New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Isaca CGEIT Certified in the Governance of Enterprise IT Exam Exam Practice Test

Demo: 171 questions
Total 578 questions

Certified in the Governance of Enterprise IT Exam Questions and Answers

Question 1

Which of the following BEST indicates the success of an enterprise's IT governance framework after implementation?

Options:

A.

A high percentage of business owners involved with the approval of the IT strategic plan

B.

A high percentage of IT systems complying with corporate information security standards

C.

A high percentage of IT projects delivered on time and on budget

D.

A high percentage of IT investments delivering expected benefits

Question 2

In an enterprise that has worldwide business units and a centralized financial control model, which of the following is a barrier to strategic alignment of business and IT?

Options:

A.

Each business unit has its own steering committee for IT investment and prioritization.

B.

Uniform portfolio management is in place throughout the business units.

C.

IT is the exclusive provider of IT services to the business units.

D.

The enterprise's CIO is a member of the executive committee.

Question 3

To enable IT to deliver adequate services and maintain availability of a web-facing infrastructure, an IT governance committee should FIRST establish:

Options:

A.

web operations procedures.

B.

business continuity plans (BCPs).

C.

key performance indicators (KPIs).

D.

customer survey processes.

Question 4

Which of the following is MOST important for an IT strategy committee to ensure before initiating the development of an IT strategic plan?

Options:

A.

Committee members are apprised of business needs

B.

A risk assessment has been conducted.

C.

Committee members are independent from business units.

D.

IT initiatives are fully supported by the business.

Question 5

A software company's products have had significant quality issues in recent releases. As a result, market reputation and customer satisfaction ratings have been suffering. What should executive leadership do FIRST to address this concern?

Options:

A.

Allocate budget to hire more software and quality assurance specialists

B.

Implement a software development life cycle (SDLC) framework.

C.

Mandate more robust software testing prior to release.

D.

Require a root cause analysis and review results.

Question 6

Which of the following is the MOST significant challenge faced by an enterprise when establishing information stewardship?

Options:

A.

Lack of documented policies and procedures

B.

Information requirements of regulatory authorities

C.

Insufficient knowledge of IT practices and controls

D.

Lack of role clarity and specific responsibilities

Question 7

Which of the following provides the MOST comprehensive insight into the effectiveness of IT?

Options:

A.

IT balanced scorecard

B.

IT strategy

C.

Return on investment (ROI)

D.

Key risk indicators (KRIs)

Question 8

Facing financial struggles, a CEO mandated severe budget cuts. A decision was also made to immediately change the enterprise strategic focus to put more reliance on mobile, cloud, and wireless services in an effort to boost revenue. The IT steering committee has asked the CIO to suggest adjustments to the current IT project portfolio to allow support for the new direction despite fewer funds. What should the CIO advise the committee to do FIRST?

Options:

A.

Ask business stakeholders to discuss their vision for the new strategy.

B.

Cancel projects with a net present value (NPV) below a defined threshold.

C.

Conduct a risk assessment against the potential new services.

D.

Start re-allocating budget to projects involving mobile or cloud.

Question 9

Which of the following metrics would provide senior management with the BEST indication of the success of IT investments?

Options:

A.

Number of IT investments tracked in the balanced scorecard

B.

Percentage of IT investments recorded in the enterprise architecture (EA)

C.

Number of IT investments impacted by business-related incidents

D.

Percentage of IT investments that meet expected benefits

Question 10

Individual business units within an enterprise have been designing their own IT solutions without consulting the IT department. From a governance perspective, what is the GREATEST issue associated with this situation?

Options:

A.

Security controls may not meet IT requirements.

B.

The enterprise does not have the skills to manage the solutions.

C.

The solutions conflict with IT goals and objectives.

D.

The solution may conflict with existing enterprise goals.

Question 11

An enterprise is conducting a SWOT analysis as part of IT strategy development. Which of the following would be MOST helpful to identify opportunities and threats?

Options:

A.

Risk appetite

B.

Internal framework assessment

C.

Competitor analysis

D.

Critical success factors (CSF)

Question 12

After shifting from lease to purchase of IT infrastructure and software licenses, an enterprise has to pay for unexpected lease extensions causing significant cost overruns. The BEST direction for the IT steering committee would be to establish;

Options:

A.

an end-of-life program to remove aging infrastructure from the environment.

B.

budget cuts to compensate for the cost overruns.

C.

a program to annually review financial policy on overruns.

D.

a policy to consider total cost of ownership (TCO) in investment decisions.

Question 13

An enterprise is planning to outsource data processing for personally identifiable information (Pll). When is the MOST appropriate time to define the requirements for security and privacy of information?

Options:

A.

When issuing requests for proposals (RFPs)

B.

After an assessment of the current information architecture.

C.

When developing service level agreements (SLAs)

D.

During the initial vendor selection process

Question 14

An assessment reveals that enterprise risk management (ERM) practices are being applied inconsistently by IT staff. Which of the following would be the MOST effective corrective action?

Options:

A.

Require ERM orientation sessions

B.

Request the development of an IT risk register template.

C.

Request a complete skills reassessment for all IT staff.

D.

Update the ERM framework.

Question 15

Which of the following should occur FIRST in the IT investment process?

Options:

A.

Assess each project's impact on the enterprise's investment plan.

B.

Select IT projects that will best support the enterprise's mission.

C.

Analyze IT investments based on past data.

D.

Analyze the risks and benefits of the investment for each IT project.

Question 16

Which of the following is the MOST important reason to include internal audit as a stakeholder when establishing clear roles for the governance of IT?

Options:

A.

Internal audit has knowledge and technical expertise to advise on IT infrastructure.

B.

Internal audit is accountable for the overall enterprise governance of IT.

C.

Internal audit implements controls over IT risks and security.

D.

Internal audit provides input on relevant issues and control processes.

Question 17

What is the BEST way for an IT governance board to establish standards of behavior for the adoption of artificial intelligence (Al)?

Options:

A.

Direct the creation and approval of an ethical use policy.

B.

Review and update the data privacy policy to align with industry standards.

C.

Include specific ethics clauses in vendor agreements and contracts.

D.

Include ethics topics within onboarding and awareness training.

Question 18

Which of the following should IT governance mandate before any transition of data from a legacy system to a new technology platform?

Options:

A.

Data conversion has documented approvals from business process data owners.

B.

Data conversion is performed in a test environment to confirm correctness

C.

Control totals of key transaction values are matched with data converted for migration.

D.

A crisis management plan has been approved by the IT steering committee

Question 19

A project sponsor has circumvented the request for proposal (RFP) selection process. Which of the following is the MOST likely reason for this control gap?

Options:

A.

Inadequate stage-gate reviews

B.

Inadequate board oversight

C.

Lack of accountability for policy adherence

D.

Lack of a legal and regulatory review process

Question 20

An enterprise is developing an ethics program, and the ethical standards have been defined. Which of the following should the enterprise do NEXT?

Options:

A.

Establish a training and awareness program focused on ethics.

B.

Implement an enterprise-wide employee monitoring program.

C.

Develop key performance indicators (KPIs) for program implementation.

D.

Outline and document consequences for noncompliance.

Question 21

Following a re-prioritization of business objectives by management, which of the following should be performed FIRST to allocate resources to IT processes?

Options:

A.

Perform a maturity assessment.

B.

Implement a RACI model.

C.

Refine the human resource management plan.

D.

Update the IT strategy.

Question 22

Which of the following would be MOST useful for prioritizing IT improvement initiatives to achieve desired business outcomes?

Options:

A.

Budget variance analysis

B.

Enterprise architecture (EA)

C.

IT skills matrix

D.

Portfolio management

Question 23

Which of the following would be the BEST way to facilitate the successful adoption of a new technology across the enterprise?

Options:

A.

Ensure the use of a business case

B.

Review business goals.

C.

Establish an IT balanced scorecard.

D.

Highlight the risk the new technology will address.

Question 24

Which of the following is MOST important to include in IT governance reporting to the board of directors?

Options:

A.

Critical risks

B.

Technology cost savings

C.

Threat landscape

D.

Security events

Question 25

The board of directors of a large organization has directed IT senior management to improve IT governance within the organization. IT senior management's MOST important course of action should be to:

Options:

A.

understand the driver that led to a desire to change.

B.

assess the current slate of IT governance within the organization.

C.

review IT strategy and direction.

D.

analyze IT service levels and performance.

Question 26

A major data leakage incident at an enterprise has resulted in a mandate to strengthen and enforce current data governance practices. Which of the following should be done FIRST to achieve this objective?

Options:

A.

Assess data security controls.

B.

Review data logs.

C.

Analyze data quality.

D.

Verify data owners.

Question 27

When evaluating the process for acquiring third-party IT resources, management identified several suppliers with repeated downtime issues impacting the enterprise. Which of the following is the BEST approach to help ensure future service delivery in accordance with business objectives?

Options:

A.

Establish key performance indicators (KPls)

B.

Appoint a procurement oversight committee

C.

Establish key risk indicators (KRIs).

D.

Implement contract monitoring.

Question 28

An IT department has forwarded a request to the IT strategy committee for funding of a discretionary Investment. The committee's MOST important consideration should be to evaluate:

Options:

A.

the technical feasibility of the investment.

B.

the business and technical scope of the investment •

C.

whether the investment supports corporate goals

D.

whether the investment aligns with the enterprise architecture (EA).

Question 29

Which of the following is MOST important for IT governance to have in place to ensure the enterprise can maintain operations during extensive system downtime?

Options:

A.

Fault-tolerant hardware

B.

An incident response plan

C.

A crisis communications plan

D.

A business continuity plan (BCP)

Question 30

IT maturity models measure:

Options:

A.

performance.

B.

value.

C.

capabilities.

D.

outcome.

Question 31

Which of the following should be the PRIMARY governance objective for selecting key risk indicators (KRIs) related to legal and regulatory compliance?

Options:

A.

Identifying the risk of noncompliance

B.

Demonstrating sound risk management practices

C.

Measuring IT alignment with enterprise risk management (ERM)

D.

Ensuring the effectiveness of IT compliance controls

Question 32

Which of the following is the BEST method to confirm whether a pilot project was successful?

Options:

A.

Determine whether the pilot aligns with the as-is enterprise architecture (EA).

B.

Evaluate whether the pilot project achieved planned schedule and cost.

C.

Assess the results of the pilot project against the expected performance outcomes.

D.

Review the metrics recorded in the IT balanced scorecard.

Question 33

An enterprise's chief information officer (CIO) has been receiving complaints from business executives regarding the amount their units are being charged for IT services. To maintain a good relationship with business peers, the CIO wants to be responsive to these complaints. To address this issue, the FIRST step should be to:

Options:

A.

agree to reduce charge rates and improve relationship management with the business.

B.

look into outsourcing of support functions to drive down the cost structure.

C.

ask the chief financial officer (CFO) about budget revisions for the business units' IT expenditures.

D.

quantify consumption and service level agreement (SLA) achievements per business unit.

Question 34

When establishing an enterprise data model, the BEST way to ensure the integrity of data is to:

Options:

A.

classify information using an agreed-upon schema.

B.

implement the highest level of protection to data across the enterprise.

C.

establish a privileged access management platform.

D.

implement a data loss prevention (DLP) program.

Question 35

To minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations which of the following is the BEST action to take?

Options:

A.

Update the information architecture

B.

Revise the IT strategic plan

C.

Implement data loss prevention (DLP)

D.

Establish new IT key risk indicators (KRIs)

Question 36

An IT steering committee is concerned that enterprise technologies have grown stagnant and are outdated. Which of the following is the BEST strategy to invest in modern technology?

Options:

A.

Decrease spending on steady state and increase spending on modernization and enhancements.

B.

Redefine the target architecture to define new technologies that can be incorporated into the infrastructure.

C.

Create a new investment category for innovation that becomes a new way for tracking investment decisions.

D.

Update the IT human resource management plan to require training and development for emerging technologies.

Question 37

An enterprise-wide strategic plan has been approved by the board of directors. Which of the following would BEST support the planning of IT investments required for the enterprise?

Options:

A.

Service-oriented architecture

B.

Enterprise architecture (EA)

C.

Contingency planning

D.

Enterprise balanced scorecard

Question 38

Which of the following are the MOST important processes for information asset life cycle management?

Options:

A.

Procurement management and third-party management

B.

Configuration management and financial management

C.

Vulnerability management and network management

D.

Business continuity management and disaster recovery management

Question 39

An enterprise's decision to move to a virtualized architecture will have the GREATEST impact on:

Options:

A.

system life cycle management.

B.

asset classification.

C.

vendor management

D.

vulnerability management.

Question 40

A large bank has completed several acquisitions in the last few years that have resulted in redundant IT applications. To align with the strategic initiative of providing integrated services to customers, the IT steering committee has decided to share data and integrate applications. Which of the following would be MOST important to review in this situation?

Options:

A.

Enterprise architecture (EA)

B.

IT risk register

C.

Balanced scorecard measures

D.

IT strategic plan

Question 41

The CEO of an organization is concerned that there are inconsistencies in the way information assets are classified across the enterprise. Which of the following is be the BEST way for the CIO to address these concerns?

Options:

A.

Include data assets in the IT inventory.

B.

Identify data owners across the enterprise.

C.

Require enterprise risk assessments.

D.

Implement enterprise data governance.

Question 42

The BEST time to identity metrics to measure the performance of an IT-enabled investment is during:

Options:

A.

system implementation

B.

project initiation

C.

investment feasibility analysis

D.

business case development.

Question 43

Which of the following is the MOST important input for the development of a human resources strategy to address IT skill gaps?

Options:

A.

Training budget allocated for IT staff

B.

Training effectiveness reports

C.

Technology direction of the enterprise

D.

A recent IT skills matrix

Question 44

Which of the following is the MOST important input for designing a development program to help IT employees improve their ability to respond to business needs?

Options:

A.

Capability maturity model

B.

Cost-benefit analysis

C.

Skills competency assessment

D.

Annual performance evaluation

Question 45

An enterprise has performed a business impact analysis (BIA) considering a number of risk scenarios Which of the following should the enterprise do NEXT?

Options:

A.

Perform a risk controls gap analysis

B.

Update the disaster recovery plan (DRP)

C.

Verify compliance with relevant legislation

D.

Assess risk mitigation strategies

Question 46

Which of the following should be the PRIMARY basis for establishing categories within an information classification scheme?

Options:

A.

Information architecture

B.

Industry standards

C.

Information security policy

D.

Business impact

Question 47

The PRIMARY objective of building outcome measures is to:

Options:

A.

monitor whether the chosen strategy is successful

B.

visualize how the strategy will be achieved.

C.

demonstrate commitment to IT governance.

D.

clarify the cause-and-effect relationship of the strategy.

Question 48

An airline wants to launch a new program involving the use of artificial intelligence (Al) and machine learning the mam objective of the program is to use customer behavior to determine new routes and markets Which of the following should be done NEXT?

Options:

A.

Consult with the enterprise privacy function

B.

Define the critical success factors (CSFs)

C.

Present the proposal to the IT strategy committee

D.

Perform a business impact analysis (BIA)

Question 49

A large enterprise has decided to use an emerging technology that needs to be integrated with the current IT infrastructure. Which of the following is the BEST way to prevent adverse effects to the enterprise resulting from the new technology?

Options:

A.

Develop key performance indicators (KPIs).

B.

Update the risk appetite statement

C.

Develop key risk indicators (KRIs).

D.

Implement service level agreements (SLAs)

Question 50

Which of the following is the BEST way for an organization to minimize the difference between expected and delivered services when acquiring resources?

Options:

A.

Negotiate service level agreements (SLAs)

B.

Measure service delivery using industry benchmarks

C.

Require quarterly benefits realization reporting

D.

Include a right-to-audit clause in the contract.

Question 51

An enterprise has identified potential environmental disasters that could occur in the area where its data center is located. Which of the following should be done NEXT?

Options:

A.

Implement an early warning detection and notification system.

B.

Assess the likelihood and impact on the data center.

C.

Relocate the data center to minimize the threat.

D.

Assess how the data center is protected against the threat.

Question 52

In which of the following situations is it MOST appropriate to use a quantitative risk assessment?

Options:

A.

There is a lack of accurate and reliable past and present risk data.

B.

The risk assessment needs to be completed in a short period of time.

C.

The objectivity of the risk assessment is of primary importance.

D.

The risk assessment is needed for an IT project business case.

Question 53

What is the BEST criterion for prioritizing IT risk remediation when resource requirements are equal?

Options:

A.

Deviation from IT standards

B.

IT strategy alignment

C.

IT audit recommendations

D.

Impact on business

Question 54

IT senior management has just received a survey report indicating that more than one third of the organization's key IT staff plan to retire within the next 12 months. Which of the following is the MOST important governance action to prepare for this possibility?

Options:

A.

Engage human resources (HR) for recruitment of new staff.

B.

Request the development of a succession plan.

C.

Review motivation drivers for key IT staff.

D.

Evaluate lower-level staff as succession candidates.

Question 55

From an IT governance perspective, establishing performance measurements is PRIMARILY the responsibility of:

Options:

A.

the IT architecture review board.

B.

senior management.

C.

the board of directors.

D.

enterprise risk management (ERM).

Question 56

Of the following, who is PRIMARILY responsible for applying frameworks for the governance of IT to balance the need for security controls with business requirements?

Options:

A.

Data scientists

B.

Data stewards

C.

Data analysts

D.

Data processors

Question 57

A business unit is planning to replace an existing IT legacy solution with a hosted Software as a Service (SaaS) solution. However, business management is concerned that stored data will be at risk. Which of the following is the MOST effective way to reduce the risk associated with the SaaS solution?

Options:

A.

Research the technology and identify potential security threats.

B.

Include risk-related requirements in the SaaS contract.

C.

Create key risk indicators (KRls) for the SaaS solution.

D.

Redefine the risk appetite and risk tolerance.

Question 58

Which of the following has the GREATEST impact on the design of an IT governance framework?

Options:

A.

IT performance metrics

B.

Resource allocation

C.

Business leadership

D.

Business risk

Question 59

An IT governance committee realizes there are antiquated technologies in use throughout the enterprise. Which of the following is the BEST group to evaluate the recommendations to address these shortcomings?

Options:

A.

Enterprise architecture (EA) review board

B.

Business process improvement workgroup

C.

Audit committee

D.

Risk management committee

Question 60

Which of the following is the BEST approach to ensure global regulatory compliance when implementing a new business process?

Options:

A.

Use a balanced scorecard to track the business process.

B.

Ensure the appropriate involvement Of the legal department.

C.

Review and revise the business architecture.

D.

Seek approval from the change management board.

Question 61

An enterprise has a centralized IT function but also allows business units to have their own technology operations, resulting in duplicate technologies and conflicting priorities. Which of the following should be done FIRST to reduce the complexity of the IT landscape?

  • Promote automation tools used by the business units.

Options:

A.

Conduct strategic planning with business units.

B.

Migrate all in-house systems to an external cloud environment.

C.

Standardize technology architecture on common products.

Question 62

Which of the following would be the BEST way for an enterprise to address new legal and regulatory requirements applicable to IT?

Options:

A.

Treat as a risk to be assessed before developing a response.

B.

Benchmark how other IT organizations are treating the new requirements.

C.

Adopt a zero-tolerance approach for noncompliance with regulatory matters.

D.

Use a cost-benefit analysis to determine if compliance is warranted.

Question 63

Which of the following is the PRIMARY reason to monitor data classification efforts?

Options:

A.

To identify and minimize data security breaches

B.

To identify deviations in the data that are outside risk thresholds

C.

TO ensure alignment with data protection regulations

D.

To ensure assets are protected appropriately

Question 64

The BEST way for a CIO to manage the organizational impact of deploying a new enterprise-wide tool is to implement:

Options:

A.

change management.

B.

project management.

C.

risk management.

D.

resource management.

Question 65

To measure the value of IT-enabled investments, an enterprise needs to identify its drivers as defined by its:

Options:

A.

technology strategy.

B.

value statements.

C.

service level agreements (SLAs).

D.

business strategy.

Question 66

Which of the following is the BEST way for a CIO to ensure that IT-related training is taken seriously by the IT management team and direct employees?

Options:

A.

Develop training programs based on results of an IT staff survey of preferences.

B.

Embed training metrics into the annual performance appraisal process.

C.

Promote IT-specific training awareness program.

D.

Research and identify training needs based on industry trends.

Question 67

Which of the following is the BEST way for a CIO to ensure that the work of IT employees is aligned with approved IT directives?

Options:

A.

Mandate technical training related to the IT objectives.

B.

Have business leaders present their departments' objectives.

C.

Include relevant IT goals in individual performance objectives.

D.

Request a progress review of IT objectives by internal audit.

Question 68

When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?

Options:

A.

Standardization

B.

Replication

C.

Segregation

D.

Sanitization

Question 69

An IT team is having difficulty meeting new demands placed on the department as a result of a major and radical shift in enterprise business strategy. Which of the following is the ClO's BEST course of action to address this situation?

Options:

A.

Utilize third parties for non-value-added processes.

B.

Align the business strategy with the IT strategy.

C.

Review the current IT strategy.

D.

Review the IT risk appetite.

Question 70

Which of the following is MOST important for a data steward to verify when a system's data is edited by an automated tool to fix an incident?

Options:

A.

The change has been requested by the business department and approved by the data owner.

B.

The change is documented in preparation for future audits.

C.

The change maintains consistency among databases and has no other impacts.

D.

The change is a temporary fix for the incident, and the permanent solution is addressed by problem management.

Question 71

An enterprise is concerned that ongoing maintenance costs are not being considered when prioritizing IT-enabled business investments. Which of the following should be the enterprise's FIRST course of action?

Options:

A.

Implement a balanced scorecard for the IT project portfolio.

B.

Establish a portfolio manager role to monitor and control the IT projects.

C.

Require business cases to have product life cycle information.

D.

Mandate an enterprise architecture (EA) review with business stakeholders.

Question 72

A CIO was notified that a new employee was observed wearing a headset with an optical lens at the organization's data center. The individual was entering voice commands into the device. When approached, the employee explained the device is a new personal technology serving as a hands-free version of a smart phone. The CIO is concerned with potential security vulnerabilities of allowing such devices, and whether they should be banned from the facility. What should be the NEXT course of action in response to the ClO's concern?

Options:

A.

Define a risk mitigation strategy.

B.

Update the acceptable use policy.

C.

Research competitor usage of similar devices.

D.

Assess the risk associated with the device.

Question 73

An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:

Options:

A.

a common risk management taxonomy.

B.

a common risk organization.

C.

common key risk indicators (KRIs).

D.

common risk mitigation strategies.

Question 74

An enterprise has an ongoing issue of corporate applications not delivering the expected benefits due to missing key functionality. As a result, many groups are using spreadsheets and databases instead of approved enterprise applications to store and manipulate information. Which of the following will BEST improve the success rate of future IT initiatives?

Options:

A.

Engage the business user community in acceptance testing Of acquired applications.

B.

Engage stakeholders to identify and validate business requirements.

C.

Establish a process for risk and value management.

D.

Prohibit the use of non-approved alternate software solutions.

Question 75

Which of the following would be MOST helpful to review when determining how to allocate IT resources during a resource shortage?

Options:

A.

IT strategic plan

B.

IT skills inventory

C.

IT organizational structure

D.

IT skill development plan

Question 76

An enterprise has made the strategic decision to begin a global expansion program which will require opening sales offices in countries across the world. Which of the following should be the FIRST consideration with regard to the IT service desk which will remain centralized?

  • The effect of regional differences On service delivery

  • Identification of IT service desk functions that can be outsourced

Options:

A.

Enforcement Of a standardized policy across all regions

B.

Availability of adequate resources to provide support for new users

Question 77

Which of the following should be considered FIRST when assessing the implications of new external regulations on IT compliance?

Options:

A.

IT policies and procedures that need revision

B.

Resource burden for implementation

C.

Gaps in skills and experience of IT employees

D.

Impact on contracts with service providers

Question 78

To help ensure the IT portfolio provides maximum value to an organization, IT projects are BEST prioritized based on:

  • cost-benefit analysis results.

  • alignment with business strategy.

Options:

A.

recommendation Of business owners.

B.

alignment with IT architecture.

Question 79

An enterprise is exploring a new business opportunity. Which of the following is the BEST way to help ensure related IT projects deliver the business requirements?

Options:

A.

Hire a business consultant to manage the projects.

B.

Develop a policy to enforce the processes and procedures.

C.

Implement stage-gate reviews that require business sign-off.

D.

Focus on maturing processes and developing procedures.

Question 80

An enterprise learns that some of its business divisions have been approaching technology vendors for cloud services, resulting in duplicate support contracts and underutilization of IT services. Which of the following should be done FIRST to address this issue?

Options:

A.

Review the enterprise IT procurement policy.

B.

Re-negotiate contracts with vendors to request discounts.

C.

Require updates to the IT procurement process.

D.

Conduct an audit to investigate utilization of cloud services.

Question 81

Which of the following is the PRIMARY role of the CEO in IT governance?

Options:

A.

Establishing enterprise strategic goals

B.

Managing the risk governance process

C.

Evaluating return on investment (ROI)

D.

Nominating IT steering committee membership

Question 82

Which of the following is the BEST way to encourage employees to raise ethics concerns in full confidence?

Options:

A.

Publish and enforce a code of conduct policy.

B.

Provide access to legal resource benefits.

C.

Establish and communicate a whistle-blower policy.

D.

Provide protection language in employment contracts.

Question 83

Which of the following would BEST help to prevent an IT system from becoming obsolete before its planned return on investment (ROI)?

Options:

A.

Obtaining independent assurance that the IT system conforms to business requirements

B.

Defining IT and business goals to ensure value delivery as required

C.

Managing the benefit realization through the entire life cycle

D.

Ordering an external audit for the IT system early in the roll out

Question 84

A high-tech enterprise is concerned that leading competitors have been successfully recruiting top talent from the enterprise's research and development business unit.

What should the leadership team mandate FIRST?

Options:

A.

A SWOT analysis

B.

An incentive and retention program

C.

A root cause analysis

D.

An aggressive talent acquisition program

Question 85

Which of the following is the MOST important consideration regarding IT measures as part of an IT strategic plan?

Options:

A.

Data collection for the metrics is automated.

B.

The metrics can be traced to enterprise goals.

C.

Minimum target levels are realistic.

D.

Thresholds align to key risk indicators (KRIs).

Question 86

Which of the following is necessary for effective risk management in IT governance?

Options:

A.

Risk evaluation is embedded in the management processes.

B.

IT risk management is separate from enterprise risk management (ERM).

C.

Local managers are solely responsible for risk evaluation.

D.

Risk management strategy is approved by the audit committee.

Question 87

What is the PRIMARY benefit of aligning information architecture with enterprise architecture (EA)?

Options:

A.

It improves communication with senior management and the business.

B.

It ensures the adoption of enterprise data quality standards.

C.

It enables the tracing of data to business functions.

D.

It facilitates appropriate access to data consumers.

Question 88

Which of the following is the BEST critical success factor (CSF) to use when changing an IT value management program in an enterprise?

Options:

A.

Documenting the process for the board of directors' approval

B.

Adopting the program by using an incremental approach

C.

Implementing the program through the enterprise's change plan

D.

Aligning the program to the business requirements

Question 89

ACIO determines IT investment management processes are not fully realizing the benefits identified in business cases. Which of the following would be the BEST way to prevent this issue?

Options:

A.

Establish a requirement for ClO review and approval of each business case.

B.

Evaluate the delegation of investment approval authorities.

C.

Perform stage-gate reviews throughout the life cycle of each project.

D.

Document lessons learned throughout the investment life cycle.

Question 90

A CIO is planning to implement an enterprise resource planning (ERP) system at the request of the business. Of the following, who is accountable for providing sponsorship for the IT-enabled change across the enterprise?

Options:

A.

CEO

B.

Human resource (HR) director

C.

IT strategy committee

D.

CIO

Question 91

An enterprise's IT department has been operating independently without regard to business concerns, leading to misalignment between business and IT. The BEST way to establish alignment would be to require:

Options:

A.

business to help define IT goals.

B.

business to fund IT services.

C.

IT to define business objectives.

D.

IT and business to define risks.

Question 92

Which of the following is MOST likely to have a negative impact on

accountability for information risk ownership?

Options:

A.

The risk owner is a department manager, and the control owner is a member of the risk owner's staff.

B.

Information risk is assigned to a department, and an individual owner has not been assigned.

C.

The risk owner and the control owner of the information do not work in the same department.

D.

The same person is listed as both the control owner and the risk owner for the information.

Question 93

Which of the following is the BEST way to address the risk associated with new IT investments?

Options:

A.

Develop security best practices to protect applications.

B.

Integrate security requirements at the beginning of projects

C.

Establish an enterprise-wide incident response process.

D.

Implement an enterprise-wide security awareness program.

Question 94

An enterprise recently approved a bring your own device (BYOD) policy. The IT steering committee has directed IT management to develop a communication plan to disseminate information regarding the associated technical risks. Which of the following is MOST important to include in this communication plan?

Options:

A.

A link on the corporate intranet to the BYOD policy

B.

Potential exposures and impacts using common terms

C.

Schedule and content for mandatory training

D.

Disciplinary actions for violation of the BYOD policy

Question 95

An enterprise has launched a critical new IT initiative that is expected to produce substantial value. Which of the following would BEST facilitate the reporting of benefits realized by the IT investment to the board?

Options:

A.

Balanced scorecard

B.

Milestone chart

C.

Performance management

D.

Critical risk and issue walk through

Question 96

An internal auditor conducts an assessment of a two-year-old IT risk management program. Which of the following findings should be of MOST concern to the CIO?

Options:

A.

Organizational responsibility for IT risk management is not clearly defined.

B.

None of the members of the IT risk management team have risk management-related certifications.

C.

Only a few key risk indicators (KRIs) identified by the IT risk management team are being monitored and the rest will be on a phased schedule.

D.

IT risk training records are not properly retained in accordance with established schedules

Question 97

Which of the following is a CIO's BEST approach to ensure IT executes against an approved strategy?

Options:

A.

Ask project management to define the IT activities for accomplishing the strategy.

B.

Request IT senior leaders to collectively plan tactics for execution

C.

Have IT leaders independently develop goals for their teams.

D.

Provide specific direction for execution of the tasks across IT.

Question 98

An organization requires updates to their IT infrastructure to meet business needs. Which of the following will provide the MOST useful information when planning for the necessary IT investments?

Options:

A.

Enterprise architecture (EA)

B.

Risk assessment report

C.

Business user satisfaction metrics

D.

Audit findings

Question 99

A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:

  • confirm process owners' acceptance of residual risk.

  • perform an internal and external network penetration test.

  • obtain IT security approval on security policy exceptions.

Options:

A.

benchmark policy against industry best practice.

Question 100

What is the BEST way for IT to achieve compliance with regulatory requirements?

Options:

A.

Enforce IT policies and procedures.

B.

Create an IT project portfolio.

C.

Review an IT performance dashboard.

D.

Report on IT audit findings and action plans.

Question 101

Which of the following is the BEST indicator of the effectiveness of IT governance in an enterprise?

Options:

A.

Value delivery

B.

Resource utilization

C.

Residual risk

D.

Project delivery

Question 102

When conducting a risk assessment in support of a new regulatory

requirement, the IT risk committee should FIRST consider the:

Options:

A.

cost burden to achieve compliance.

B.

readiness of IT systems to address the risk.

C.

risk profile of the enterprise.

D.

disruption to normal business operations.

Question 103

Which of the following will BEST enable an enterprise to convey IT governance direction and objectives?

Options:

A.

Skills and competencies

B.

Principles and policies

C.

Corporate culture

D.

Business processes

Question 104

An interna! health organization has been notified that a data breach has resulted in patient records being published online. Which of the

following is MOST important consideration when determining the process for meeting the organization's legal and regulatory obligations?

Options:

A.

Organizational structure, including accountable partes

B.

Data classification and related security policy

C.

Context of the breach, including data ownership and location

D.

Details of how the breach occurred and related incident response efforts

Question 105

Which of the following is the BEST way for a CIO to assess the consistency of IT processes against industry benchmarks to determine where to focus improvement initiatives?

Options:

A.

Utilizing a capability maturity model

B.

Evaluating the current balanced scorecard

C.

Reviewing key performance measures

D.

Reviewing IT process audit results

Question 106

Which of the following BEST supports an IT staff restructure as part of an annual IT strategy review with senior management?

Options:

A.

Established IT key performance indicators (KPIs)

B.

IT staff training program requirements

C.

External IT staffing benchmarks

D.

An updated business case for IT resourcing

Question 107

Which of the following would be MOST useful in developing IT strategic plans aligned with technological needs?

Options:

A.

Business impact analysis (BIA)

B.

Business case

C.

Enterprise architecture (EA)

D.

Benchmark analysis

Question 108

After experiencing poor recovery times following a catastrophic event, an enterprise is seeking to improve its disaster recovery capabilities. Which of the following would BEST enable the enterprise to accomplish this objective?

Options:

A.

Continuous testing of disaster recovery capabilities with implementation of lessons learned

B.

Increased training and monitoring for disaster recovery personnel who perform below expectations

C.

Annual review and updates to the disaster recovery plan (DRP)

D.

Increased outsourcing of disaster recovery capabilities to ensure reliability

Question 109

When a shortfall of IT resources is identified, the FIRST course of action is to;

Options:

A.

perform a business impact analysis (BIA).

B.

reallocate the budget to close the gap in resources.

C.

reduce business requirements.

D.

negotiate best pricing for contracted resources.

Question 110

An enterprise is implementing its first mobile sales channel. Final approval for accepting the associated IT risk should be obtained from which of the following?

  • Risk manager
  • Business sponsor

Options:

A.

Chief information officer (CIO)

B.

IT steering committee

Question 111

The GREATEST benefit associated with a decision to implement performance metrics for key IT assets is the ability to:

Options:

A.

establish the span of control during the life cycle of IT assets.

B.

determine the average cost of controls for protection of IT assets.

C.

compare the performance Of IT assets against industry best practices.

D.

determine the contribution of IT assets in achievement of IT goals.

Question 112

Following a re-prioritization of business objectives by management, which of the following should be performed FIRST to allocate resources to IT processes?

Options:

A.

Refine the human resource management plan.

B.

Update the IT strategy.

C.

Implement a RACI model.

D.

Perform a maturity assessment.

Question 113

An enterprise's board of directors is developing a strategy change. Although the strategy is not finalized, the board recognizes the need for IT to be responsive. Which of the following is the FIRST step to prepare for this change?

Options:

A.

Ensure IT has knowledgeable representation and is included in the strategic planning process.

B.

Increase the IT budget and approve an IT staff level increase to ensure resource availability for the strategy change.

C.

Initiate an IT service awareness campaign to business system owners and implement service level agreements (SLAs).

D.

Outsource both IT operations and IT development and implement controls based on a standardized framework.

Question 114

Which of the following is the GREATEST expected strategic organizational benefit from the standardization of technical platforms?

Options:

A.

Reduces IT operational training costs

B.

Reduces response time

C.

Optimizes infrastructure investments

D.

Meets regulatory compliance requirements

Question 115

An enterprise plans to expand into new markets in countries lacking data privacy regulations, increasing risk exposure. Which of the following is the BEST course of action for the CIO?

Options:

A.

Identify business risk appetite and tolerance levels.

B.

Quantify the risk impact and evaluate possible countermeasures.

C.

Limit the personal data available to the high-risk countries.

D.

Mandate the strengthening of user access controls.

Question 116

Which of the following is the MOST important attribute of an information steward?

Options:

A.

The information steward manages the systems that process the relevant data.

B.

The information steward has expertise in managing data quality systems.

C.

The information steward is closely aligned with the business function.

D.

The information steward is part of the information architecture group.

Question 117

A strategic IT-enabled investment is failing due to unforeseen technology problems. What should be the board of directors' FIRST course of action?

Options:

A.

Terminate the investment.

B.

Assess the business risk and options.

C.

Approve an investment budget increase.

D.

Revise the investment selection process.

Question 118

The results of an internal audit show that the business and IT acquire resources differently, which causes duplicate purchases. Which of the following is the BEST way to address this issue?

Options:

A.

Align IT objectives to the business procurement process.

B.

Involve business in IT procurement decisions.

C.

Establish a centralized procurement approval process.

D.

Define roles and responsibilities through a RAG chart

Question 119

Which of the following MUST be established before implementing an information architecture that restricts access to data based on sensitivity?

Options:

A.

Risk and control frameworks

B.

Probability and impact analysis

C.

Classification and ownership

D.

Security and privacy policies

Question 120

The MOST important aspect of an IT governance framework to ensure that IT supports repeatable business processes is:

Options:

A.

earned value management.

B.

quality management,

C.

resource management.

D.

risk management

Question 121

A large retail chain realizes that while there has not been any loss of data, IT security has not been a priority and should become a key goal for the enterprise. What should be the FIRST high-level initiative for a newly created IT strategy committee in order to support this business goal?

Options:

A.

Identifying gaps in information asset protection

B.

Defining data archiving and retrieval policies

C.

Recruiting and training qualified IT security staff

D.

Modernizing internal IT security practices

Question 122

Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?

Options:

A.

Poor desktop service delivery

B.

Data retention

C.

Redundant systems

D.

Poor business decisions

Question 123

The use of an IT balanced scorecard enables the realization of business value of IT through:

Options:

A.

business value and control mechanisms.

B.

outcome measures and performance drivers.

C.

financial measures and investment management.

D.

vision and alignment with corporate programs.

Question 124

An enterprise's internal audit group has scheduled a control review of a payroll system project but has been told to wait until the system is implemented. Which of the following is the GREATEST risk associated with the delay?

Options:

A.

delay in the development of new key performance indicators (KPIs)

B.

Continued dependency on compliant legacy systems

C.

Increased cost to mitigate deficiencies

D.

Lack of adherence to industry best practices

Question 125

An enterprise has a large backlog of IT projects. The current strategy is to execute projects as they are submitted, but executive management does not believe this method is optimal. Which of the following is the MOST important action to address this concern?

Options:

A.

Implement stage-gating to determine the value of each project.

B.

Establish a performance dashboard that determines business value.

C.

Implement a methodology to prioritize projects based on resource availability.

D.

Create a combined business/IT committee to determine project prioritization.

Question 126

Which of the following is the BEST course of action to enable effective resource management?

Options:

A.

Conduct an enterprise risk assessment.

B.

Implement a cross-training program.

C.

Assign resources based on business priorities.

D.

Assign resources based on risk appetite.

Question 127

What is the PRIMARY objective for performing an IT due diligence review prior to the acquisition of a competitor?

Options:

A.

Document the competitor's governance structure.

B.

Ensure that the competitor understands significant IT risks.

C.

Assess the status of the risk profile of the competitor.

D.

Determine whether the competitor is using industry-accepted practices.

Question 128

An IT director has become aware that a certain subset of data collected lawfully can be used to generate additional revenue. However, this particular use of the data is outside the original intention. What is the PRIMARY reason this situation should be escalated to the IT steering committee?

Options:

A.

Potential legal penalties

B.

Ethical concerns

C.

Regulatory requirements

D.

Data protection

Question 129

Which of the following roles has PRIMARY accountability for the security related to data assets?

Options:

A.

Database administrator

B.

Data owner

C.

Data analyst

D.

Security architect

Question 130

Which of the following aspects of the transition from X-rays to digital images would be BEST addressed by implementing information security policy and procedures?

Options:

A.

Establishing data retention procedures

B.

Training technicians on acceptable use policy

C.

Minimizing the impact of hospital operation disruptions on patient care

D.

Protecting personal health information

Question 131

Which of the following would provide the BEST input for prioritizing strategic IT improvement initiatives?

Options:

A.

Business dependency assessment

B.

Business process analysis

C.

Business case evaluation

D.

Business impact analysis (BIA)

Question 132

A new CIO has been charged with updating the IT governance structure. Which of the following is the MOST important consideration to effectively influence organizational and process change?

Options:

A.

Obtaining guidance from consultants

B.

Aligning IT services to business processes

C.

Redefining the IT risk appetite

D.

Ensuring the commitment of stakeholders

Question 133

An IT risk assessment for a large healthcare group revealed an increased risk of unauthorized disclosure of information. Which of the following should be established FIRST to address the risk?

Options:

A.

Data encryption tools

B.

Data loss prevention tools

C.

Data classification policy

D.

Data retention policy

Question 134

An enterprise decides to accept the IT risk of a subsidiary located in another country even though it exceeds the enterprise's risk appetite. Which of the following would be the BEST justification for this decision?

Options:

A.

Risk framework alignment

B.

Local market common practices

C.

Compliance with local regulations

D.

Technical gaps among subsidiaries

Question 135

A global financial enterprise has been experiencing a substantial number of information security incidents that have directly affected its business reputation. Which of the following should be the IT governance board's FIRST course of action?

Options:

A.

Require revisions to how security incidents are managed by the IT department.

B.

Request an IT security assessment to identify the main security gaps.

C.

Execute an IT maturity assessment of the security process.

D.

Mandate an update to the enterprise's IT security policy.

Question 136

Which of the following is MOST important to effectively initiate IT-enabled change?

Options:

A.

Establish a change management process.

B.

Obtain top management support and ownership.

C.

Ensure compliance with corporate policy.

D.

Benchmark against best practices.

Question 137

An enterprise has decided to utilize a cloud vendor for the first time to provide email as a service, eliminating in-house email capabilities. Which of the following IT strategic actions should be triggered by this decision?

Options:

A.

Develop a data protection awareness education training program.

B.

Monitor outgoing email traffic for malware.

C.

Implement a data classification and storage management tool.

D.

Update and communicate data storage and transmission policies.

Question 138

Risk management strategies are PRIMARILY adopted to:

Options:

A.

avoid risks for business and IT assets.

B.

take necessary precautions for claims and losses.

C.

achieve acceptable residual risk levels.

D.

achieve compliance with legal requirements.

Question 139

Which of the following is the BEST method to monitor IT governance effectiveness?

Options:

A.

Service level management

B.

Balanced scorecard

C.

Risk control self-assessment (CSA)

D.

SWOT analysis

Question 140

The MOST successful IT performance metrics are those that:

Options:

A.

measure financial results.

B.

measure all areas.

C.

are approved by the stakeholders.

D.

contain objective measures.

Question 141

An enterprise can BEST assess the benefits of a new IT project through its life cycle by:

Options:

A.

calculation of the total cost of ownership.

B.

periodic review of the business case.

C.

periodic measurement of the project slip rate.

D.

calculation of the net present value (NPV).

Question 142

An enterprise is evaluating a Software as a Service (SaaS) solution to support a core business process. There is no outsourcing governance or vendor management in place. What should be the CEO's FIRST course of action?

Options:

A.

Ensure the roles and responsibilities to manage service providers are defined.

B.

Establish a contract with the SaaS solution provider.

C.

Instruct management to use the standard procurement process.

D.

Ensure the service level agreements (SLAs) for service providers are defined.

Question 143

Which of the following is the BEST approach when reviewing The security status of a new business acquisition?

Options:

A.

Embed IT risk management strategies in service level agreements (SLAs).

B.

Establish a committee to oversee the alignment of IT security in new businesses.

C.

Incorporate IT security objectives to cover additional risks associated with new businesses.

D.

Integrate IT risk assessment into the overall due diligence process.

Question 144

A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?

Options:

A.

Mitigate and track data-related issues and risks.

B.

Modify legal and regulatory data requirements.

C.

Define data protection and privacy practices.

D.

Assess the information governance framework.

Question 145

An enterprise considering implementing IT governance should FIRST develop the scope of the IT governance program and:

Options:

A.

initiate the program using an implementation roadmap.

B.

establish initiatives for business and managers.

C.

acquire the resources that will be required.

D.

communicate the program to stakeholders to gain consensus.

Question 146

An enterprise experiencing issues with data protection and least privilege is implementing enterprise-wide data encryption in response. Which of the following is the BEST approach to ensure all business units work toward remediating these issues?

Options:

A.

Develop key performance indicators (KPIs) to measure enterprise adoption.

B.

Integrate data encryption requirements into existing and planned projects.

C.

Assign owners for data governance initiatives.

D.

Mandate the creation of a data governance framework.

Question 147

Which of the following would be the BEST way to facilitate the adoption of strong IT governance practices throughout a multi-divisional enterprise?

Options:

A.

Ensuring each divisional policy is consistent with corporate policy

B.

Ensuring divisional governance fosters continuous improvement processes

C.

Mandating data standardization across the distributed enterprise

D.

Documenting and communicating key management practices across divisions

Question 148

The CIO in a large enterprise is seeking assurance that significant IT risk is being proactively monitored and does not exceed agreed risk tolerance levels. The BEST way to provide this ongoing assurance is to require the development of:

Options:

A.

an IT risk appetite statement.

B.

a risk management policy.

C.

key risk indicators (KRIs).

D.

a risk register.

Question 149

It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?

Options:

A.

Enterprise architecture (EA)

B.

Enterprise risk framework

C.

IT service management

D.

IT project roadmap

Question 150

An enterprise is initiating efforts to improve system availability to mitigate IT risk to the business. Which of the following results would be MOST important to report to the CIO to measure progress?

Options:

A.

Incident severity and downtime trend analysis

B.

Probability and seventy of each IT risk

C.

Financial losses and bad press releases

D.

Customer and stakeholder complaints over time

Question 151

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

Options:

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Question 152

A CEO determines the enterprise is lagging behind its competitors in consumer mobile offerings, and mandates an aggressive rollout of several new mobile services within the next 12 months. To ensure the IT organization is capable of supporting this business objective, what should the CIO do FIRST?

Options:

A.

Request an assessment of current in-house mobile technology skills.

B.

Create a sense of urgency with the IT team that mobile knowledge is mandatory.

C.

Procure contractors with experience in mobile application development.

D.

Task direct reports with creating training plans for their teams.

Question 153

A CIO believes that a recent mission-critical IT decision by the board of directors is not in the best financial interest of all stakeholders. Which of the following is the MOST ethical course of action?

Options:

A.

Share concerns with the legal department.

B.

Request a meeting with the board.

C.

Engage an independent cost-benefit analysis.

D.

Request an internal audit review of the board's decision.

Question 154

A CIO must determine if IT staff have adequate skills to deliver on key strategic objectives. Which of the following will provide the MOST useful information?

Options:

A.

Employee performance metrics

B.

Project risk reports

C.

Gap analysis results

D.

Training program statistics

Question 155

Senior management is reviewing the results of a recent security incident with significant business impact. Which of the following findings should be of GREATEST concern?

Options:

A.

Significant gaps are present m the incident documentation.

B.

The incident was not logged in the ticketing system.

C.

Response decisions were made without consulting the appropriate authority.

D.

Response efforts had to be outsourced due to insufficient internal resources.

Question 156

Which of the following is the BEST way to ensure the continued usefulness of IT governance reports for stakeholders?

Options:

A.

Conduct quarterly audits and adjust reporting based on findings.

B.

Establish a standard process for providing feedback.

C.

Rely on IT leaders to advise when adjustments should be made.

D.

Issue frequent service level satisfaction surveys.

Question 157

Which of the following is the BEST way for a CIO to secure support for a strategy to achieve long-term IT objectives?

Options:

A.

Make the necessary strategic decisions and notify staff accordingly.

B.

Develop tactics to implement the strategy and share with stakeholders.

C.

Develop a communication plan for distribution of information to staff.

D.

Meet with stakeholders to explain the strategy and incorporate feedback.

Question 158

A large organization with branches across many countries is in the midst of an enterprise resource planning (ERP) transformation. The IT organization receives news that the branches in a country where the impact to the enterprise is to be greatest are being sold. What should be the NEXT step?

Options:

A.

Update the ERP business case and re-evaluate the ROI.

B.

Cancel the ERP transformation and re-allocate project funds.

C.

Adjust the ERP implementation plan and budget.

D.

Continue with the ERP migration according to plan.

Question 159

A manufacturing company has recently decided to outsource portions of its IT operations. Which of the following would BEST justify this decision?

Options:

A.

Core legacy systems are not fully integrated with enterprise IT systems.

B.

Business users are not able to decide upon IT service levels to be provided.

C.

Increasing complexity of core business and IT processes have led to dramatic increasing costs.

D.

The business strategy requires significant IT resource scalability over the next five years.

Question 160

A large enterprise that is diversifying its business will be transitioning to a new software platform, which is expected to cause data changes. Which of the following should be done FIRST when developing the related metadata management process?

Options:

A.

Require an update to enterprise data policies.

B.

Request an impact analysis.

C.

Review documented data interdependence.

D.

Validate against existing architecture.

Question 161

An executive sponsor of a partially completed IT project has learned that the financial assumptions supporting the project have changed. Which of the following governance actions should be taken FIRST?

Options:

A.

Schedule an interim project review.

B.

Request a risk assessment.

C.

Re-evaluate the project in the portfolio.

D.

Request an update to the business case

Question 162

The BEST way to manage an outsourced vendor relationship is by:

Options:

A.

conducting periodic risk assessments.

B.

reviewing annual independent third-party reports.

C.

providing clear objectives and transparency.

D.

analyzing performance statistics from the vendor.

Question 163

An enterprise has decided to create its first mobile application. The IT director is concerned about the potential impact of this initiative. Which of the following is the MOST important input for managing the risk associated with this initiative?

Options:

A.

Enterprise architecture (EA)

B.

IT risk scorecard

C.

Enterprise risk appetite

D.

Business requirements

Question 164

A review of the effectiveness of IT governance within an enterprise has revealed that several innovation improvement initiatives are failing. An analysis shows a lack of stakeholder buy-in to the improvements. Implementing which of the following would have prevented this problem?

Options:

A.

An IT project roadmap

B.

An IT risk management program

C.

A change management program

D.

A service delivery framework

Question 165

When developing effective metrics for the measurement of solution delivery, it is MOST important to:

Options:

A.

establish project controls and monitoring objectives.

B.

perform an objective analysis of the project roadmap.

C.

establish the objectives and expected benefits.

D.

specify quantitative measures for solution delivery.

Question 166

While monitoring an enterprise's IT projects portfolio, it is discovered that a project is 75% complete, but all budgeted resources have been expended. Which of the following is the MOST important task to perform?

Options:

A.

Review the IT investments.

B.

Reorganize the IT projects portfolio.

C.

Re-evaluate the business case.

D.

Review the IT governance structure.

Question 167

Which of the following BEST reflects the ethical values adopted by an IT organization?

Options:

A.

IT principles and policies

B.

IT balanced scorecard

C.

IT governance framework

D.

IT goals and objectives

Question 168

The BEST way to ensure an IT steering committee meets enterprise objectives is to:

Options:

A.

require a member of the committee to have IT governance expertise.

B.

benchmark against industry best practices.

C.

establish key performance indicators (KPIs).

D.

have key business stakeholders represented on the committee.

Question 169

Which of the following should be the MOST important consideration when defining an information architecture?

Options:

A.

Frequency and quantity of information updates

B.

Information to justify business cases

C.

Incorporation of emerging technologies

D.

Access to and exchange of information

Question 170

An enterprise learns that a new privacy regulation was recently published to protect customers in the event of a breach involving personally identifiable information (Pll). The IT risk management team's FIRST course of action should be to:

Options:

A.

evaluate the risk appetite for the new regulation.

B.

define the risk tolerance for the new regulation.

C.

determine if the new regulation introduces new risk.

D.

assign a risk owner for the new regulation.

Question 171

An analysis of an organization s security breach is complete. The results indicate that the quality of the code used for updates to its primary customer-facing software has been declining and security flaws were introduced. The FIRST IT governance action to correct this problem should be to review:

Options:

A.

compliance with the user testing process.

B.

the change management control framework.

C.

the qualifications of developers to write secure code.

D.

the incident response plan.

Demo: 171 questions
Total 578 questions