Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Searching for workable clues to ace the Isaca CGEIT Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CGEIT PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 113

Establishing a uniform definition for likelihood and impact BEST enables an enterprise to:

A.

reduce variance in the assessment of risk.

B.

develop key risk indicators (KRIs).

C.

prioritize threat assessment.

D.

reduce risk appetite and tolerance levels.

Full Access
Question # 114

Which of the following is MOST important to document for a business ethics program?

A.

Guiding principles and best practices

B.

Violation response matrix

C.

Whistle-blower protection protocols.

D.

Employee awareness and training content

Full Access
Question # 115

Following a re-prioritization of business objectives by management, which of the following should be performed FIRST to allocate resources to IT processes?

A.

Perform a maturity assessment.

B.

Implement a RACI model.

C.

Refine the human resource management plan.

D.

Update the IT strategy.

Full Access
Question # 116

An enterprise has lost an unencrypted backup tape of archived customer data. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?

A.

Initiate disciplinary proceedings against relevant employees.

B.

Mandate a review of backup tape inventory procedures.

C.

Communicate the breach to customers.

D.

Require an evaluation of storage facility vendors.

Full Access
Question # 117

The PRIMARY benefit of using an IT service catalog as part of the IT governance program is that it.

A.

ensures IT effectively meets future business needs,

B.

provides a foundation for measuring IT performance,

C.

improves the ability to allocate IT resources

D.

establishes enterprise performance metrics per service

Full Access
Question # 118

Which of the following would BEST support an enterprise's initiative to incorporate desired organizational behaviors into the IT governance framework?

A.

Enterprise code of ethics

B.

Risk mitigation strategies and action plans

C.

Documented consequences for noncompliance

D.

Enterprise RACI matrix

Full Access
Question # 119

An enterprise has performed a business impact analysis (BIA) considering a number of risk scenarios Which of the following should the enterprise do NEXT?

A.

Perform a risk controls gap analysis

B.

Update the disaster recovery plan (DRP)

C.

Verify compliance with relevant legislation

D.

Assess risk mitigation strategies

Full Access
Question # 120

Which aspect of information governance BEST enables an enterprise to avoid duplication of records and promote consistency of data?

A.

Data loss prevention (DLP)

B.

Data modeling

C.

Blockchain management

D.

Enterprise architecture (EA)

Full Access
Go to page: