ISACA CGEIT ISACA CGEIT Certification Practice Test Online Training
ISACA CGEIT Online Training
The questions for CGEIT were last updated at Nov 23,2024.
- Exam Code: CGEIT
- Exam Name: ISACA CGEIT Certification Practice Test
- Certification Provider: ISACA
- Latest update: Nov 23,2024
The MOST important aspect of an IT governance framework to ensure that IT supports repeatable business processes is:
- A . earned value management.
- B . quality management,.
- C . resource management.
- D . risk management
A new CIO has been charged with updating the IT governance structure.
Which of the following is the MOST important consideration to effectively influence organizational and process change?
- A . Obtaining guidance from consultants
- B . Aligning IT services to business processes
- C . Redefining the IT risk appetite
- D . Ensuring the commitment of stakeholders
The PRIMARY benefit of integrating IT resource planning into enterprise strategic planning is that it enables the enterprise to:
- A . allocate resources efficiently to achieve desired goals.
- B . adjust business goals depending upon resource availability.
- C . prioritize resource allocation based on sourcing strategy.
- D . develop tactical plans to achieve resource optimization.
An enterprise is implementing a new IT governance program.
Which of the following is the BEST way to increase the likelihood of its success?
- A . The IT steering committee approves the implementation efforts.
- B . The CIO communicates why IT governance is important to the enterprise.
- C . Implementation follows an IT audit recommendation.
- D . The CIO issues a mandate for adherence to the program.
Which of the following is the PRIMARY element in sustaining an effective governance framework?
- A . Identification of optimal business resources
- B . Establishment of a performance metric system
- C . Ranking of critical business risks
- D . Assurance of the execution of business controls
A global financial enterprise has been experiencing a substantial number of information security incidents that have directly affected its business reputation.
Which of the following should be the IT governance board’s FIRST course of action?
- A . Require revisions to how security incidents are managed by the IT department.
- B . Request an IT security assessment to identify the main security gaps.
- C . Execute an IT maturity assessment of the security process.
- D . Mandate an update to the enterprise’s IT security policy.
An enterprise has had the same IT governance framework in place for several years. Currently, large and small capital projects go through the same architectural governance reviews. Despite repeated requests to streamline the review process for small capital projects, business units have received no response from IT. The business units have recently escalated this issue to the newly appointed GO.
Which of the following should be done FIRST to begin addressing business needs?
- A . Create a central repository for the business to submit requests.
- B . Explain the importance of the IT governance framework.
- C . Assess the impact of the proposed change.
- D . Assign a project team to implement necessary changes.
Which of the following is MOST critical for the successful implementation of an IT process?
- A . Process framework
- B . Service delivery process model
- C . Objectives and metrics
- D . IT process assessment
The board of directors has mandated the use of geolocation software to track mobile assets assigned to employees who travel outside of their home country.
To comply with this mandate, the IT steering committee should FIRST request
- A . the inclusion of mandatory training for remote device users.
- B . an architectural review to determine appropriate solution design.
- C . an assessment to determine if data privacy protection is addressed.
- D . an update to the acceptable use policy.
An analysis of an organization s security breach is complete. The results indicate that the quality of the code used for updates to its primary customer-facing software has been declining and security flaws were introduced.
The FIRST IT governance action to correct this problem should be to review:
- A . compliance with the user testing process.
- B . the change management control framework.
- C . the qualifications of developers to write secure code.
- D . the incident response plan.