Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Searching for workable clues to ace the Isaca CGEIT Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CGEIT PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 121

Which of the following is MOST important for an IT strategy committee to ensure before initiating the development of an IT strategic plan?

A.

Committee members are apprised of business needs

B.

A risk assessment has been conducted.

C.

Committee members are independent from business units.

D.

IT initiatives are fully supported by the business.

Full Access
Question # 122

A CIO of an enterprise is concerned that IT and the business have different priorities. Which of the following would BEST demonstrate the current state of strategic alignment?

A.

IT maturity model

B.

Business case

C.

Balanced scorecard

D.

IT investment status

Full Access
Question # 123

The CIO of a global technology company is considering introducing a bring your own device (BYOD) program. What should the CIO do FIRST?

A.

Ensure the infrastructure can meet BYOD requirements.

B.

Establish a business case.

C.

Define a clear and inclusive BYOD policy.

D.

Focus on securing data and access to data.

Full Access
Question # 124

An enterprise is planning to outsource data processing for personally identifiable information (Pll). When is the MOST appropriate time to define the requirements for security and privacy of information?

A.

When issuing requests for proposals (RFPs)

B.

After an assessment of the current information architecture.

C.

When developing service level agreements (SLAs)

D.

During the initial vendor selection process

Full Access
Question # 125

Of the following, who is PRIMARILY responsible for applying frameworks for the governance of IT to balance the need for security controls with business requirements?

A.

Data scientists

B.

Data stewards

C.

Data analysts

D.

Data processors

Full Access
Question # 126

Which of the following would be the BEST way for an IT steering committee to monitor the adoption of a new enterprise IT strategy?

A.

Establish key performance indicators (KPIs).

B.

Establish key risk indicators (KRIs).

C.

Schedule ongoing audit reviews.

D.

Implement service level agreements (SLAs)

Full Access
Question # 127

A new chief information officer (CIO) of an enterprise recommends implementing portfolio management after realizing there is no process in place for evaluating investments prior to selection. What should be the PRIMARY strategic goal driving this decision?

A.

Maximize value from the combined investments.

B.

Standardize processes for investment evaluation.

C.

Align investments to the enterprise architecture (EA).

D.

Enable transparency within the investment process.

Full Access
Question # 128

Which of the following is the MOST important reason to include internal audit as a stakeholder when establishing clear roles for the governance of IT?

A.

Internal audit has knowledge and technical expertise to advise on IT infrastructure.

B.

Internal audit is accountable for the overall enterprise governance of IT.

C.

Internal audit implements controls over IT risks and security.

D.

Internal audit provides input on relevant issues and control processes.

Full Access
Go to page: