Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Searching for workable clues to ace the Isaca CGEIT Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CGEIT PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 193

An enterprise plans to expand into new markets in countries lacking data privacy regulations, increasing risk exposure. Which of the following is the BEST course of action for the CIO?

A.

Identify business risk appetite and tolerance levels.

B.

Quantify the risk impact and evaluate possible countermeasures.

C.

Limit the personal data available to the high-risk countries.

D.

Mandate the strengthening of user access controls.

Full Access
Question # 194

A business case indicates an enterprise would reduce costs by implementing a bring your own device (BYOD) program allowing employees to use personal devices for email. Which of the following should be the FIRST governance action?

A.

Assess the enterprise architecture (EA).

B.

Update the network infrastructure.

C.

Update the BYOD policy.

D.

Assess the BYOD risk.

Full Access
Question # 195

Which of the following components of a policy BEST enables the governance of enterprise IT?

A.

Disciplinary actions

B.

Regulatory requirements

C.

Roles and responsibilities

D.

Terms and definitions

Full Access
Question # 196

An enterprise's information security function is making changes to its data retention and backup policies. Which of the following presents the GREATEST risk?

A.

Business data owners were not consulted.

B.

The new policies Increase the cost of data backups.

C.

Data backups will be hosted at third-party locations.

D.

The retention period for data backups is Increased.

Full Access
Question # 197

Which of the following is the MOST important reason for selecting IT key risk indicators (KRIs)?

A.

Demonstrating the effectiveness of IT risk policies

B.

Assessing the current IT controls model

C.

Enabling comparison against similar IT KRIs

D.

Increasing the probability of achieving IT goals

Full Access
Question # 198

Which of the following is the MOST important consideration for data classification to be successfully implemented?

A.

Users should be provided with clear instructions that are easy to follow and understand.

B.

The data classification tools integrate with other tools that help manage the data.

C.

The classification scheme should be closely aligned with the IT strategic plan.

D.

Senior management should be properly trained in monitoring compliance.

Full Access
Question # 199

Which of the following MUST be established before implementing an information architecture that restricts access to data based on sensitivity?

A.

Risk and control frameworks

B.

Probability and impact analysis

C.

Classification and ownership

D.

Security and privacy policies

Full Access
Question # 200

Which of the following responsibilities should be retained within an enterprise when outsourcing a project management office (PMO) function?

A.

Selecting projects

B.

Managing projects

C.

Tracking project cost

D.

Defining project methodology

Full Access
Go to page: