Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Searching for workable clues to ace the Isaca CGEIT Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CGEIT PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

Which of the following BEST enables effective enterprise risk management (ERM)?

A.

Risk register

B.

Risk ownership

C.

Risk tolerance

D.

Risk training

Full Access
Question # 34

Which of the following is the BEST way to express the value of financial investments in cybersecurity?

A.

Payback period

B.

Cost-benefit analysis

C.

Net present value (NPV)

D.

Internal rate of return (IRR)

Full Access
Question # 35

An enterprise learns that some of its business divisions have been approaching technology vendors for cloud services, resulting in duplicate support contracts and underutilization of IT services. Which of the following should be done FIRST to address this issue?

A.

Review the enterprise IT procurement policy.

B.

Re-negotiate contracts with vendors to request discounts.

C.

Require updates to the IT procurement process.

D.

Conduct an audit to investigate utilization of cloud services.

Full Access
Question # 36

A series of cyber events impacting internet-facing business services has been successfully contained. To minimize future business risk exposure, which of the following should the board require of the IT team?

A.

Review the internet service provider (ISP) contract.

B.

Purchase cybersecurity insurance.

C.

Conduct a business impact analysis (BIA).

D.

Perform a root cause analysis.

Full Access
Question # 37

A CIO engages a consulting firm to conduct a benchmark analysis of the organization’s IT governance framework against industry best practices. Several recommendations to improve the maturity of the framework are identified. Which of the following should be the CIO's NEXT course of action?

A.

Develop a plan to integrate the recommendations

B.

Appoint a project manager to implement the recommendations

C.

Obtain approval from the IT steering committee to implement the recommendations

D.

Evaluate the feasibility of the recommendations

Full Access
Question # 38

Which of the following would BEST enable an enterprise to ensure selected cloud vendors meet stringent regulatory requirements?

A.

Stage gate reviews

B.

Risk assessment

C.

Internal audit report

D.

Third-party audit reports

Full Access
Question # 39

Which of the following is the GREATEST benefit of using the life cycle approach to govern information assets?

A.

Information availability is improved.

B.

Operational costs are maintained.

C.

Compliance with regulatory requirements is ensured.

D.

Overall costs are optimized.

Full Access
Question # 40

An enterprise is concerned that ongoing maintenance costs are not being considered when prioritizing IT-enabled business investments. Which of the following should be the enterprise's FIRST course of action?

A.

Implement a balanced scorecard for the IT project portfolio.

B.

Establish a portfolio manager role to monitor and control the IT projects.

C.

Require business cases to have product life cycle information.

D.

Mandate an enterprise architecture (EA) review with business stakeholders.

Full Access
Go to page: