Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CGEIT Exam Dumps - Certified in the Governance of Enterprise IT Exam

Go to page:
Question # 25

Which of the following is the PRIMARY responsibility of a data steward at an enterprise with mature data management programs?

A.

Implementing processes for data collection and use

B.

Ensuring compliance with data privacy laws and regulations

C.

Establishing data quality requirements and metrics

D.

Developing data-related policies and procedures

Full Access
Question # 26

Which of the following would BEST enable an enterprise to ensure selected cloud vendors meet stringent regulatory requirements?

A.

Stage gate reviews

B.

Risk assessment

C.

Internal audit report

D.

Third-party audit reports

Full Access
Question # 27

An enterprise has an ongoing issue of corporate applications not delivering the expected benefits due to missing key functionality. As a result, many groups are using spreadsheets and databases instead of approved enterprise applications to store and manipulate information. Which of the following will BEST improve the success rate of future IT initiatives?

A.

Engage the business user community in acceptance testing Of acquired applications.

B.

Engage stakeholders to identify and validate business requirements.

C.

Establish a process for risk and value management.

D.

Prohibit the use of non-approved alternate software solutions.

Full Access
Question # 28

An executive management team has determined the need to implement an IT governance framework, beginning with the maturity assessment process. The PRIMARY purpose for maturity assessment is to:

A.

Benchmark IT performance.

B.

Identify gaps in performance.

C.

Support impact analysis.

D.

Identify gaps in capability.

Full Access
Question # 29

Forensic analysis revealed an attempted breach of a personnel database containing sensitive data. A subsequent investigation found that no one within the enterprise was aware of the breach attempt, even though logs recorded the unauthorized access actions. To prevent a similar situation in the future, what is MOST important for IT governance to require?

A.

Periodic analyses of logs and databases for unusual activity

B.

A review of the information security and risk management frameworks

C.

The creation of a comprehensive data management and storage policy

D.

The implementation of an intrusion detection and reporting process

Full Access
Question # 30

Which of the following is the PRIMARY role of the CEO in IT governance?

A.

Establishing enterprise strategic goals

B.

Managing the risk governance process

C.

Evaluating return on investment (ROI)

D.

Nominating IT steering committee membership

Full Access
Question # 31

Which of the following is the MOST efficient approach for using risk scenarios to evaluate a new business opportunity?

A.

Related risks are consolidated into one scenario for analysis.

B.

Risk events are identified bottom-up and top-down.

C.

Risk identification leverages past audit and compliance reports.

D.

Risk scenario narratives are summarized and limited in length.

Full Access
Question # 32

An interna! health organization has been notified that a data breach has resulted in patient records being published online. Which of the

following is MOST important consideration when determining the process for meeting the organization's legal and regulatory obligations?

A.

Organizational structure, including accountable partes

B.

Data classification and related security policy

C.

Context of the breach, including data ownership and location

D.

Details of how the breach occurred and related incident response efforts

Full Access
Go to page: