Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Go to page:
Question # 145

Which of the following is the BEST way to ensure the continued usefulness of IT governance reports for stakeholders?

A.

Conduct quarterly audits and adjust reporting based on findings.

B.

Establish a standard process for providing feedback.

C.

Rely on IT leaders to advise when adjustments should be made.

D.

Issue frequent service level satisfaction surveys.

Full Access
Question # 146

An enterprise experiencing issues with data protection and least privilege is implementing enterprise-wide data encryption in response. Which of the following is the BEST approach to ensure all business units work toward remediating these issues?

A.

Develop key performance indicators (KPIs) to measure enterprise adoption.

B.

Integrate data encryption requirements into existing and planned projects.

C.

Assign owners for data governance initiatives.

D.

Mandate the creation of a data governance framework.

Full Access
Question # 147

Which of the following is the BEST approach when reviewing The security status of a new business acquisition?

A.

Embed IT risk management strategies in service level agreements (SLAs).

B.

Establish a committee to oversee the alignment of IT security in new businesses.

C.

Incorporate IT security objectives to cover additional risks associated with new businesses.

D.

Integrate IT risk assessment into the overall due diligence process.

Full Access
Question # 148

An enterprise made a significant change to its business operating model that resulted in a new strategic direction. Which of the following should be reviewed FIRST to ensure IT congruence with the new business strategy?

A.

IT risk appetite

B.

Enterprise project management framework

C.

IT investment portfolio

D.

Information systems architecture

Full Access
Question # 149

An enterprise has a zero-tolerance policy regarding security. This policy is causing a large number of email attachments to be blocked and is a disruption to enterprise. Which of the following should be the FIRST governance step to address this email issue?

A.

Direct the development of an email usage policy.

B.

Obtain senior management input based on identified risk.

C.

Recommend business sign-off on the zero-tolerance policy.

D.

Introduce an exception process.

Full Access
Question # 150

When updating an IT governance framework to support an outsourcing strategy, which of the following is MOST important?

A.

Evaluating the choice of underlying technology platforms used by the service provider

B.

Ensuring the outsource provider's IT function is aligned with its business function

C.

Verifying the vendor has developed standard operation procedures for outsourced functions

D.

Ensuring the effective management of contracts with third-party providers

Full Access
Question # 151

Which of the following is the MOST appropriate mechanism for measuring overall IT organizational performance?

A.

IT portfolio return on investment (ROI)

B.

Maturity model

C.

IT balanced scorecard

D.

Service level metrics

Full Access
Question # 152

The PRIMARY objective of IT resource planning within an enterprise should be to:

A.

determine risk associated with IT resources.

B.

maximize value received from IT.

C.

determine IT outsourcing options.

D.

finalize service level agreements (SLAs) for IT

Full Access
Go to page: