Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Searching for workable clues to ace the Isaca CGEIT Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CGEIT PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 201

Which of the following is the MOST valuable input when quantifying the loss associated with a major risk event?

A.

Key risk indicators (KRIs)

B.

IT environment threat modeling

C.

Business impact analysis (BIA) report

D.

Recovery time objectives (RTOs)

Full Access
Question # 202

An enterprise is planning to replace multiple enterprise resource planning (ERP) systems at various regions with one company-wide ERP system. The main objective of this change is to achieve economies of scale efficiencies resulting in cost reductions. To meet this objective, what is the BEST approach in the planning phase of the project?

A.

Implement an ERP system on shared resources with the lowest cost.

B.

Minimize customization by standardizing ERP processes across regions.

C.

Adopt a best in breed web-based architecture for the ERP system.

D.

Use a service provider to evaluate and implement the new ERP processes.

Full Access
Question # 203

Which of the following is the GREATEST expected strategic organizational benefit from the standardization of technical platforms?

A.

Reduces IT operational training costs

B.

Reduces response time

C.

Optimizes infrastructure investments

D.

Meets regulatory compliance requirements

Full Access
Question # 204

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Full Access
Question # 205

Which of the following is MOST important to have in place to ensure a business continuity plan (BCP) can be executed?

A.

Defined roles.

B.

Replicated systems.

C.

A risk register.

D.

Budget allocation.

Full Access
Question # 206

Which of the following is the BEST indicator of the effectiveness of IT governance in an enterprise?

A.

Value delivery

B.

Resource utilization

C.

Residual risk

D.

Project delivery

Full Access
Question # 207

An audit department recently uncovered a series of security breaches. It was determined that network intrusion detection logs were recording the suspicious activity, but IT staff were not reviewing logs due to competing business demands. To address this situation, the IT steering committee’s FIRST priority should be:

A.

A re-prioritization of IT projects to address critical needs

B.

Updating the RACI chart to establish responsibility

C.

The hiring of additional staff to cope with the demand

D.

An assessment of the capacity of current resources

Full Access
Go to page: