Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

To minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations which of the following is the BEST action to take?

A.

Update the information architecture

B.

Revise the IT strategic plan

C.

Implement data loss prevention (DLP)

D.

Establish new IT key risk indicators (KRIs)

When deciding to develop a system with sensitive data, which of the following is MOST important to include in a business case?

A.

A risk assessment to determine the appropriate controls

B.

Updated enterprise architecture (EA)

C.

Skills gap analysis

D.

The additional cost of encrypting sensitive data

A CIO just received a final audit report that indicates there is inconsistent enforcement of the enterprise's mobile device acceptable use policy throughout all business units. Which of the following should be the FIRST step to address this issue?

A.

Incorporate compliance metrics into performance goals.

B.

Review the relevance of existing policy.

C.

Mandate awareness training for all mobile device users.

D.

Implement controls to enforce the policy.

In a successful enterprise that is profitable in its marketplace and consistently growing in size, the non-IT workforce has grown by 50% in the last two years. The demand for IT staff in the marketplace is more than the supply, and the enterprise is losing staff to rival organizations. Due to the rapid growth. IT has struggled to keep up with the enterprise, and IT procedures and associated job roles are not well-defined. The MOST critical activity for reducing the impact caused by IT staff turnover is to:

A.

document processes and procedures.

B.

outsource the IT operation.

C.

increase compensation for IT staff

D.

hire temporary staff.

Which of the following is the BEST way to maximize the value of an enterprise’s information asset base?

A.

Seek additional opportunities to leverage existing information assets.

B.

Facilitate widespread user access to all information assets

C.

Regularly purge information assets to minimize maintenance costs

D.

Implement an automated information management platform

Which of the following should be done FIRST when defining responsibilities for ownership of information and systems?

A.

Require an information risk assessment.

B.

Identify systems that are outsourced.

C.

Ensure information is classified.

D.

Require an inventory of information assets.

In an enterprise that has worldwide business units and a centralized financial control model, which of the following is a barrier to strategic alignment of business and IT?

A.

Each business unit has its own steering committee for IT investment and prioritization.

B.

Uniform portfolio management is in place throughout the business units.

C.

IT is the exclusive provider of IT services to the business units.

D.

The enterprise's CIO is a member of the executive committee.

The PRIMARY reason for using quantitative criteria in developing business cases for IT projects is to:

A.

improve the process of evaluating returns after implementation.

B.

benchmark project success with similar enterprises.

C.

learn lessons from errors made in past projects.

D.

apply other corporate standards to the development project.

Which of the following should be the PRIMARY consideration for an enterprise when prioritizing IT projects?

A.

Technical capability of the enterprise to execute the projects

B.

Process owner expectations based on operational benefits

C.

Results of IT performance benchmarks against competitors

D.

Impact on the business due to expected project outcomes

An enterprise's decision to move to a virtualized architecture will have the GREATEST impact on:

A.

system life cycle management.

B.

asset classification.

C.

vendor management

D.

vulnerability management.

Which of the following should IT governance mandate before any transition of data from a legacy system to a new technology platform?

A.

Data conversion has documented approvals from business process data owners.

B.

Data conversion is performed in a test environment to confirm correctness

C.

Control totals of key transaction values are matched with data converted for migration.

D.

A crisis management plan has been approved by the IT steering committee

A large bank has completed several acquisitions in the last few years that have resulted in redundant IT applications. To align with the strategic initiative of providing integrated services to customers, the IT steering committee has decided to share data and integrate applications. Which of the following would be MOST important to review in this situation?

A.

Enterprise architecture (EA)

B.

IT risk register

C.

Balanced scorecard measures

D.

IT strategic plan

An IT strategy committee wants to evaluate how well the IT department supports the business strategy. Which of the following is the BEST method for making this determination?

A.

Capability maturity assessment

B.

Customer survey analysis

C.

IT balanced scorecard reporting

D.

IT controls assurance program

Which of the following is the MOST important aspect of business ethics?

A.

Ensuring fair and consistent vendor management practices

B.

Providing equal opportunities to employees

C.

Protecting stakeholders' interests

D.

Complying with legal and regulatory requirements

The CEO of an organization is concerned that there are inconsistencies in the way information assets are classified across the enterprise. Which of the following is be the BEST way for the CIO to address these concerns?

A.

Include data assets in the IT inventory.

B.

Identify data owners across the enterprise.

C.

Require enterprise risk assessments.

D.

Implement enterprise data governance.