ISACA CGEIT ISACA CGEIT Certification Practice Test Online Training
ISACA CGEIT Online Training
The questions for CGEIT were last updated at Nov 23,2024.
- Exam Code: CGEIT
- Exam Name: ISACA CGEIT Certification Practice Test
- Certification Provider: ISACA
- Latest update: Nov 23,2024
Which of the following is the MOST effective way of assessing enterprise risk?
- A . Business impact analysis (BIA)
- B . Business vulnerability assessment
- C . Likelihood of threat analysis
- D . Operational risk assessment
A CIO must determine if IT staff have adequate skills to deliver on key strategic objectives.
Which of the following will provide the MOST useful information?
- A . Employee performance metrics
- B . Project risk reports
- C . Gap analysis results
- D . Training program statistics
When evaluating benefits realization of IT process performance, the analysis MUST be based on;
- A . key business objectives.
- B . industry standard key performance indicators (KPIs).
- C . portfolio prioritization criteria.
- D . IT risk policies.
Which of the following is the PRIMARY ongoing responsibility of the IT governance function related to risk?
- A . Responding to and controlling all IT risk events
- B . Communicating the enterprise risk management plan
- C . Ensuring IT risk management is aligned with business risk appetite
- D . Verifying that all business units have staff skilled at assessing risk
An enterprise considering implementing IT governance should FIRST develop the scope of the IT governance program and:
- A . initiate the program using an implementation roadmap.
- B . establish initiatives for business and managers.
- C . acquire the resources that will be required.
- D . communicate the program to stakeholders to gain consensus.
Which of the following should be the MAIN reason for an enterprise to implement an IT risk management framework?
- A . The need to enable IT risk-aware decisions by executives
- B . The results of an external audit report concerning IT risk management processes.
- C . The need to address market regulations and internal compliance in IT risk
- D . The ability to benchmark IT risk policies against major competitors
An enterprise’s information security function is making changes to its data retention and backup policies.
Which of the following presents the GREATEST risk?
- A . Business data owners were not consulted.
- B . The new policies Increase the cost of data backups.
- C . Data backups will be hosted at third-party locations.
- D . The retention period for data backups is Increased.
Which of the following would be MOST important to update if a decision is made to ban end user-owned devices in the workplace?
- A . Employee nondisclosure agreement
- B . Enterprise risk appetite statement
- C . Enterprise acceptable use policy
- D . Orientation training materials
Which of the following is the MOST effective way to manage risks within the enterprise?
- A . Assign individuals responsibilities and accountabilities for management of risks.
- B . Make staff aware of the risks in their area and risk management techniques.
- C . Provide financial resources for risk management systems.
- D . Document procedures and reporting processes.
Which of the following is an ADVANTAGE of using strategy mapping?
- A . It provides effective indicators of productivity and growth.
- B . It depicts the maturity levels of processes that support organizational strategy.
- C . It identifies barriers to strategic alignment and links them to specific outcomes.
- D . It depicts the cause-and-effect linked relationships between strategic objectives.