ISACA CGEIT ISACA CGEIT Certification Practice Test Online Training
ISACA CGEIT Online Training
The questions for CGEIT were last updated at Nov 22,2024.
- Exam Code: CGEIT
- Exam Name: ISACA CGEIT Certification Practice Test
- Certification Provider: ISACA
- Latest update: Nov 22,2024
An enterprise has decided to utilize a cloud vendor for the first time to provide email as a service, eliminating in-house email capabilities.
Which of the following IT strategic actions should be triggered by this decision?
- A . Develop a data protection awareness education training program.
- B . Monitor outgoing email traffic for malware.
- C . Implement a data classification and storage management tool.
- D . Update and communicate data storage and transmission policies.
Which of the following components of a policy BEST enables the governance of enterprise IT?
- A . Disciplinary actions
- B . Regulatory requirements
- C . Roles and responsibilities
- D . Terms and definitions
An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider.
Which of the following should be the IT steering committee’s PRIMARY concern?
- A . Revising the business $ balanced storecard
- B . Updating the business risk profile
- C . Changing the IT steering committee charter
- D . Calculating the cost of the current solution
An IT investment review board wants to ensure that IT will be able to support business initiatives. Each initiative is comprised of several interrelated IT projects.
Which of the following would help ensure that the initiatives meet their goals?
- A . Review of project management methodology
- B . Review of the business case for each initiative
- C . Establishment of portfolio management
- D . Verification of initiatives against the architecture
It has been discovered that multiple business units across an enterprise are using duplicate IT applications and services to fulfill their individual needs.
Which of the following would be MOST helpful to address this concern?
- A . Enterprise architecture (EA)
- B . Enterprise risk framework
- C . IT service management
- D . IT project roadmap
Results of an enterprise’s customer survey indicate customers prefer using mobile applications. However, this same survey shows the enterprise’s mobile applications are considered inferior compared to legacy browser-based applications.
Which of the following should be the FIRST step in creating an effective long-term mobile application strategy?
- A . Establish service level agreements (SLAs) with the development team.
- B . Identify key risks and mitigation strategies for mobile applications.
- C . Implement key performance indicators (KPIs) that include application quality.
- D . Identify business requirements concerning mobile applications.
Which of the following is the GREATEST impact to an enterprise that has ineffective information architecture?
- A . Poor desktop service delivery
- B . Data retention
- C . Redundant systems
- D . Poor business decisions
Of the following, who should be responsible for ensuring the regular review of quality management performance against defined quality metrics?
- A . Process owners
- B . Risk management team
- C . Internal auditors
- D . Executive management
An enterprise experiencing issues with data protection and least privilege is implementing enterprise-wide data encryption in response.
Which of the following is the BEST approach to ensure all business units work toward remediating these issues?
- A . Develop key performance indicators (KPIs) to measure enterprise adoption.
- B . Integrate data encryption requirements into existing and planned projects.
- C . Assign owners for data governance initiatives.
- D . Mandate the creation of a data governance framework.
Senior management wants to promote investment in IT, but is uncertain that associated risks are being properly identified.
The BEST way to address this concern is to:
- A . engage an external consultant to develop risk scenarios.
- B . appoint an IT representative to the business risk committee.
- C . assign an IT cost controller to the finance department.
- D . ensure business cases are developed by IT.