Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CGEIT Certified in the Governance of Enterprise IT Exam Questions and Answers

Questions 4

A newly established IT steering committee is concerned about whether a system is meeting availability objectives. Which of the following will provide the BEST information to make an assessment?

Options:

A.

Balanced scorecard

B.

Capability maturity levels

C.

Performance indicators

D.

Critical success factors (CSFs)

Buy Now
Questions 5

Which of the following is the BEST method for determining an enterprise's current appetite for risk?

Options:

A.

Interviewing senior management

B.

Evaluating the balanced scorecard

C.

Reviewing recent audit findings

D.

Assessing social media adoption

Buy Now
Questions 6

An IT governance committee wants to ensure there is a clear description of the "data owner" in the enterprise data policy. Which of the following would BEST define the owner of data stored in an external cloud?

Options:

A.

The business leader who is most impacted by the loss of data.

B.

The risk manager who is responsible for protecting data stored in the cloud.

C.

The contract manager who monitors the security of the cloud provider.

D.

The vendor who submits the data to the organization via online forms

Buy Now
Questions 7

Which of the following is MOST important when an IT-enabled business initiative involves multiple business functions?

Options:

A.

Defining cross-departmental budget allocation

B.

Conducting a systemic risk assessment

C.

Developing independent business cases

D.

Establishing a steering committee with business representation

Buy Now
Questions 8

Senior management wants to promote investment in IT, but is uncertain that associated risks are being properly identified. The BEST way to address this concern is to:

Options:

A.

engage an external consultant to develop risk scenarios.

B.

appoint an IT representative to the business risk committee.

C.

assign an IT cost controller to the finance department.

D.

ensure business cases are developed by IT.

Buy Now
Questions 9

An IT director is negotiating a contract with a vendor for application management services. There is concern by other departments that the outsourced services may not be delivered successfully. Which of the following is the BEST way for the IT director to address this concern?

Options:

A.

Implement a communication management plan.

B.

Develop a comprehensive vendor management plan.

C.

Review the IT service risk management plan.

D.

Establish a policy on operational level agreements with vendors.

Buy Now
Questions 10

Which of the following is the BEST IT architecture concept to ensure consistency, interoperability, and agility for infrastructure capabilities?

Options:

A.

Establishment of an IT steering committee

B.

Standards-based reference architecture and design specifications

C.

Establishment of standard vendor and technology designations

D.

Design of policies and procedures

Buy Now
Questions 11

An organization's board of directors has questioned the value provided by IT key performance indicators (KPIs). Which of the following is the BEST way to determine whether the KPIs adequately support organizational objectives?

Options:

A.

Define a strategy for IT measurement.

B.

Define policies and procedures around current KPIs.

C.

Review the KPIs with key business executives.

D.

Work directly with the CEO to identify what measures should be used.

Buy Now
Questions 12

An enterprise can BEST assess the benefits of a new IT project through its life cycle by:

Options:

A.

calculation of the total cost of ownership.

B.

periodic review of the business case.

C.

periodic measurement of the project slip rate.

D.

calculation of the net present value (NPV).

Buy Now
Questions 13

Which of the following is the MOST important attribute of an information steward?

Options:

A.

The information steward manages the systems that process the relevant data.

B.

The information steward has expertise in managing data quality systems.

C.

The information steward is closely aligned with the business function.

D.

The information steward is part of the information architecture group.

Buy Now
Questions 14

IT has launched new portfolio management policies and processes to improve the alignment of IT projects with enterprise goals. The latest audit report indicates that no improvement has been made due to confusion in the decision-making process. Which of the following is the BEST course of action for the CIO?

Options:

A.

Deliver prioritization and facilitation training.

B.

Implement a performance management framework.

C.

Create an IT portfolio management risk framework.

D.

Develop and communicate an accountability matrix.

Buy Now
Questions 15

A large financial institution is considering outsourcing customer call center operations which will allow the chosen vendor to access systems from offshore locations. Which of the following represents the GREATEST risk?

Options:

A.

Inconsistent customer service and reporting

B.

Loss of data confidentiality

C.

Lack of network availability

D.

Inadequate business continuity planning

Buy Now
Questions 16

Acceptance of an enterprise's newly implemented IT governance initiatives has been resisted by a functional group requesting more autonomy over technology choices. Which of the following is MOST important to accommodate this need for autonomy?

Options:

A.

Continuous improvement processes

B.

Documentation of key management practices

C.

An exception management process

D.

A change control process

Buy Now
Questions 17

An enterprise embarked on an aggressive strategy requiring the implementation of several large IT projects impacting multiple business processes across all departments. Initially employees were supportive of the strategy, but there is growing fatigue and frustration with the ongoing newcapabilities which must be learned. Which of the following would be the BEST action performed by senior management?

Options:

A.

Incorporate an organizational change management program.

B.

Establish "Reward and Recognition" efforts to boost employee morale.

C.

Improve the system development life cycle (SDLC) process.

D.

Assess current business and IT competencies.

Buy Now
Questions 18

A global financial enterprise has been experiencing a substantial number of information security incidents that have directly affected its business reputation. Which of the following should be the IT governance board's FIRST course of action?

Options:

A.

Require revisions to how security incidents are managed by the IT department.

B.

Request an IT security assessment to identify the main security gaps.

C.

Execute an IT maturity assessment of the security process.

D.

Mandate an update to the enterprise's IT security policy.

Buy Now
Questions 19

Which of the following is the BEST indication of effective IT-business strategic alignment?

Options:

A.

Business management is involved as IT strategies are developed.

B.

IT senior management is required to report to the board.

C.

Business strategy is documented to allow IT architecture to be designed quickly.

D.

IT-business collaboration results in a strategy focused on IT cost reduction.

Buy Now
Questions 20

An enterprise has decided to utilize a cloud vendor for the first time to provide email as a service, eliminating in-house email capabilities. Which of the following IT strategic actions should be triggered by this decision?

Options:

A.

Develop a data protection awareness education training program.

B.

Monitor outgoing email traffic for malware.

C.

Implement a data classification and storage management tool.

D.

Update and communicate data storage and transmission policies.

Buy Now
Questions 21

A manufacturing company has recently decided to outsource portions of its IT operations. Which of the following would BEST justify this decision?

Options:

A.

Core legacy systems are not fully integrated with enterprise IT systems.

B.

Business users are not able to decide upon IT service levels to be provided.

C.

Increasing complexity of core business and IT processes have led to dramatic increasing costs.

D.

The business strategy requires significant IT resource scalability over the next five years.

Buy Now
Questions 22

An enterprise has established a new department to oversee the life cycle of activities that support data management objectives. Which of the following should be done NEXT?

Options:

A.

Develop a business continuity plan (BCP).

B.

Assess the current data business model.

C.

Review data privacy requirements.

D.

Establish a RACI chart

Buy Now
Questions 23

While monitoring an enterprise's IT projects portfolio, it is discovered that a project is 75% complete, but all budgeted resources have been expended. Which of the following is the MOST important task to perform?

Options:

A.

Review the IT investments.

B.

Reorganize the IT projects portfolio.

C.

Re-evaluate the business case.

D.

Review the IT governance structure.

Buy Now
Questions 24

An IT steering committee wants the enterprise's mobile workforce to use cloud-based file storage to save non-sensitive corporate data, removing the need for remote access to that information. Before this change is implemented, what should be included in the data management policy?

Options:

A.

A mandate for periodic employee training on how to classify corporate data files

B.

A mandate for the encryption of all corporate data files at rest that contain sensitive data

C.

A process for blocking access to cloud-based apps if inappropriate content is discovered

D.

A requirement to scan approved cloud-based apps for inappropriate content

Buy Now
Questions 25

A business case indicates an enterprise would reduce costs by implementing a bring your own device (BYOD) program allowing employees to use personal devices for email. Which of the following should be the FIRST governance action?

Options:

A.

Assess the enterprise architecture (EA).

B.

Update the network infrastructure.

C.

Update the BYOD policy.

D.

Assess the BYOD risk.

Buy Now
Questions 26

A CEO determines the enterprise is lagging behind its competitors in consumer mobile offerings, and mandates an aggressive rollout of several new mobile services within the next 12 months. To ensure the IT organization is capable of supporting this business objective, what should the CIO do FIRST?

Options:

A.

Request an assessment of current in-house mobile technology skills.

B.

Create a sense of urgency with the IT team that mobile knowledge is mandatory.

C.

Procure contractors with experience in mobile application development.

D.

Task direct reports with creating training plans for their teams.

Buy Now
Questions 27

A CIO must determine if IT staff have adequate skills to deliver on key strategic objectives. Which of the following will provide the MOST useful information?

Options:

A.

Employee performance metrics

B.

Project risk reports

C.

Gap analysis results

D.

Training program statistics

Buy Now
Questions 28

An enterprise plans to implement a business intelligence (Bl) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

Options:

A.

Interface issues between enterprise and Bl applications

B.

Large volumes of data fed from enterprise applications

C.

The need for staff to be trained on the new Bl tool

D.

Data definition and mapping sources from applications

Buy Now
Questions 29

An enterprise plans to expand into new markets in countries lacking data privacy regulations, increasing risk exposure. Which of the following is the BEST course of action for the CIO?

Options:

A.

Identify business risk appetite and tolerance levels.

B.

Quantify the risk impact and evaluate possible countermeasures.

C.

Limit the personal data available to the high-risk countries.

D.

Mandate the strengthening of user access controls.

Buy Now
Questions 30

Best practice states that IT governance MUST:

Options:

A.

enforce consistent policy across the enterprise.

B.

be applied in the same manner throughout the enterprise.

C.

apply consistent target levels of maturity to processes.

D.

be a component of enterprise governance.

Buy Now
Questions 31

What is the PRIMARY objective for performing an IT due diligence review prior to the acquisition of a competitor?

Options:

A.

Document the competitor's governance structure.

B.

Ensure that the competitor understands significant IT risks.

C.

Assess the status of the risk profile of the competitor.

D.

Determine whether the competitor is using industry-accepted practices.

Buy Now
Questions 32

The use of new technology in an enterprise will require specific expertise and updated system development processes. There is concern that IT is not properly sourced. Which of the following should be the FIRST course of action?

Options:

A.

Perform a risk assessment on potential outsourcing.

B.

Update the enterprise architecture (EA) with the new technology.

C.

Review the IT balanced scorecard for sourcing opportunities.

D.

Assess the gap between current and required staff competencies.

Buy Now
Questions 33

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

Options:

A.

Authenticating access to information assets based on roles or business rules.

B.

Implementing multi-factor authentication controls

C.

Granting access to information based on information architecture

D.

Engaging an audit of logical access controls and related security policies

Buy Now
Questions 34

A retail enterprise has cost reduction as its top priority. From a governance perspective, which of the following should be the MOST important consideration when evaluating different IT investment options?

Options:

A.

Support for increased sales

B.

Risk associated with each option

C.

Industry best practices

D.

Business value impact

Buy Now
Questions 35

The board of directors of an enterprise has approved a three-year IT strategic program to centralize the core business processes of its global entities into one core system. Which of the following should be the ClO's NEXT step?

Options:

A.

Engage a team to perform a business impact analysis (BIA).

B.

Require the development of a risk management plan.

C.

Determine resource requirements for program implementation.

D.

Require the development of a program roadmap.

Buy Now
Questions 36

An audit report has revealed that data scientists are analyzing sensitive "big data" files using an offsite cloud because corporate servers do not have the necessary processing capabilities. A review of policies indicates this practice is not prohibited. Which of the following should be the FIRST strategic action to address the report?

Options:

A.

Authorize a risk analysis of the practice.

B.

Update data governance practices.

C.

Revise the information security policy.

D.

Recommend the use of a private cloud.

Buy Now
Questions 37

A healthcare enterprise that is subject to strict compliance requirements has decided to outsource several key IT services to third-party providers. Which of the following would be the BEST way to assess compliance and avoid reputational damage?

Options:

A.

Require quarterly reports from the providers demonstrating compliance.

B.

Require documentation that the providers have adequate controls in place.

C.

Exercise the right to perform an audit.

D.

Impose monetary penalties for noncompliance.

Buy Now
Questions 38

Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application. Which of the following is the BEST way to increase the chances of a successful delivery?

Options:

A.

Implement a release and deployment plan

B.

Ask the application owner to update the risk register

C.

Create a baseline configuration of the new application

D.

Perform user acceptance testing (UAT)

Buy Now
Questions 39

Which of the following BEST enables informed IT investment decisions?

Options:

A.

Business case

B.

Technology roadmap

C.

Program plan

D.

Risk classification

Buy Now
Questions 40

When reporting key risk indicators (KRIs) to the board, what information BEST enables risk-based decision-making?

Options:

A.

Risk appetite, risk threshold, and risk tolerance

B.

Classification of current business risk

C.

Emerging industry risk trends and benchmarks

D.

Costs and resource needs related to risk mitigation measures

Buy Now
Questions 41

The accountability for a business continuity program for business-critical systems is BEST assigned to the:

Options:

A.

enterprise risk manager.

B.

chief executive officer (CEO).

C.

director of internal audit.

D.

chief information officer (CIO).

Buy Now
Questions 42

Which of the following BEST enables an enterprise to determine whether a current program for IT infrastructure migration to the cloud is continuing to provide benefits?

Options:

A.

Key performance indicators (KPls)

B.

Total cost of ownership (TCO)

C.

Key risk indicators (KRIS)

D.

Net present value (NPV)

Buy Now
Questions 43

Which of the following characteristics would BEST indicate that an IT process is a good candidate for outsourcing?

Options:

A.

Strategic processes that require expert professionals

B.

Processes with higher risk to the enterprise

C.

Non-strategic processes that are not documented

D.

Operational processes that are well-defined

Buy Now
Questions 44

Which of the following is the MOST efficient way for an IT transformation project manager to communicate the project progress with stakeholders?

Establish governance forums within project management.

Options:

A.

Include key performance indicators (KPls) in a monthly newsletter.

B.

Share the business case with stakeholders.

C.

Post the project management report to the enterprise intranet site.

Buy Now
Questions 45

Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?

Options:

A.

Defined roles.

B.

Replicated systems.

C.

A risk register.

D.

Budget allocation.

Buy Now
Questions 46

An enterprise has an ongoing issue of corporate applications not delivering the expected benefits due to missing key functionality. As a result, many groups are using spreadsheets and databases instead of approved enterprise applications to store and manipulate information. Which of the following will BEST improve the success rate of future IT initiatives?

Options:

A.

Engage the business user community in acceptance testing Of acquired applications.

B.

Engage stakeholders to identify and validate business requirements.

C.

Establish a process for risk and value management.

D.

Prohibit the use of non-approved alternate software solutions.

Buy Now
Questions 47

An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:

Options:

A.

a common risk management taxonomy.

B.

a common risk organization.

C.

common key risk indicators (KRIs).

D.

common risk mitigation strategies.

Buy Now
Questions 48

Which of the following should a CIO review to obtain a holistic view of IT performance when identifying potential gaps in service delivery?

Options:

A.

Key performance indicators (KPIs)

B.

Return on investment (ROI) analysis

C.

Service level agreement (SLA) reporting

D.

Staff performance evaluations

Buy Now
Questions 49

When establishing a methodology for business cases, it would be MOST beneficial for an enterprise to include procedures for:

Options:

A.

updating the business case throughout its life cycle.

B.

addressing required changes outside the business case.

C.

identifying metrics post-implementation to measure project success.

D.

entering the business case into the enterprise architecture (EA).

Buy Now
Questions 50

An enterprise is concerned about the community impact of its data center noise levels. Which of the following is the enterprise’s BEST course of action?

Options:

A.

Proactively reduce after-hours operations

B.

Pursue acquisition of surrounding properties

C.

Wait for a formal complaint to be filed

D.

Seek input from appropriate stakeholders

Buy Now
Questions 51

Which of the following is the BEST indicator of the effectiveness of IT governance in an enterprise?

Options:

A.

Value delivery

B.

Resource utilization

C.

Residual risk

D.

Project delivery

Buy Now
Questions 52

An enterprise is exploring a new business opportunity. Which of the following is the BEST way to help ensure related IT projects deliver the business requirements?

Options:

A.

Hire a business consultant to manage the projects.

B.

Develop a policy to enforce the processes and procedures.

C.

Implement stage-gate reviews that require business sign-off.

D.

Focus on maturing processes and developing procedures.

Buy Now
Questions 53

An IT steering committee is concerned about staff saving data files containing sensitive corporate information on publicly available cloud file storage applications. Which of the following should be done FIRST to address this concern?

Options:

A.

Create a secure corporate cloud file storage and sharing solution.

B.

Block corporate access to cloud file storage applications.

C.

Require staff training on data classification policies.

D.

Revise the data management policy to prohibit this practice.

Buy Now
Questions 54

Which of the following is the PRIMARY responsibility of a data steward at an enterprise with mature data management programs?

Options:

A.

Implementing processes for data collection and use

B.

Ensuring compliance with data privacy laws and regulations

C.

Establishing data quality requirements and metrics

D.

Developing data-related policies and procedures

Buy Now
Questions 55

A board of directors has mandated that key performance indicators (KPIs) be developed for all IT projects that are created in support of a business objective. Which of the following MUST be reflected in the KPIs to be effective?

Options:

A.

Future-state architecture

B.

Critical success factors (CSFs)

C.

Portfolio management principles

D.

Key risk indicators (KRIs)

Buy Now
Questions 56

An enterprise plans to implement a business intelligence tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

Options:

A.

Interface issues between enterprise and business intelligence applications.

B.

The need for staff to be trained on the new business intelligence tool.

C.

Large volumes of data fed from enterprise applications.

D.

Data definition and mapping sources from applications.

Buy Now
Questions 57

Which of the following should be the PRIMARY consideration when developing an IT strategy for the global implementation of Internet of Things (IoT) solutions?

Options:

A.

Hiring additional IT staff with IoT expertise

B.

Addressing security and privacy

C.

Identifying cost-effective IoT devices

D.

Maintaining compatibility with legacy systems

Buy Now
Questions 58

An internal auditor conducts an assessment of a two-year-old IT risk management program. Which of the following findings should be of MOST concern to the CIO?

Options:

A.

Organizational responsibility for IT risk management is not clearly defined.

B.

None of the members of the IT risk management team have risk management-related certifications.

C.

Only a few key risk indicators (KRIs) identified by the IT risk management team are being monitored and the rest will be on a phased schedule.

D.

IT risk training records are not properly retained in accordance with established schedules

Buy Now
Questions 59

Which of the following BEST enables the alignment of user access rights with business requirements?

Options:

A.

Data classification policy

B.

Maturity model

C.

System design

D.

Data architecture model

Buy Now
Questions 60

An enterprise wants to implement metrics to monitor the performance of its IT portfolio. Whose input is MOST important to consider when establishing these metrics?

Options:

A.

Project management office (PMO).

B.

IT executives.

C.

The chief executive officer (CEO).

D.

Business unit stakeholders.

Buy Now
Questions 61

An enterprise's current business continuity plan (BCP) fails to consider many common crisis events. What would be MOST helpful to address this situation?

Options:

A.

Engage stakeholders in scenario development

B.

Review the root cause analysis

C.

Require further walk-through tests

D.

Review and update the crisis communication plan

Buy Now
Questions 62

Which of the following is MOST relevant to report to the board of directors regarding the execution of IT strategy?

Options:

A.

Service level agreements (SLAs) for outsourced IT initiatives

B.

Total IT spend from all current IT initiatives

C.

Realization of benefits in the business case

D.

IT strategy risk metrics related to critical services and projects

Buy Now
Questions 63

Which of the following should be considered FIRST when assessing the implications of new external regulations on IT compliance?

Options:

A.

IT policies and procedures that need revision

B.

Resource burden for implementation

C.

Gaps in skills and experience of IT employees

D.

Impact on contracts with service providers

Buy Now
Questions 64

An enterprise’s IT director is concerned that the chair of the IT steering committee is stealing confidential company information. Which of the following is the IT director’s BEST course of action?

Options:

A.

File a report with the local law enforcement agency.

B.

Report the concern to the ethics hotline.

C.

Discuss the concern with the chair directly.

D.

Conduct an investigation to substantiate the chair’s activities.

Buy Now
Questions 65

Which of the following presents the GREATEST challenge for a large-scale enterprise when procuring Infrastructure as a Service (IaaS)?

Options:

A.

Testing the vendor resiliency plan annually

B.

Protecting the enterprise from labor liability

C.

Ensuring the vendor meets corporate requirements

D.

Monitoring key performance indicators (KPIs)

Buy Now
Questions 66

An enterprise has an overarching enterprise architecture (EA) document. The CIO is concerned that EA is not leveraged in recent IT-enabled investments. Which of the following would BEST help to address these concerns and enforce the leveraging of EA?

Options:

A.

Form a team to update EA regularly.

B.

Require EA review at key milestones.

C.

Publish and train on the EA document.

D.

Adopt a globally recognized EA framework.

Buy Now
Questions 67

When an enterprise outsources to a third-party data center, who is accountable for the governance of data retention controls for the data that has been transferred?

Options:

A.

The enterprise's internal audit team

B.

The third party's data steward

C.

The third party's control operators

D.

The enterprise's data owner

Buy Now
Questions 68

A board of directors is concerned with the total cost of IT. Which of the following is MOST important for the CIO to include in an explanation to the board?

Options:

A.

A summary of benefits that will be achieved once key IT initiatives are completed.

B.

A mapping of IT employee roles to the balanced scorecard.

C.

A benchmark of IT employee salary costs against comparable organizations.

D.

A breakdown of operational versus capital expenditures.

Buy Now
Questions 69

Which of the following should be done FIRST when developing an IT strategy to support a new AI business strategy?

Options:

A.

Assess current AI capabilities and infrastructure

B.

Establish guidelines and policies for responsible use of AI

C.

Create use cases to understand the impact of AI

D.

Build a team of AI professionals

Buy Now
Questions 70

As a result of a new regulatory requirement, an enterprise’s board has mandated that steps be taken to ensure related IT governance activities are performing as originally designed and are continuously improved. Which of the following is the BEST approach?

Options:

A.

Mandate ongoing enterprise risk and control self-assessments (CSAs)

B.

Conduct quarterly reviews of the enterprise business architecture

C.

Engage periodic external audit reviews of IT governance processes

D.

Require annual mapping of key IT governance processes

Buy Now
Questions 71

Which of the following is the PRIMARY outcome of using a comprehensive architecture framework?

Options:

A.

Key third-party relationships are supported.

B.

Business goal conflicts are identified.

C.

Relevant controls are identified.

D.

Organizational management policies are developed.

Buy Now
Questions 72

Which of the following would be the BEST way for an enterprise to address new legal and regulatory requirements applicable to IT?

Options:

A.

Treat as a risk to be assessed before developing a response.

B.

Benchmark how other IT organizations are treating the new requirements.

C.

Adopt a zero-tolerance approach for noncompliance with regulatory matters.

D.

Use a cost-benefit analysis to determine if compliance is warranted.

Buy Now
Questions 73

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

Options:

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Buy Now
Questions 74

A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:

confirm process owners' acceptance of residual risk.

perform an internal and external network penetration test.

obtain IT security approval on security policy exceptions.

Options:

A.

benchmark policy against industry best practice.

Buy Now
Questions 75

An enterprise has decided to invest in Internet of Things (IoT) technology as part of its strategic plan. Which of the following presents the GREATEST risk to consider as part of the technical risk management process?

Options:

A.

Device vulnerabilities

B.

Technology integration

C.

Device performance

D.

Technology obsolescence

Buy Now
Questions 76

A publicly traded enterprise wants to demonstrate that its board of directors is providing adequate strategic oversight of IT. Which of the following BEST supports this objective?

Options:

A.

Annual IT governance communication to all staff.

B.

Press releases targeted at large investors.

C.

Inclusion of IT governance reporting in the annual report.

D.

Annual presentation of IT performance metrics.

Buy Now
Questions 77

An enterprise wants to establish key risk indicators (KRIs) in an effort to better manage IT risk. Which of the following should be identified FIRST?

Options:

A.

The enterprise risk appetite

B.

Key performance metrics

C.

Risk mitigation strategies

D.

Enterprise architecture (EA) components

Buy Now
Questions 78

An internal audit of a large financial institution found that financial data is being managed in a way that will negatively impact the enterprise's ability to support regulatory reporting. Which of the following should be the FIRST strategic action in addressing this situation?

Establish a data governance framework.

Assign data responsibilities through a RACI chart.

Review key risk indicators (KRIS) related to data management.

Options:

A.

Update data management policies.

Buy Now
Questions 79

Which of the following BEST enables an enterprise to determine an appropriate retention policy for its information assets?

Options:

A.

Business and compliance requirements

B.

Business storage and processing needs

C.

Backup and restoration capabilities

D.

External customer data retention requirements

Buy Now
Questions 80

When developing IT risk management policies and standards, it is MOST important to align them with:

Options:

A.

The corporate risk culture

B.

The enterprise risk management (ERM) framework

C.

Enterprise goals and objectives

D.

Best practices for IT risk management

Buy Now
Questions 81

A CIO observes that many information assets are hosted on legacy technology that can no longer be patched or updated. The systems are not currently in use, but business units are reluctant to decommission assets due to information retention requirements. Which of the following is the BEST strategic response to this situation?

Options:

A.

Ensure the legacy systems are behind a secure firewall

B.

Isolate the legacy systems and disconnect them from the internet

C.

Apply legacy system surcharges to the business units

D.

Develop and enforce life cycle policies in consultation with business

Buy Now
Questions 82

Which of the following is the PRIMARY benefit to an enterprise when risk management is practiced effectively throughout the organization?

Options:

A.

Decisions are made with an awareness of probability and impact.

B.

IT objectives and goals are aligned to business objectives and goals.

C.

Business opportunity losses are minimized.

D.

Innovative strategic initiatives are encouraged.

Buy Now
Questions 83

From an IT governance perspective, which of the following would be the MOST significant impact of moving all IT applications to an external Software as a Service (SaaS) cloud provider?

Options:

A.

The integration of the IT department with business lines

B.

The shift from service delivery to service management

C.

The improvement Of IT service alignment with business

D.

The necessity to update key risk indicators (KRIs)

Buy Now
Questions 84

When an enterprise plans to deploy mobile device technologies, it is MOST important for leadership to ensure that:

Options:

A.

Users agree to an acceptable use policy

B.

Appropriate controls are implemented

C.

The IT policy addresses mobile devices

D.

The project management office (PMO) is engaged

Buy Now
Questions 85

An IT value delivery framework PRIMARILY helps an enterprise:

Options:

A.

Improve value of successful IT projects.

B.

Increase transparency of value to the enterprise.

C.

Assist top management in approving IT projects.

D.

Optimize value to the enterprise.

Buy Now
Questions 86

Which of the following is necessary for effective risk management in IT governance?

Options:

A.

Risk evaluation is embedded in the management processes.

B.

IT risk management is separate from enterprise risk management (ERM).

C.

Local managers are solely responsible for risk evaluation.

D.

Risk management strategy is approved by the audit committee.

Buy Now
Questions 87

When identifying improvements focused on the information asset life cycle, which of the following is CRITICAL for enabling data interoperability?

Options:

A.

Standardization

B.

Replication

C.

Segregation

D.

Sanitization

Buy Now
Questions 88

Which of the following will BEST enable an enterprise to convey IT governance direction and objectives?

Options:

A.

Skills and competencies

B.

Principles and policies

C.

Corporate culture

D.

Business processes

Buy Now
Questions 89

Which of the following should a new CIO do FIRST to set the strategic direction for IT?

Options:

A.

Develop well-defined business cases that include strategic outcomes.

B.

Remap stakeholder analysis and desired expectations.

C.

Review existing enterprise strategic objectives.

D.

Redesign detailed RACI charts of the IT function.

Buy Now
Questions 90

Upcoming IT-related regulations carry costly penalties for an enterprise. The issuing regulatory agency has a history of weak enforcement. The IT steering committee should FIRST direct management to:

Options:

A.

Develop mitigation plans for noncompliance.

B.

Update the enterprise architecture (EA).

C.

Evaluate the impact of the emerging risk.

D.

Perform benchmarking activities.

Buy Now
Questions 91

Which of the following metrics is MOST useful to ensure IT services meet business requirements?

Options:

A.

Number of discontinued business transformation programs

B.

Frequency Of IT services risk profile updates

C.

Frequency Of IT policy updates

D.

Number of business disruptions due to IT incidents

Buy Now
Questions 92

An audit department recently uncovered a series of security breaches. It was determined that network intrusion detection logs were recording the suspicious activity, but IT staff were not reviewing logs due to competing business demands. To address this situation, the IT steering committee’s FIRST priority should be:

Options:

A.

A re-prioritization of IT projects to address critical needs

B.

Updating the RACI chart to establish responsibility

C.

The hiring of additional staff to cope with the demand

D.

An assessment of the capacity of current resources

Buy Now
Questions 93

A CIO is planning to interview enterprise stakeholders to assess whether the IT strategic plan is continuing to support enterprise business objectives. The CIO would be MOST effective by starting the interview process with:

Options:

A.

the executive team.

B.

the internal auditors.

C.

senior IT managers.

D.

business process owners.

Buy Now
Questions 94

Which of the following is the MOST important consideration when integrating a new vendor with an enterprise resource planning (ERP) system?

Options:

A.

IT senior management selects the vendor.

B.

A vendor risk assessment is conducted

C.

ERP data mapping is approved by the enterprise architect.

D.

Procurement provides the terms of the contract.

Buy Now
Questions 95

An enterprise has launched a critical new IT initiative that is expected to produce substantial value. Which of the following would BEST facilitate the reporting of benefits realized by the IT investment to the board?

Options:

A.

Balanced scorecard

B.

Milestone chart

C.

Performance management

D.

Critical risk and issue walk through

Buy Now
Questions 96

Which of the following is the BEST way for a CIO to provide senior business management with increased visibility to the overall performance of the IT operation?

Options:

A.

Develop key risk indicators (KRIs).

B.

Provide return on investment (ROI) reports.

C.

Develop key performance indicators (KPIs).

D.

Provide service level agreement (SLA) performance statistics.

Buy Now
Questions 97

An enterprise recently implemented a significant change in its business strategy by moving to a technologically advanced product with considerable impact on the business. What should be the FINAL step in completing the changes to IT processes?

Options:

A.

Updating the configuration management database (CMDB)

B.

Empowering the business to embrace the changes

C.

Ensuring a return to stabilized business operations

D.

Updating the enterprise architecture (EA)

Buy Now
Questions 98

Which of the following is the BEST way to express the value of financial investments in cybersecurity?

Options:

A.

Payback period

B.

Cost-benefit analysis

C.

Net present value (NPV)

D.

Internal rate of return (IRR)

Buy Now
Questions 99

Which strategic planning approach would be MOST appropriate for a large enterprise to follow when revamping its IT services?

Options:

A.

Addressing gaps within the management of IT-related risk

B.

Focusing on business innovation through knowledge, expertise, and initiatives

C.

Calibrating and scaling delivery Of IT services in line with business requirements

D.

Adhering to on-time and on-budget IT service delivery

Buy Now
Questions 100

Which of the following roles is accountable for the confidentiality, integrity, and availability of information within an enterprise?

Options:

A.

Data owner

B.

Lead legal counsel

C.

Risk manager

D.

Data custodian

Buy Now
Questions 101

An ongoing project is on track according to project plan. However, a recent regulation change will have a major impact to the project. The project sponsor's NEXT step should be to:

Options:

A.

Seek exemption from the appropriate regulatory body

B.

Perform an impact analysis and update the business case

C.

Submit the project to the IT steering committee for reapproval

D.

Rescope the project to remove work impacted by the regulation

Buy Now
Questions 102

Which of the following is the BEST approach to ensure global regulatory compliance when implementing a new business process?

Options:

A.

Use a balanced scorecard to track the business process.

B.

Ensure the appropriate involvement Of the legal department.

C.

Review and revise the business architecture.

D.

Seek approval from the change management board.

Buy Now
Questions 103

Which of the following should be the MOST essential consideration when outsourcing IT services?

Options:

A.

Identification of core and non-core business processes.

B.

Compliance with enterprise architecture (EA).

C.

Alignment with existing human resources (HR) policies and practices.

D.

Adoption of a diverse vendor selection process.

Buy Now
Questions 104

IT governance within an enterprise is attempting to drive a cultural shift to enhance compliance with IT security policies. The BEST way to support this objective is to ensure that enterprise IT policies are:

Options:

A.

communicated on a regular basis.

B.

acknowledged and signed by each employee.

C.

centrally posted and contain detailed instructions.

D.

integrated into individual performance objectives.

Buy Now
Questions 105

Which of the following should be the FIRST step in planning an IT governance implementation?

Options:

A.

Assign decision-making responsibilities.

B.

Obtain necessary business funding.

C.

Define key business performance indicators.

D.

Identify business drivers.

Buy Now
Questions 106

An enterprise has established a goal of leveraging AI as a source of strategic advantage. Which of the following should be done FIRST when developing the related IT strategy?

Options:

A.

Document requirements mapped to each business function.

B.

Benchmark how other IT organizations are leveraging AI.

C.

Define the IT infrastructure requirements for AI implementation.

D.

Define an operational level agreement (OLA) between IT and business functions.

Buy Now
Questions 107

Which of the following provides the BEST evidence of an IT risk-aware culture across an enterprise?

Options:

A.

Business staff report identified IT risks.

B.

IT risks are communicated to the business.

C.

IT risk-related policies are published.

D.

The IT infrastructure is resilient.

Buy Now
Questions 108

Which of the following decisions would be made by the IT strategy committee?

Options:

A.

Communication plan for a major IT initiative

B.

Cloud implementation and support plan

C.

Enterprise risk management (ERM) framework

D.

Composition of the investment portfolio

Buy Now
Questions 109

Which of the following roles should approve major IT purchases to help prevent conflicts of interest?

Options:

A.

IT steering committee

B.

Chief information officer (CIO)

C.

Chief compliance officer

D.

Project management office (PMO)

Buy Now
Questions 110

The PRIMARY reason for using quantitative criteria in developing business cases for IT projects is to:

Options:

A.

improve the process of evaluating returns after implementation.

B.

benchmark project success with similar enterprises.

C.

learn lessons from errors made in past projects.

D.

apply other corporate standards to the development project.

Buy Now
Questions 111

Which of the following should be the FIRST step in updating an IT strategic plan?

Options:

A.

Revise the enterprise architecture (EA).

B.

Review IT performance objectives and indicators.

C.

Evaluate IT capabilities and resources.

D.

Identify changes in enterprise goals.

Buy Now
Questions 112

A software company's products have had significant quality issues in recent releases. As a result, market reputation and customer satisfaction ratings have been suffering. What should executive leadership do FIRST to address this concern?

Options:

A.

Allocate budget to hire more software and quality assurance specialists

B.

Implement a software development life cycle (SDLC) framework.

C.

Mandate more robust software testing prior to release.

D.

Require a root cause analysis and review results.

Buy Now
Questions 113

Which of the following is the BEST way to implement effective IT risk management?

Options:

A.

Align with business risk management processes.

B.

Establish a risk management function.

C.

Minimize the number of IT risk management decision points.

D.

Adopt risk management processes.

Buy Now
Questions 114

An enterprise has decided to execute a risk self-assessment to identify improvement opportunities for current IT services. Which of the following is MOST important to address in the assessment?

Options:

A.

Related business risk

B.

Residual IT risk

C.

Mapping of business objectives to IT risk

D.

IT capability and performance measures

Buy Now
Questions 115

An independent consultant has been hired to conduct an ad hoc audit of an enterprise’s information security office with results reported to the IT governance committee and the board Which of the following is MOST important to provide to the consultant before the audit begins?

Options:

A.

Acceptance of the audit risks and opportunities

B.

The scope and stakeholders of the audit

C.

The organizational structure of the security office

D.

The policies and framework used by the security office

Buy Now
Questions 116

IT management has reported difficulty retaining qualified IT personnel to support the organization's new strategy Given that outsourcing is not a viable approach, which of the following would be the BEST way for IT governance to address this situation?

Options:

A.

Implement an incentive-based employee referral program

B.

Direct the development of a strategic HR plan for IT

C.

Recommend enhancements to the online recruiting platform specific to IT

D.

Work with HR to enhance compensation packages for IT personnel

Buy Now
Questions 117

Which of the following will BEST enable an IT steering committee to monitor the achievement of overall IT objectives on a continuous basis?

Options:

A.

Defined service level agreements (SLAs)

B.

Project portfolio dashboards

C.

Key performance indicators (KPIs)

D.

IT user survey results

Buy Now
Questions 118

An enterprise is trying to increase the maturity of its IT process from being ad hoc to being repeatable. Which of the following is the PRIMARY benefit of this change?

Options:

A.

Process optimization is embedded across the organization.

B.

Required outcomes are mapped to business objectives.

C.

Process performance is measured in business terms.

D.

Required outcomes are more frequently achieved.

Buy Now
Questions 119

Which aspect of information governance BEST enables an enterprise to avoid duplication of records and promote consistency of data?

Options:

A.

Data loss prevention (DLP)

B.

Data modeling

C.

Blockchain management

D.

Enterprise architecture (EA)

Buy Now
Questions 120

Which of the following should be the PRIMARY input when developing IT strategy?

Options:

A.

Vision statement

B.

Process and capability maturity

C.

Governance objectives

D.

Balanced scorecard

Buy Now
Questions 121

Which of the following should senior management do FIRST when developing and managing digital applications for a new enterprise?

Options:

A.

Establish an architecture review board.

B.

Define the risk appetite

C.

Develop key risk indicators (KRIs).

D.

Implement a sourcing program.

Buy Now
Questions 122

Which of the following IT governance actions would be the BEST way to minimize the likelihood of IT failures jeopardizing the corporate value of an IT-dependent organization?

Options:

A.

Implement an IT risk management framework.

B.

Install an IT continuous monitoring solution.

C.

Define IT performance management measures.

D.

Benchmark IT strategy against industry peers.

Buy Now
Questions 123

Which of the following is MOST important to document for a business ethics program?

Options:

A.

Guiding principles and best practices

B.

Violation response matrix

C.

Whistle-blower protection protocols.

D.

Employee awareness and training content

Buy Now
Questions 124

A project sponsor has circumvented the request for proposal (RFP) selection process. Which of the following is the MOST likely reason for this control gap?

Options:

A.

Inadequate stage-gate reviews

B.

Inadequate board oversight

C.

Lack of accountability for policy adherence

D.

Lack of a legal and regulatory review process

Buy Now
Questions 125

When establishing a risk management process which of the following should be the FIRST step?

Options:

A.

Determine the probability of occurrence

B.

Identify threats

C.

Identify assets

D.

Assess risk exposures

Buy Now
Questions 126

Which of the following is the MOST important benefit of effective IT governance reporting?

Options:

A.

The enterprise balanced scorecard is aligned with IT dashboards.

B.

Business executives better understand IT's value contribution to the enterprise

C.

IT key performance indicators (KPIs) are included in the enterprise-level KPI dashboard.

D.

IT processes are improved in line with business requirements.

Buy Now
Questions 127

To enable IT to deliver adequate services and maintain availability of a web-facing infrastructure, an IT governance committee should FIRST establish:

Options:

A.

web operations procedures.

B.

business continuity plans (BCPs).

C.

key performance indicators (KPIs).

D.

customer survey processes.

Buy Now
Questions 128

What should be an IT steering committee's FIRST course of action when an enterprise is considering establishing a virtual reality store to sell its products?

Options:

A.

Request a resource gap analysis.

B.

Request development of key risk indicators (KRIs).

C.

Request a threat assessment.

D.

Request a cost-benefit analysis.

Buy Now
Questions 129

An enterprise's global IT program management office (PMO) has recently discovered that several IT projects are being run within a specific region without knowledge of the PMO. The projects are on time, on budget, and will deliver the proposed benefits to the specific region. Which of the following should be the PRIMARY concern of the PMO?

Options:

A.

Inability to reduce the impact to the risk level of the global portfolio

B.

Projects may not follow system development life cycle (SDLC)

C.

Lack of control and impact to the overall PMO budget

Buy Now
Questions 130

Which of the following is the MOST important input for designing a development program to help IT employees improve their ability to respond to business needs?

Options:

A.

Capability maturity model

B.

Cost-benefit analysis

C.

Skills competency assessment

D.

Annual performance evaluation

Buy Now
Questions 131

Which of the following BEST supports an enterprise's ability to comply with privacy laws and regulations?

Options:

A.

Complete inventory of enterprise data

B.

Implementation of a breach notification process

C.

Accurate classification of enterprise data

D.

Robust enterprise policy related to data retention

Buy Now
Questions 132

The PRIMARY objective of IT resource planning within an enterprise should be to:

Options:

A.

determine risk associated with IT resources.

B.

maximize value received from IT.

C.

determine IT outsourcing options.

D.

finalize service level agreements (SLAs) for IT

Buy Now
Questions 133

The PRIMARY reason a CIO and IT senior management should stay aware of the business environment is to:

Options:

A.

revisit prioritization of IT projects.

B.

adjust IT strategy as needed.

C.

measure efficiency of IT resources.

D.

re-assess the IT investment portfolio.

Buy Now
Questions 134

Right-to-audit clauses are intended to ensure the vendor:

Options:

A.

aligns staff skill sets adequately.

B.

maintains adequate budget for risk management.

C.

addresses compliance requirements.

D.

optimizes IT operations for service delivery

Buy Now
Questions 135

Before establishing IT key nsk indicators (KRls) which of the following should be defined FIRST?

Options:

A.

IT resource strategy

B.

IT risk and security framework

C.

IT goals and objectives

D.

IT key performance indicators (KPIs)

Buy Now
Questions 136

Of the following, who is PRIMARILY responsible for applying frameworks for the governance of IT to balance the need for security controls with business requirements?

Options:

A.

Data scientists

B.

Data stewards

C.

Data analysts

D.

Data processors

Buy Now
Questions 137

Which of the following is the BEST indication that information security requirements are taken into consideration when developing IT processes?

Options:

A.

The database is deployed in a distributed processing platform

B.

The information architecture incorporates data classification

C.

Customer profiles are stored with a domestic service provider

D.

The integrity of sensitive information is periodically reviewed

Buy Now
Questions 138

A new chief information officer (CIO) of an enterprise recommends implementing portfolio management after realizing there is no process in place for evaluating investments prior to selection. What should be the PRIMARY strategic goal driving this decision?

Options:

A.

Maximize value from the combined investments.

B.

Standardize processes for investment evaluation.

C.

Align investments to the enterprise architecture (EA).

D.

Enable transparency within the investment process.

Buy Now
Questions 139

An enterprise is planning a transformation initiative by leveraging emerging technology that will have a significant impact on existing products and services Which of the following is the BEST way for IT to prepare for this change?

Options:

A.

Use a balanced scorecard to measure IT outcomes.

B.

Analyze emerging technology products and related training needs.

C.

Procure appropriate resources to support emerging technology

D.

Assess the impact on the existing IT strategy

Buy Now
Questions 140

A major data leakage incident at an enterprise has resulted in a mandate to strengthen and enforce current data governance practices. Which of the following should be done FIRST to achieve this objective?

Options:

A.

Assess data security controls.

B.

Review data logs.

C.

Analyze data quality.

D.

Verify data owners.

Buy Now
Questions 141

The BEST time to identity metrics to measure the performance of an IT-enabled investment is during:

Options:

A.

system implementation

B.

project initiation

C.

investment feasibility analysis

D.

business case development.

Buy Now
Questions 142

An enterprise has learned of a new regulation that may impact delivery of one of its core technology services Which of the following should the done FIRST?

Options:

A.

Update the risk management framework

B.

Determine whether the board wants to comply with the regulation

C.

Assess the risk associated with the new regulation

D.

Request an action plan from the risk team

Buy Now
Questions 143

An IT steering committee is preparing to review proposals for projects that implement emerging technologies. In anticipation of the review, the committee should FIRST:

Options:

A.

determine if the IT staff can support the emerging technologies.

B.

understand how the emerging technologies will influence risk across the enterprise.

C.

require a capacity plan and framework review for the emerging technologies,

D.

require a review of the enterprise risk management framework.

Buy Now
Questions 144

An enterprise-wide strategic plan has been approved by the board of directors. Which of the following would BEST support the planning of IT investments required for the enterprise?

Options:

A.

Service-oriented architecture

B.

Enterprise architecture (EA)

C.

Contingency planning

D.

Enterprise balanced scorecard

Buy Now
Questions 145

Which of the following should be the MOST important consideration when designing an implementation plan for IT governance?

Options:

A.

Principles and policies

B.

Roles and responsibilities

C.

Risk tolerance levels

D.

Organizational culture

Buy Now
Questions 146

An IT steering committee is concerned that enterprise technologies have grown stagnant and are outdated. Which of the following is the BEST strategy to invest in modern technology?

Options:

A.

Decrease spending on steady state and increase spending on modernization and enhancements.

B.

Redefine the target architecture to define new technologies that can be incorporated into the infrastructure.

C.

Create a new investment category for innovation that becomes a new way for tracking investment decisions.

D.

Update the IT human resource management plan to require training and development for emerging technologies.

Buy Now
Questions 147

Which of the following should be the PRIMARY consideration for an enterprise when prioritizing IT projects?

Options:

A.

Technical capability of the enterprise to execute the projects

B.

Process owner expectations based on operational benefits

C.

Results of IT performance benchmarks against competitors

D.

Impact on the business due to expected project outcomes

Buy Now
Questions 148

An enterprise has lost an unencrypted backup tape of archived customer data. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?

Options:

A.

Initiate disciplinary proceedings against relevant employees.

B.

Mandate a review of backup tape inventory procedures.

C.

Communicate the breach to customers.

D.

Require an evaluation of storage facility vendors.

Buy Now
Questions 149

Which of the following is the BEST approach to assist an enterprise in planning for iT-enabled investments?

Options:

A.

Enterprise architecture (EA).

B.

IT process mapping

C.

Task management

D.

Service level management

Buy Now
Questions 150

Which of the following is MOST important for an IT strategy committee to ensure before initiating the development of an IT strategic plan?

Options:

A.

Committee members are apprised of business needs

B.

A risk assessment has been conducted.

C.

Committee members are independent from business units.

D.

IT initiatives are fully supported by the business.

Buy Now
Questions 151

The PRIMARY benefit of using an IT service catalog as part of the IT governance program is that it.

Options:

A.

ensures IT effectively meets future business needs,

B.

provides a foundation for measuring IT performance,

C.

improves the ability to allocate IT resources

D.

establishes enterprise performance metrics per service

Buy Now
Questions 152

The PRIMARY objective of building outcome measures is to:

Options:

A.

monitor whether the chosen strategy is successful

B.

visualize how the strategy will be achieved.

C.

demonstrate commitment to IT governance.

D.

clarify the cause-and-effect relationship of the strategy.

Buy Now
Questions 153

An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?

Options:

A.

Granting access to information based on information architecture

B.

Engaging an audit of logical access controls and related security policies

C.

Implementing multi-factor authentication controls

D.

Authenticating access to information assets based on roles or business rules

Buy Now
Questions 154

An enterprise is developing an ethics program, and the ethical standards have been defined. Which of the following should the enterprise do NEXT?

Options:

A.

Establish a training and awareness program focused on ethics.

B.

Implement an enterprise-wide employee monitoring program.

C.

Develop key performance indicators (KPIs) for program implementation.

D.

Outline and document consequences for noncompliance.

Buy Now
Questions 155

An enterprise is approaching the escalation date of a major IT risk. The IT steering committee wants to ascertain who is responsible for the risk response. Where should the committee find this information?

Options:

A.

Resource management plan

B.

RACl chart

C.

Risk management plan

D.

Risk register

Buy Now
Questions 156

Which of the following should be the FIRST action taken by a newly formed IT governance committee to ensure reports are compliant with regulations and identify key IT risks?

Options:

A.

Direct the development of a reporting communication plan.

B.

Develop and monitor IT key risk indicator (KRI) triggers.

C.

Train end users on regulation requirements.

D.

Implement a mechanism to ensure reporting escalation.

Buy Now
Questions 157

Which of the following would be the BEST long-term solution to address the concern regarding loss of experienced staff?

Options:

A.

implement knowledge management practices

B.

Establish a mentoring program for IT staff

C.

Determine key risk indicators (KRIs)

D.

Retain key staff as consultants.

Buy Now
Questions 158

Which of the following should be the PRIMARY goal of implementing an IT strategic planning process?

Options:

A.

Determining benefits from IT deployments

B.

Optimizing IT resources to drive innovation

C.

Directing business strategy to achieve goals

D.

Translating business needs into IT initiatives

Buy Now
Questions 159

When assessing the impact of a new regulatory requirement, which of the following should be the FIRST course of action?

Options:

A.

Update affected IT policies.

B.

Assess the budget impact of the new regulation.

C.

Map the regulation to business processes.

D.

Implement new regulatory requirements.

Buy Now
Questions 160

Following the rollout of an enterprise IT software solution that hosts sensitive data it was discovered that the application's role-based access control was not functioning as specified Which of the following is the BEST way to prevent reoccurrence in the future?

Options:

A.

Ensure supplier contracts include penalties if solutions do not meet functional requirements

B.

Ensure the evaluation process requires independent assessment of solutions prior to implementation

C.

Ensure supplier contracts include a provision for the right to audit on an annual basis

D.

Ensure procurement processes require the identification of alternate vendors to ensure business continuity.

Buy Now
Questions 161

Which of the following is the MOST important input for the development of a human resources strategy to address IT skill gaps?

Options:

A.

Training budget allocated for IT staff

B.

Training effectiveness reports

C.

Technology direction of the enterprise

D.

A recent IT skills matrix

Buy Now
Questions 162

The CIO of a large enterprise has taken the necessary steps to align IT objectives with business objectives. What is the BEST way for the CIO to ensure these objectives are delivered effectively by IT staff?

Options:

A.

Map the IT objectives to an industry-accepted framework.

B.

Enhance Ihe budget for training based on the IT objectives.

C.

Include the IT objectives in staff performance plans.

D.

Include CIO sign-off of the objectives as part of the IT strategic plan.

Buy Now
Questions 163

Following a re-prioritization of business objectives by management, which of the following should be performed FIRST to allocate resources to IT processes?

Options:

A.

Perform a maturity assessment.

B.

Implement a RACI model.

C.

Refine the human resource management plan.

D.

Update the IT strategy.

Buy Now
Questions 164

IT security is concerned with employees' increasing use of personal equipment for work-related purposes, while employees claim it allows them to be more productive. A decision on whether to modify the enterprise information security policy should be based on:

Options:

A.

audit findings.

B.

user access approval procedures.

C.

the impact to security.

D.

a risk and benefit evaluation.

Buy Now
Questions 165

Which of the following is the MOST important aspect of business ethics?

Options:

A.

Ensuring fair and consistent vendor management practices

B.

Providing equal opportunities to employees

C.

Protecting stakeholders' interests

D.

Complying with legal and regulatory requirements

Buy Now
Questions 166

Which of the following methods is MOST likely to be used to assess plausible risk scenarios that could result in reputational risk to the enterprise?

Options:

A.

Controls gap analysis

B.

Qualitative analysis

C.

Quantitative analysis

D.

SWOT analysis

Buy Now
Questions 167

Which of the following is a PRIMARY responsibility of the CIO when an enterprise plans to replace its enterprise resource applications?

Options:

A.

Reviewing the IT application portfolio

B.

Evaluating and selecting application vendors

C.

Ensuring IT architecture requirements are considered

D.

Establishing software quality criteria

Buy Now
Questions 168

To minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations which of the following is the BEST action to take?

Options:

A.

Update the information architecture

B.

Revise the IT strategic plan

C.

Implement data loss prevention (DLP)

D.

Establish new IT key risk indicators (KRIs)

Buy Now
Questions 169

Of the following, who should approve the criteria for information quality within an enterprise?

Options:

A.

Information architect

B.

Information analyst

C.

Information steward

D.

Information owner

Buy Now
Questions 170

IT senior management is concerned that IT service levels consistently fall below those outlined in the service level agreement (SLA). Which of the following would BEST enable the CIO to build a corrective action plan?

Options:

A.

Assessing the impact of the SLA failure

B.

Conducting an IT performance evaluation

C.

Reviewing the IT staff training plan

D.

Performing a root cause analysis

Buy Now
Questions 171

To ensure that information can be traced to the originating event and accountable parties, an enterprise should FIRST:

Options:

A.

capture source information and supporting evidence.

B.

improve business process controls.

C.

review information event logs tor potential incidents.

D.

review retention requirements for source information.

Buy Now
Questions 172

A large enterprise has been experiencing high turnover of skilled IT personnel, resulting in a significant loss of knowledge within the IT department. Which of the following is the BEST governance action to address this concern?

Options:

A.

Update the IT resource management plan.

B.

Revise IT strategic objectives.

C.

Update IT employee compensation packages.

D.

Mandate the use of employee contracts.

Buy Now
Questions 173

Which of the following is MOST important for an enterprise to review when classifying information assets?

Options:

A.

Procedures for information handling

B.

Requirements for information retention.

C.

Media used for storage and backup

D.

Impact of information exposure

Buy Now
Questions 174

An IT governance committee is defining a risk management policy for a portfolio of IT-enabled investments Which of the following should be the PRIMARY consideration when developing the policy?

Options:

A.

Risk management framework

B.

Possible investment failures

C.

Value obtained with minimum risk

D.

Risk appetite of the enterprise

Buy Now
Questions 175

Which of the following is the MOST important driver of IT governance?

Options:

A.

Effective internal controls

B.

Management transparency

C.

Quality measurement

D.

Technical excellence

Buy Now
Questions 176

A board of directors wants to ensure the enterprise is responsive to changes in its environment that would directly impact critical business processes. Which of the following will BEST facilitate meeting this objective?

Options:

A.

Scheduling frequent threat analyses

B.

Monitoring key risk indicators (KRIs)

C.

Regularly reviewing the enterprise risk appetite

D.

Implementing a competitive intelligence tool

Buy Now
Questions 177

A large organization with branches across many countries is in the midst of an enterprise resource planning (ERP) transformation. The IT organization receives news that the branches in a country where the impact to the enterprise is to be greatest are being sold. What should be the NEXT step?

Options:

A.

Update the ERP business case and re-evaluate the ROI.

B.

Cancel the ERP transformation and re-allocate project funds.

C.

Adjust the ERP implementation plan and budget.

D.

Continue with the ERP migration according to plan.

Buy Now
Questions 178

An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee's PRIMARY concern?

Options:

A.

Revising the business $ balanced store card

B.

Updating the business risk profile

C.

Changing the IT steering committee charter

D.

Calculating the cost of the current solution

Buy Now
Questions 179

Which of the following is the MOST valuable input when quantifying the loss associated with a major risk event?

Options:

A.

Key risk indicators (KRIs)

B.

IT environment threat modeling

C.

Business impact analysis (BIA) report

D.

Recovery time objectives (RTOs)

Buy Now
Questions 180

An enterprise's service center is experiencing long delays in fulfilling! T service requests and very low customer satisfaction. The BEST way to determine if staff competency is the root cause of these performance problems is to compare required staff competencies with:

Options:

A.

certification requirements.

B.

current skills inventory.

C.

training program completions.

D.

hiring and staffing practices.

Buy Now
Questions 181

Which of the following is PRIMARILY achieved through performance measurement?

Options:

A.

Process improvement

B.

Transparency

C.

Cost efficiency

D.

Benefit realization

Buy Now
Questions 182

Who is PRIMARILY accountable for delivering the benefits of an IT-enabled investment program to the enterprise?

Options:

A.

Program manager

B.

IT steering committee chair

C.

CIO

D.

Business sponsor

Buy Now
Questions 183

It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs. Which of the following would be MOST helpful to address this concern?

Options:

A.

Enterprise architecture (EA)

B.

Enterprise risk framework

C.

IT service management

D.

IT project roadmap

Buy Now
Questions 184

Which of the following is the MOST effective way to manage risks within the enterprise?

Options:

A.

Assign individuals responsibilities and accountabilities for management of risks.

B.

Make staff aware of the risks in their area and risk management techniques.

C.

Provide financial resources for risk management systems.

D.

Document procedures and reporting processes.

Buy Now
Questions 185

An IT investment review board wants to ensure that IT will be able to support business initiatives. Each initiative is comprised of several interrelated IT projects. Which of the following would help ensure that the initiatives meet their goals?

Options:

A.

Review of project management methodology

B.

Review of the business case for each initiative

C.

Establishment of portfolio management

D.

Verification of initiatives against the architecture

Buy Now
Questions 186

The MOST successful IT performance metrics are those that:

Options:

A.

measure financial results.

B.

measure all areas.

C.

are approved by the stakeholders.

D.

contain objective measures.

Buy Now
Questions 187

Two large financial institutions with different corporate cultures are engaged in a merger. From a governance perspective, which of the following should be the GREATEST concern?

Options:

A.

Technology infrastructure

B.

Risk appetite

C.

Combined cost of operations

D.

Enterprise architecture (EA) integration

Buy Now
Questions 188

The MOST important aspect of an IT governance framework to ensure that IT supports repeatable business processes is:

Options:

A.

earned value management.

B.

quality management,

C.

resource management.

D.

risk management

Buy Now
Questions 189

A regulatory audit assessed an enterprise's main transactional application as noncompliant. In addition to fines and required corrections, an agreement was reached to implement a set of governance controls over IT. Accountability for these controls is BEST assigned to which of the following?

Options:

A.

CIO

B.

Internal audit director

C.

Application users

D.

The board of directors

Buy Now
Questions 190

An IT audit report indicates that a lack of IT employee risk awareness is creating serious security issues in application design and configuration. Which of the following would be the BEST key risk indicator (KRI) to show progress in IT employee behavior?

Options:

A.

Number of IT employees attending security training sessions

B.

Results of application security testing

C.

Number of reported security incidents

D.

Results of application security awareness training quizzes

Buy Now
Questions 191

An enterprise's information security function is making changes to its data retention and backup policies. Which of the following presents the GREATEST risk?

Options:

A.

Business data owners were not consulted.

B.

The new policies Increase the cost of data backups.

C.

Data backups will be hosted at third-party locations.

D.

The retention period for data backups is Increased.

Buy Now
Questions 192

The PRIMARY benefit of integrating IT resource planning into enterprise strategic planning is that it enables the enterprise to:

Options:

A.

allocate resources efficiently to achieve desired goals.

B.

adjust business goals depending upon resource availability.

C.

prioritize resource allocation based on sourcing strategy.

D.

develop tactical plans to achieve resource optimization.

Buy Now
Questions 193

Of the following, who should be responsible for ensuring the regular review of quality management performance against defined quality metrics?

Options:

A.

Process owners

B.

Risk management team

C.

Internal auditors

D.

Executive management

Buy Now
Questions 194

The CIO of an enterprise learns the payroll server of a competitor has been the victim of ransomware. To help plan for the possibility of ransomed corporate data, what should be the ClO's FIRST course of action?

Options:

A.

Require development of key risk indicators (KRls).

B.

Develop a policy to address ransomware.

C.

Request a targeted risk assessment.

D.

Back up corporate data to a secure location.

Buy Now
Questions 195

Which of the following is the MOST effective means for IT management to report to executive management regarding the value of IT?

Options:

A.

IT process maturity level

B.

Cost-benefit analysis

C.

Resource assessment

D.

Balanced scorecard

Buy Now
Questions 196

Which of the following is the MOST important reason for selecting IT key risk indicators (KRIs)?

Options:

A.

Demonstrating the effectiveness of IT risk policies

B.

Assessing the current IT controls model

C.

Enabling comparison against similar IT KRIs

D.

Increasing the probability of achieving IT goals

Buy Now
Questions 197

Which of the following is MOST important for the effective design of an IT balanced scorecard?

Options:

A.

On-demand reporting and continuous monitoring

B.

Consulting with the CIO

C.

Emphasizing the financial results

D.

Identifying appropriate key performance indicators (KPls)

Buy Now
Questions 198

Which of the following should be the MOST important consideration when defining an information architecture?

Options:

A.

Frequency and quantity of information updates

B.

Information to justify business cases

C.

Incorporation of emerging technologies

D.

Access to and exchange of information

Buy Now
Questions 199

Which of the following aspects of the transition from X-rays to digital images would be BEST addressed by implementing information security policy and procedures?

Options:

A.

Establishing data retention procedures

B.

Training technicians on acceptable use policy

C.

Minimizing the impact of hospital operation disruptions on patient care

D.

Protecting personal health information

Buy Now
Questions 200

Which of the following is the MOST effective approach to ensure senior management sponsorship of IT risk management?

Options:

A.

Benchmark risk framework against best practices.

B.

Calculate financial impact for each IT risk finding.

C.

Periodically review the IT risk register entries.

D.

Integrate IT risk into enterprise risk management (ERM).

Buy Now
Questions 201

Which of the following roles has PRIMARY accountability for the security related to data assets?

Options:

A.

Database administrator

B.

Data owner

C.

Data analyst

D.

Security architect

Buy Now
Questions 202

Which of the following should be the MAIN governance focus when implementing a newly approved bring your own device (BYOD) policy?

Options:

A.

Recommending mobile applications that will increase business productivity

B.

Training employees on the enterprise's chosen mobile device management system

C.

Educating employees on the increased IT security risk to the enterprise

D.

Understanding knowledge gaps of IT employees to support different mobile platforms

Buy Now
Questions 203

From a governance perspective, which of the following roles is MOST important for an enterprise to keep in-house?

Options:

A.

Information auditor

B.

Information architect

C.

Information steward

D.

Information analyst

Buy Now
Questions 204

Which of the following is the MOST comprehensive method to report on overall IT performance to the board of directors?

Options:

A.

Balanced scorecard

B.

Net present value (NPV)

C.

Performance-based payments

D.

Return on investment (ROI)

Buy Now
Exam Code: CGEIT
Exam Name: Certified in the Governance of Enterprise IT Exam
Last Update: Jul 27, 2025
Questions: 682

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CGEIT testing engine

PDF (Q&A)

$36.75  $104.99
buy now CGEIT pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 31 Jul 2025