Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Go to page:
Question # 9

An audit department recently uncovered a series of security breaches. It was determined that network intrusion detection logs were recording the suspicious activity, but IT staff were not reviewing logs due to competing business demands. To address this situation, the IT steering committee’s FIRST priority should be:

A.

A re-prioritization of IT projects to address critical needs

B.

Updating the RACI chart to establish responsibility

C.

The hiring of additional staff to cope with the demand

D.

An assessment of the capacity of current resources

Full Access
Question # 10

Which of the following should be considered FIRST when migrating data to a cloud environment?

A.

Disaster recovery plan (DRP).

B.

Skills matrix.

C.

Information architecture.

D.

Data structure.

Full Access
Question # 11

An enterprise learns that some of its business divisions have been approaching technology vendors for cloud services, resulting in duplicate support contracts and underutilization of IT services. Which of the following should be done FIRST to address this issue?

A.

Review the enterprise IT procurement policy.

B.

Re-negotiate contracts with vendors to request discounts.

C.

Require updates to the IT procurement process.

D.

Conduct an audit to investigate utilization of cloud services.

Full Access
Question # 12

Which of the following is the BEST way to express the value of financial investments in cybersecurity?

A.

Payback period

B.

Cost-benefit analysis

C.

Net present value (NPV)

D.

Internal rate of return (IRR)

Full Access
Question # 13

A newly appointed CIO is concerned that IT is too reactive and wants to ensure IT adds value to the enterprise by proactively anticipating business needs. Which of the following will BEST contribute to meeting this objective?

A.

Incorporating IT planning into the enterprise strategic planning process

B.

Implementing an IT portfolio management framework

C.

Involving more IT representation in strategic business case reviews

D.

Including IT management within the program management office

Full Access
Question # 14

Which of the following is the GREATEST benefit of using the life cycle approach to govern information assets?

A.

Information availability is improved.

B.

Operational costs are maintained.

C.

Compliance with regulatory requirements is ensured.

D.

Overall costs are optimized.

Full Access
Question # 15

An enterprise plans to implement a business intelligence tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

A.

Interface issues between enterprise and business intelligence applications.

B.

The need for staff to be trained on the new business intelligence tool.

C.

Large volumes of data fed from enterprise applications.

D.

Data definition and mapping sources from applications.

Full Access
Question # 16

Which of the following is the BEST way to manage the risk associated with outsourcing critical IT services?

A.

Ensure vendors hold information security certifications.

B.

Define controls within service level agreements (SLAs).

C.

Conduct quarterly performance reviews.

D.

Ensure exit clauses are added to the contract.

Full Access
Go to page: