving business and IT

Full Access
Question # 106

Which of the following should be considered FIRST when assessing the implications of new external regulations on IT compliance?

A.

IT policies and procedures that need revision

B.

Resource burden for implementation

C.

Gaps in skills and experience of IT employees

D.

Impact on contracts with service providers

Full Access
Question # 107

Which of the following is MOST likely to have a negative impact on

accountability for information risk ownership?

A.

The risk owner is a department manager, and the control owner is a member of the risk owner's staff.

B.

Information risk is assigned to a department, and an individual owner has not been assigned.

C.

The risk owner and the control owner of the information do not work in the same department.

D.

The same person is listed as both the control owner and the risk owner for the information.

Full Access
Question # 108

An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?

A.

Ensure IT has knowledgeable representation and is included in the strategic planning process.

B.

Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.

C.

Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).

D.

Outsource both IT operations and IT development and implement controls based on a standardized framework.

Full Access
Question # 109

Which of the following would be MOST helpful to review when determining how to allocate IT resources during a resource shortage?

A.

IT skill development plan

B.

IT organizational structure

C.

IT skills inventory

D.

IT strategic plan

Full Access
Question # 110

When an enterprise is evaluating potential IT service vendors, which of the following BEST enables a clear understanding of the vendor's capabilities that will be critical to the enterprise's strategy?

  • Due diligence process

A.

Independent audit results

B.

Historical service level agreements (SLAs)

C.

Benchmarking analysis results

Full Access
Question # 111

An enterprise's IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

A.

business to help define IT goals.

B.

business to fund IT services.

C.

IT to define business objectives.

D.

IT and business to define risks.

Full Access
Question # 112

When selecting a cloud provider, which of the following provides the MOST comprehensive information regarding the current status and effectiveness of the provider's controls?

A.

Globally recognized certification

B.

Third-party audit report

C.

Control self-assessment (CSA)

D.

Maturity assessment

Full Access
Question # 113

Which of the following BEST enables an enterprise to achieve the benefits of implementing new Internet of Things (loT) technology?

A.

IT project charter

B.

Change management

C.

Emerging technology roadmap

D.

Enterprise architecture (EA)

Full Access
Question # 114

Which of the following is the BEST critical success factor (CSF) to use when changing an IT value management program in an enterprise?

A.

Documenting the process for the board of directors' approval

B.

Adopting the program by using an incremental approach

C.

Implementing the program through the enterprise's change plan

D.

Aligning the program to the business requirements

Full Access
Question # 115

A high-tech enterprise is concerned that leading competitors have been successfully recruiting top talent from the enterprise's research and development business unit.

What should the leadership team mandate FIRST?

A.

A SWOT analysis

B.

An incentive and retention program

C.

A root cause analysis

D.

An aggressive talent acquisition program

Full Access
Question # 116

Which of the following characteristics would BEST indicate that an IT process is a good candidate for outsourcing?

A.

Strategic processes that require expert professionals

B.

Processes with higher risk to the enterprise

C.

Non-strategic processes that are not documented

D.

Operational processes that are well-defined

Full Access
Question # 117

Which of the following would BEST help to ensure the appropriate allocation of IT resources to support an enterprise's mission?

A.

Develop a resource strategy as part of program management.

B.

Prioritize program requirements based on existing resources.

C.

Implement resource planning for each IT project.

D.

Manage resources as part of the portfolio strategy.

Full Access
Question # 118

When a shortfall of IT resources is identified, the FIRST course of action is to;

A.

perform a business impact analysis (BIA).

B.

reallocate the budget to close the gap in resources.

C.

reduce business requirements.

D.

negotiate best pricing for contracted resources.

Full Access
Question # 119

An enterprise has made the strategic decision to begin a global expansion program which will require opening sales offices in countries across the world. Which of the following should be the FIRST consideration with regard to the IT service desk which will remain centralized?

  • The effect of regional differences On service delivery

  • Identification of IT service desk functions that can be outsourced

A.

Enforcement Of a standardized policy across all regions

B.

Availability of adequate resources to provide support for new users

Full Access
Question # 120

Which of the following is MOST important for a data steward to verify when a system's data is edited by an automated tool to fix an incident?

A.

The change has been requested by the business department and approved by the data owner.

B.

The change is documented in preparation for future audits.

C.

The change maintains consistency among databases and has no other impacts.

D.

The change is a temporary fix for the incident, and the permanent solution is addressed by problem management.

Full Access
Question # 121

Which of the following is the BEST way to encourage employees to raise ethics concerns in full confidence?

A.

Publish and enforce a code of conduct policy.

B.

Provide access to legal resource benefits.

C.

Establish and communicate a whistle-blower policy.

D.

Provide protection language in employment contracts.

Full Access
Question # 122

A CIO has recently been made aware of a new regulatory requirement that may affect IT-enabled business activities. Which of the following should be the CIO s FIRST step in deciding the appropriate response to the new requirement?

A.

Revise initiatives that are active to reflect the new requirements.

B.

Confirm there are adequate resources to mitigate compliance requirements.

C.

Consult with legal and risk experts to understand the requirements.

D.

Consult with the board for guidance on the new requirements

Full Access
Question # 123

An enterprise is concerned that ongoing maintenance costs are not being considered when prioritizing IT-enabled business investments. Which of the following should be the enterprise's FIRST course of action?

A.

Implement a balanced scorecard for the IT project portfolio.

B.

Establish a portfolio manager role to monitor and control the IT projects.

C.

Require business cases to have product life cycle information.

D.

Mandate an enterprise architecture (EA) review with business stakeholders.

Full Access
Question # 124

Which of the following would be an IT steering committee's BEST course of action upon learning business units have been independently procuring cloud services?

A.

Require cancellation of cloud-based application services not vetted by IT leadership.

B.

Include business unit leadership in the enterprise architecture (EA) review board.

C.

Limit cloud-based application service usage to open source solutions.

D.

Define a procurement strategy based on business unit needs.

Full Access
Question # 125

When establishing a methodology for business cases, it would be MOST beneficial for an enterprise to include procedures for:

A.

updating the business case throughout its life cycle.

B.

addressing required changes outside the business case.

C.

identifying metrics post-implementation to measure project success.

D.

entering the business case into the enterprise architecture (EA).

Full Access
Question # 126

A CEO realizes the need to implement IT governance to support the strategic alignment of business and IT goals. Which of the following would BEST enable this initiative?

A.

A RACI chart

B.

An increased IT budget

C.

Well-trained IT staff

D.

Effective culture change

Full Access
Question # 127

An enterprise has decided to use third-party software for a business process which is hosted and supported by the same third party. The BEST way to provide quality of service oversight would be to establish a process:

A.

for robust change management.

B.

for periodic service provider audits.

C.

for enterprise architecture (EA) updates.

D.

to qualify service providers.

Full Access
Question # 128

A CIO was notified that a new employee was observed wearing a headset with an optical lens at the organization's data center. The individual was entering voice commands into the device. When approached, the employee explained the device is a new personal technology serving as a hands-free version of a smart phone. The CIO is concerned with potential security vulnerabilities of allowing such devices, and whether they should be banned from the facility. What should be the NEXT course of action in response to the ClO's concern?

A.

Define a risk mitigation strategy.

B.

Update the acceptable use policy.

C.

Research competitor usage of similar devices.

D.

Assess the risk associated with the device.

Full Access
Question # 129

Which of the following is the BEST way to address the risk associated with new IT investments?

A.

Develop security best practices to protect applications.

B.

Integrate security requirements at the beginning of projects

C.

Establish an enterprise-wide incident response process.

D.

Implement an enterprise-wide security awareness program.

Full Access
Question # 130

Which strategic planning approach would be MOST appropriate for a large enterprise to follow when revamping its IT services?

A.

Addressing gaps within the management of IT-related risk

B.

Focusing on business innovation through knowledge, expertise, and initiatives

C.

Calibrating and scaling delivery Of IT services in line with business requirements

D.

Adhering to on-time and on-budget IT service delivery

Full Access
Question # 131

When conducting a risk assessment in support of a new regulatory

requirement, the IT risk committee should FIRST consider the:

A.

cost burden to achieve compliance.

B.

readiness of IT systems to address the risk.

C.

risk profile of the enterprise.

D.

disruption to normal business operations.

Full Access
Question # 132

An enterprise recently implemented a significant change in its business strategy by moving to a technologically advanced product with considerable impact on the business. What should be the FINAL step in completing the changes to IT processes?

A.

Updating the configuration management database (CMDB)

B.

Empowering the business to embrace the changes

C.

Ensuring a return to stabilized business operations

D.

Updating the enterprise architecture (EA)

Full Access
Question # 133

Which of the following BEST supports an IT strategy committee’s objective to align employee competencies with planned initiatives?

A.

Set management goals to hire cooperative work experience students.

B.

Specify minimum training hours required for continuing professional education.

C.

Require balanced scorecard concepts training of all employees.

D.

Add achievement of competencies to employee performance goals.

Full Access
Question # 134

Which of the following is the BEST way for a CIO to assess the consistency of IT processes against industry benchmarks to determine where to focus improvement initiatives?

A.

Utilizing a capability maturity model

B.

Evaluating the current balanced scorecard

C.

Reviewing key performance measures

D.

Reviewing IT process audit results

Full Access
Question # 135

Of the following, who is responsible for the achievement of IT strategic objectives?

A.

IT steering committee

B.

Business process owners

C.

Chief information officer (CIO)

D.

Board of directors

Full Access
Question # 136

Which of the following should be the FIRST action taken by a newly formed IT governance committee to ensure reports are compliant with regulations and identify key IT risks?

A.

Direct the development of a reporting communication plan.

B.

Develop and monitor IT key risk indicator (KRI) triggers.

C.

Train end users on regulation requirements.

D.

Implement a mechanism to ensure reporting escalation.

Full Access
Question # 137

Which of the following roles should be responsible for data normalization when it is found that a new system includes duplicates of data items?

A.

Business system owner

B.

Data steward

C.

Database administrator (DBA)

D.

Application manager

Full Access
Question # 138

Which of the following is the BEST method to confirm whether a pilot project was successful?

A.

Determine whether the pilot aligns with the as-is enterprise architecture (EA).

B.

Evaluate whether the pilot project achieved planned schedule and cost.

C.

Assess the results of the pilot project against the expected performance outcomes.

D.

Review the metrics recorded in the IT balanced scorecard.

Full Access
Question # 139

An enterprise has committed to the implementation of a new IT governance model. The BEST way to begin this implementation is to:

A.

identify IT services that currently support the enterprise’s capability.

B.

define policies for data, applications, and organization of infrastructure.

C.

identify the role of IT in supporting the business.

D.

prioritize how much and where to invest in IT.

Full Access
Question # 140

A business unit is planning to replace an existing IT legacy solution with a hosted Software as a Service (SaaS) solution. However, business management is concerned that stored data will be at risk. Which of the following is the MOST effective way to reduce the risk associated with the SaaS solution?

A.

Research the technology and identify potential security threats.

B.

Include risk-related requirements in the SaaS contract.

C.

Create key risk indicators (KRls) for the SaaS solution.

D.

Redefine the risk appetite and risk tolerance.

Full Access
Question # 141

The use of an enterprise architecture (EA) framework BEST supports IT governance by providing:

A.

key information for IT service level management.

B.

reference models to align IT with business.

C.

IT standards for application development

D.

business information for IT capacity planning.

Full Access
Question # 142

Which of the following should a new CIO do FIRST to ensure information assets are effectively governed?

A.

Quantify the business value of information assets

B.

Perform an information gap analysis

C.

Review information classification procedures

D.

Evaluate information access methods

Full Access
Question # 143

Which of the following BEST supports enterprise decision making for IT resource allocation?

A.

IT-related regulatory requirements

B.

Enterprise IT strategy

C.

Enterprise IT risk assessment

D.

IT balanced scorecard

Full Access
Question # 144

When considering an IT change that would enable a potential new line of business, the FIRST strategic step for IT governance would be to ensure agreement among the stakeholders regarding:

A.

objectives to achieve goals.

B.

metrics to measure effectiveness

C.

a vision for the future state,

D.

a change response plan

Full Access
Question # 145

Following the rollout of an enterprise IT software solution that hosts sensitive data it was discovered that the application's role-based access control was not functioning as specified Which of the following is the BEST way to prevent reoccurrence in the future?

A.

Ensure supplier contracts include penalties if solutions do not meet functional requirements

B.

Ensure the evaluation process requires independent assessment of solutions prior to implementation

C.

Ensure supplier contracts include a provision for the right to audit on an annual basis

D.

Ensure procurement processes require the identification of alternate vendors to ensure business continuity.

Full Access
Question # 146

The PRIMARY objective of promoting business ethics within the IT enterprise should be to ensure:

A.

trust among internal and external stakeholders.

B.

employees act more responsibly.

C.

corporate social responsibility.

D.

legal and regulatory compliance.

Full Access
Question # 147

Which of the following should be the PRIMARY goal of implementing service level agreements (SLAs) with an outsourcing vendor?

A.

Gaining a competitive advantage

B.

Establishing penalties for not meeting service levels

C.

Achieving operational objectives

D.

Complying with regulatory requirements

Full Access
Question # 148

Which of the following would provide the MOST useful information to understand the associated risks when implementing a new digital transformation strategy?

A.

Risk policy

B.

Risk framework

C.

Risk heat map

D.

Risk register

Full Access
Question # 149

An IT value delivery framework PRIMARILY helps an enterprise

A.

increase transparency of value to the enterprise

B.

assist top management in approving IT projects

C.

improve value of successful IT projects

D.

optimize value to the enterprise.

Full Access
Question # 150

A financial services company has implemented the use of a cloud-based centralized customer relationship management (CRM) system. The company has decided to go multi-national. Which of the following should be the enterprise risk management (ERM) committee's PRIMARY consideration?

A.

Security issues

B.

Vendor capability

C.

Return on investment (ROI)

D.

Compliance issues

Full Access
Question # 151

An IT steering committee is preparing to review proposals for projects that implement emerging technologies. In anticipation of the review, the committee should FIRST:

A.

determine if the IT staff can support the emerging technologies.

B.

understand how the emerging technologies will influence risk across the enterprise.

C.

require a capacity plan and framework review for the emerging technologies,

D.

require a review of the enterprise risk management framework.

Full Access
Question # 152

The BEST way to decide how to prioritize issues identified in an IT risk and control self-assessment (CSA) is to understand the risk and:

A.

impact to the enterprise.

B.

criticality of IT services affected.

C.

number of IT systems affected.

D.

funds required for remediation.

Full Access
Question # 153

An enterprise is concerned with the potential for data leakage as a result of increased use of social media in the workplace, and wishes to establish a social media strategy. Which of the following should be the MOST important consideration in developing this strategy?

A.

Criticality of the information

B.

Ensuring that the enterprise architecture (EA) is updated

C.

Data ownership

D.

The balance between business benefits and risk

Full Access
Question # 154

Which of the following should be the FIRST step in updating an IT strategic plan?

A.

Revise the enterprise architecture (EA).

B.

Review IT performance objectives and indicators.

C.

Evaluate IT capabilities and resources.

D.

Identify changes in enterprise goals.

Full Access
Question # 155

An enterprise has launched a series of critical new IT initiatives that are expected to produce substantial value Which of the following would BEST provide the board with an indication of progress of the IT initiatives?

A.

Portfolio management review

B.

Full life cycle cost-benefit analysis

C.

Demonstration of prototype and user testing

D.

Critical risk and issue walk-through

Full Access
Question # 156

The IT department has determined that problems with a business report are due to quality issues within a set of data to whom should IT refer the matter for resolution?

A.

Internal audit

B.

Data architect

C.

Business analyst

D.

Data steward

Full Access
Question # 157

Which of the following would BEST help a CIO enhance the competencies of an IT business analytics team?

A.

Understanding current staff skill sets and identifying gaps

B.

Creating operational processes and identifying resources

C.

Defining the IT architecture and identifying training areas

D.

Establishing team goals and identifying the proper structure

Full Access
Question # 158

The PRIMARY reason a CIO and IT senior management should stay aware of the business environment is to:

A.

revisit prioritization of IT projects.

B.

adjust IT strategy as needed.

C.

measure efficiency of IT resources.

D.

re-assess the IT investment portfolio.

Full Access
Question # 159

An enterprise has decided to implement an IT risk management program After establishing stakeholder desired outcomes, the MAIN goal of the IT strategy committee should be to:

A.

identify business data that requires protection.

B.

perform a risk analysis on key IT processes

C.

implement controls to address high risk areas

D.

ensure IT risk alignment with enterprise risk

Full Access
Question # 160

Which of the following is the BEST outcome measure to determine the effectiveness of IT nsk management processes?

