Which of the following should be the FIRST course of action?
The use of new technology in an enterprise will require specific expertise and updated system development processes. There is concern that IT is not properly sourced . Which of the following should be the FIRST course of action?A . Perform a risk assessment on potential outsourcing.B . Update the enterprise...
Which of the following is the MOST important attribute of an information steward?
Which of the following is the MOST important attribute of an information steward?A . The information steward manages the systems that process the relevant data.B . The information steward has expertise in managing data quality systems.C . The information steward is closely aligned with the business function.D . The information...
Which of the following should the done FIRST?
An enterprise has learned of a new regulation that may impact delivery of one of its core technology services. Which of the following should the done FIRST?A . Update the risk management frameworkB . Determine whether the board wants to comply with the regulationC . Assess the risk associated with...
Which of the following should be the FIRST step to address this issue?
A CIO just received a final audit report that indicates there is inconsistent enforcement of the enterprise's mobile device acceptable use policy throughout all business units . Which of the following should be the FIRST step to address this issue?A . Incorporate compliance metrics into performance goals.B . Review the...
The PRIMARY objective of IT resource planning within an enterprise should be to:
The PRIMARY objective of IT resource planning within an enterprise should be to:A . determine risk associated with IT resources.B . maximize value received from ID . determine IT outsourcing options.E . finalize service level agreements (SLAs) for ITView AnswerAnswer: B
The BEST way to manage continuous improvement of governance-related processes is to:
The BEST way to manage continuous improvement of governance-related processes is to:A . assess existing process resource capacities.B . define accountability based on roles and responsibilities.C . apply effective quality management practices.D . require third-party independent reviews.View AnswerAnswer: C
In an enterprise that has worldwide business units and a centralized financial control model, which of the following is a barrier to strategic alignment of business and IT?
In an enterprise that has worldwide business units and a centralized financial control model, which of the following is a barrier to strategic alignment of business and IT?A . Each business unit has its own steering committee for IT investment and prioritization.B . Uniform portfolio management is in place throughout...
A global enterprise is experiencing an economic downturn and is rapidly losing market share. IT senior management is reassessing the core activities of the business, including IT, and the associated resource implications. Management has decided to focus on its local market and to close international operations.
A global enterprise is experiencing an economic downturn and is rapidly losing market share. IT senior management is reassessing the core activities of the business, including IT, and the associated resource implications. Management has decided to focus on its local market and to close international operations. A critical issue from...
Which of the following provides the BEST evidence of an IT risk-aware culture across an enterprise?
Which of the following provides the BEST evidence of an IT risk-aware culture across an enterprise?A . Business staff report identified IT risks.B . IT risks are communicated to the business.C . IT risk-related policies are published.D . The IT infrastructure is resilient.View AnswerAnswer: A
Which of the following is the MOST effective way for a CIO to govern business unit deployment of shadow IT applications in a cloud environment?
Which of the following is the MOST effective way for a CIO to govern business unit deployment of shadow IT applications in a cloud environment?A . Implement controls to block the installation of unapproved applications.B . Educate the executive team about the risk associated with shadow IT applications.C . Provide...