Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Searching for workable clues to ace the Isaca CGEIT Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CGEIT PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 177

A recent benchmarking analysis has indicated an IT organization is retaining more data and spending significantly more on data retention than its competitors. Which of the following would BEST ensure the optimization of retention costs?

A.

Requiring that all business cases contain data deletion and retention plans

B.

Revalidating the organization's risk tolerance and re-aligning the retention policy

C.

Moving all high-risk and medium-risk data backups to cloud storage

D.

Redefining the retention policy to align with industry best practices

Full Access
Question # 178

An enterprise learns that a new privacy regulation was recently published to protect customers in the event of a breach involving personally identifiable information (Pll). The IT risk management team's FIRST course of action should be to:

A.

evaluate the risk appetite for the new regulation.

B.

define the risk tolerance for the new regulation.

C.

determine if the new regulation introduces new risk.

D.

assign a risk owner for the new regulation.

Full Access
Question # 179

Before an IT strategy committee can approve an IT risk assessment framework, which of the following is MOST important to have established?

A.

An enterprise risk mitigation strategy

B.

Leading and lagging risk indicators

C.

IT performance metrics and standards

D.

Enterprise definitions for risk impact and probability

Full Access
Question # 180

A company is considering selling products online, and the CIO has been asked to advise the board of directors of potential problems with this strategy. Which of the following is the ClO's BEST course of action?

A.

Review the security framework.

B.

Conduct a return on investment (ROI) analysis.

C.

Review the enterprise architecture (EA).

D.

Perform a risk assessment.

Full Access
Question # 181

Senior management wants to expand offshoring to include IT services as other types of business offshoring have already resulted in significant financial benefits for the enterprise. The CIO is currently midway through a successful five-year strategy that relies heavily on internal IT resources. What should the CIO do NEXT?

A.

Reevaluate the offshoring strategy.

B.

Abandon the current IT strategy.

C.

Continue with the existing IT strategy.

D.

Reevaluate the current IT strategy.

Full Access
Question # 182

When implementing an IT governance framework, which of the following would BEST ensure acceptance of the framework?

A.

Factoring in the effects of enterprise culture

B.

Using subject matter experts

C.

Using industry-accepted practices

D.

Complying with regulatory requirements

Full Access
Question # 183

The IT program manager does not see the value of conducting risk assessments for a new major IT project. The manager is reluctant to cooperate with internal auditors and the newly formed steering committee. Midway through the project, program requirements were changed because the CEO is a friend of a vendor and wants to implement this vendor's new technology. This decision will cause the current IT program budget to be insufficient and will be shown as overspending.

After the requirement change request, the IT program manager should FIRST:

A.

obtain confirmation from the business and a decision by the steering committee.

B.

request additional funding from the business owner to cover the additional scope.

C.

report the matter to internal audit as a program deviation to be reviewed.

D.

align IT with the business and agree to the business request.

Full Access
Question # 184

A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?

A.

Mitigate and track data-related issues and risks.

B.

Modify legal and regulatory data requirements.

C.

Define data protection and privacy practices.

D.

Assess the information governance framework.

Full Access
Go to page: