Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CGEIT - Certified in the Governance of Enterprise IT Exam

Page: 2 / 14
Total 682 questions

An enterprise has well-designed procurement and vendor risk management policies that are intended to prevent biased decision-making. However, a pattern of ethical violations indicates that vendor selection may have been inappropriately influenced by non-work-related incentives provided to decision makers. Which of the following should be done FIRST in response to this issue?

A.

Revise the procurement and vendor risk management policies.

B.

Conduct a root cause analysis and remediate based on findings.

C.

Document the critical success factors (CSFs) for the procurement policies.

D.

Establish and communicate strict penalties for biased vendor selection.

Which of the following is the FIRST step when developing an IT risk management framework?

A.

Promoting a culture of risk awareness

B.

Establishing a risk control library

C.

Aligning to enterprise risk management (ERM)

D.

Establishing risk appetite

Which of the following BEST provides an enterprise with greater insight into its environmental, social, and governance (ESG) metrics?

A.

Audit committee oversight

B.

Benchmarking against similar industries

C.

Collaborative tools and approaches

D.

Customer satisfaction surveys

An enterprise has an ongoing issue of corporate applications not delivering the expected benefits due to missing key functionality. As a result, many groups are using spreadsheets and databases instead of approved enterprise applications to store and manipulate information. Which of the following will BEST improve the success rate of future IT initiatives?

A.

Engage the business user community in acceptance testing Of acquired applications.

B.

Engage stakeholders to identify and validate business requirements.

C.

Establish a process for risk and value management.

D.

Prohibit the use of non-approved alternate software solutions.

An organization has decided to integrate IT risk with the enterprise risk management (ERM) framework. The FIRST step to enable this integration is to establish:

A.

a common risk management taxonomy.

B.

a common risk organization.

C.

common key risk indicators (KRIs).

D.

common risk mitigation strategies.

When establishing a comprehensive approach for analyzing IT risk in an international, multi-division enterprise, it is MOST important to ensure:

A.

Risk management methodologies are aligned with local best practices.

B.

IT senior managers perform the analysis.

C.

Risk scenarios are compartmentalized by division.

D.

A consistent risk management methodology is used.

A newly appointed CIO is concerned that IT is too reactive and wants to ensure IT adds value to the enterprise by proactively anticipating business needs. Which of the following will BEST contribute to meeting this objective?

A.

Incorporating IT planning into the enterprise strategic planning process

B.

Implementing an IT portfolio management framework

C.

Involving more IT representation in strategic business case reviews

D.

Including IT management within the program management office

Which of the following roles is directly responsible for information quality?

A.

Information custodian

B.

Information steward

C.

Information analyst

D.

Information owner

Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application. Which of the following is the BEST way to increase the chances of a successful delivery?

A.

Implement a release and deployment plan

B.

Ask the application owner to update the risk register

C.

Create a baseline configuration of the new application

D.

Perform user acceptance testing (UAT)

A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:

confirm process owners' acceptance of residual risk.

perform an internal and external network penetration test.

obtain IT security approval on security policy exceptions.

A.

benchmark policy against industry best practice.

A publicly traded enterprise wants to demonstrate that its board of directors is providing adequate strategic oversight of IT. Which of the following BEST supports this objective?

A.

Annual IT governance communication to all staff.

B.

Press releases targeted at large investors.

C.

Inclusion of IT governance reporting in the annual report.

D.

Annual presentation of IT performance metrics.

When developing IT risk management policies and standards, it is MOST important to align them with:

A.

The corporate risk culture

B.

The enterprise risk management (ERM) framework

C.

Enterprise goals and objectives

D.

Best practices for IT risk management

An enterprise recently implemented a significant change in its business strategy by moving to a technologically advanced product with considerable impact on the business. What should be the FINAL step in completing the changes to IT processes?

A.

Updating the configuration management database (CMDB)

B.

Empowering the business to embrace the changes

C.

Ensuring a return to stabilized business operations

D.

Updating the enterprise architecture (EA)

Which of the following is the GREATEST consideration when evaluating whether to comply with the new carbon footprint regulations impacted by blockchain technology?

A.

The enterprise's organizational structure

B.

The enterprise's risk appetite

C.

The current IT process capability maturity

D.

The IT strategic plan

An enterprise plans to implement a business intelligence tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

A.

Interface issues between enterprise and business intelligence applications.

B.

The need for staff to be trained on the new business intelligence tool.

C.

Large volumes of data fed from enterprise applications.

D.

Data definition and mapping sources from applications.