A.

Frequency of updates to the IT risk register

B.

Time lag between when IT risk is identified and the enterprise's response

C.

Number of events impacting business processes due to delays in responding to risks

D.

Percentage of business users satisfied with the quality of risk training

Full Access
Question # 161

A large enterprise has decided to use an emerging technology that needs to be integrated with the current IT infrastructure. Which of the following is the BEST way to prevent adverse effects to the enterprise resulting from the new technology?

A.

Develop key performance indicators (KPIs).

B.

Update the risk appetite statement

C.

Develop key risk indicators (KRIs).

D.

Implement service level agreements (SLAs)

Full Access
Question # 162

After shifting from lease to purchase of IT infrastructure and software licenses, an enterprise has to pay for unexpected lease extensions causing significant cost overruns. The BEST direction for the IT steering committee would be to establish;

A.

an end-of-life program to remove aging infrastructure from the environment.

B.

budget cuts to compensate for the cost overruns.

C.

a program to annually review financial policy on overruns.

D.

a policy to consider total cost of ownership (TCO) in investment decisions.

Full Access
Question # 163

An IT steering committee has received a report that supports the economic and service benefits of moving infrastructure hosting to an external cloud provider. Business leadership is very concerned about the security risk and potential loss of customer data. What is the BEST way for the committee to address these concerns?

A.

Mandate there will be no customer data at rest stored on cloud servers used by the vendor.

B.

Include compliance with the enterprise's data governance policy in the contract.

C.

Ensure reporting and penalty clauses are included in the contract for any loss of data.

D.

Require an encrypted connection between the cloud and enterprise servers.

Full Access
Question # 164

Which of the following should senior management do FIRST when developing and managing digital applications for a new enterprise?

A.

Establish an architecture review board.

B.

Define the risk appetite

C.

Develop key risk indicators (KRIs).

D.

Implement a sourcing program.

Full Access
Question # 165

Which of the following is MOST important for an enterprise to review when classifying information assets?

A.

Procedures for information handling

B.

Requirements for information retention.

C.

Media used for storage and backup

D.

Impact of information exposure

Full Access
Question # 166

Which of the following BEST enables an enterprise to determine how business expectations should be addressed in a governance program?

A.

Business impact analysis (BIA)

B.

Cost-benefit analysis

C.

Enterprise risk analysis

D.

Stakeholder analysis

Full Access
Question # 167

Which of the following should IT governance mandate before any transition of data from a legacy system to a new technology platform?

A.

Data conversion has documented approvals from business process data owners.

B.

Data conversion is performed in a test environment to confirm correctness

C.

Control totals of key transaction values are matched with data converted for migration.

D.

A crisis management plan has been approved by the IT steering committee

Full Access
Question # 168

An enterprise has performed a business impact analysis (BIA) considering a number of risk scenarios Which of the following should the enterprise do NEXT?

A.

Perform a risk controls gap analysis

B.

Update the disaster recovery plan (DRP)

C.

Verify compliance with relevant legislation

D.

Assess risk mitigation strategies

Full Access
Question # 169

Which of the following IT governance practices would BEST support IT and enterprise strategic alignment?

A.

An IT communication plan is continuously updated

B.

External consultants regularly review the IT portfolio

C.

Senior management regularly reviews the IT portfolio

D.

IT service level agreements (SLAs) are periodically updated

Full Access
Question # 170

In a large enterprise, which of the following should be responsible for the implementation of an IT balanced scorecard?

A.

Project management office

B.

Chief information officer (CIO)

C.

IT steering committee

D.

Chief risk officer (CRO)

Full Access
Question # 171

In a successful enterprise that is profitable in its marketplace and consistently growing in size, the non-IT workforce has grown by 50% in the last two years. The demand for IT staff in the marketplace is more than the supply, and the enterprise is losing staff to rival organizations. Due to the rapid growth. IT has struggled to keep up with the enterprise, and IT procedures and associated job roles are not well-defined. The MOST critical activity for reducing the impact caused by IT staff turnover is to:

A.

document processes and procedures.

B.

outsource the IT operation.

C.

increase compensation for IT staff

D.

hire temporary staff.

Full Access