Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Go to page:
Question # 105

Two large financial institutions with different corporate cultures are engaged in a merger. From a governance perspective, which of the following should be the GREATEST concern?

A.

Technology infrastructure

B.

Risk appetite

C.

Combined cost of operations

D.

Enterprise architecture (EA) integration

Full Access
Question # 106

Which of the following is MOST important when an IT-enabled business initiative involves multiple business functions?

A.

Defining cross-departmental budget allocation

B.

Conducting a systemic risk assessment

C.

Developing independent business cases

D.

Establishing a steering committee with business representation

Full Access
Question # 107

Which of the following is the MOST effective way to manage risks within the enterprise?

A.

Assign individuals responsibilities and accountabilities for management of risks.

B.

Make staff aware of the risks in their area and risk management techniques.

C.

Provide financial resources for risk management systems.

D.

Document procedures and reporting processes.

Full Access
Question # 108

A global financial enterprise has been experiencing a substantial number of information security incidents that have directly affected its business reputation. Which of the following should be the IT governance board's FIRST course of action?

A.

Require revisions to how security incidents are managed by the IT department.

B.

Request an IT security assessment to identify the main security gaps.

C.

Execute an IT maturity assessment of the security process.

D.

Mandate an update to the enterprise's IT security policy.

Full Access
Question # 109

Which of the following would BEST help to improve an enterprise's ability to manage large IT investment projects?

A.

Creating a change management board

B.

Reviewing and evaluating existing business cases

C.

Implementing a review and approval process for each phase

D.

Publishing the IT approval process online for wider scrutiny

Full Access
Question # 110

An enterprise has decided to utilize a cloud vendor for the first time to provide email as a service, eliminating in-house email capabilities. Which of the following IT strategic actions should be triggered by this decision?

A.

Develop a data protection awareness education training program.

B.

Monitor outgoing email traffic for malware.

C.

Implement a data classification and storage management tool.

D.

Update and communicate data storage and transmission policies.

Full Access
Question # 111

Which of the following is the MOST significant challenge faced by an enterprise when establishing information stewardship?

A.

Lack of documented policies and procedures

B.

Information requirements of regulatory authorities

C.

Insufficient knowledge of IT practices and controls

D.

Lack of role clarity and specific responsibilities

Full Access
Question # 112

Which of the following is the BEST way to implement effective IT risk management?

A.

Align with business risk management processes.

B.

Establish a risk management function.

C.

Minimize the number of IT risk management decision points.

D.

Adopt risk management processes.

Full Access
Go to page: