Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following has PRIMARY responsibility to define the requirements for IT service levels for the enterprise?

A.

The business manager

B.

The help desk

C.

The CIO

D.

The business continuity vendor

Which of the following is the PRIMARY purpose of information governance?

A.

To develop control procedures that help ensure information is adequately protected throughout its life cycle

B.

To monitor the processes that deliver and enhance the value of information assets

C.

To set direction for information management capabilities through prioritization and decision making

D.

To ensure regulatory compliance is maintained while optimizing the utilization of information

When conducting a risk assessment in support of a new regulatory requirement, the IT risk committee should FIRST consider the:

A.

disruption to normal business operations.

B.

risk profile of the enterprise.

C.

readiness of IT systems to address

D.

the risk cost burden to achieve compliance.

Which of the following BEST demonstrates the effectiveness of enterprise IT governance?

A.

An IT balanced scorecard is used.

B.

Business objectives are achieved.

C.

Business objectives are defined.

D.

IT processes are measured.

To enable the development of required IT skill sets for the enterprise, it is MOST important to define skill requirements based on:

A.

training needs.

B.

one set of skills applicable to all IT staff.

C.

a best practices framework.

D.

each role within the IT department.

A newly hired CIO has been told the enterprise has an established IT governance process, but finds it is not being followed. To address this problem, the CIO should FIRST

A.

gain an understanding of the existing governance process and corporate culture.

B.

replace the current governance process with one the CIO has successfully used before.

C.

establish personal relationships with executive-level peers to leverage goodwill,

D.

engage audit to review current governance processes and validate the ClO's concerns.

Which of the following should be the FIRST step for executive management to take in communicating what is considered acceptable use with regard to personally owned devices for company business?

A.

Require employees to read and sign a disclaimer.

B.

Develop and disseminate an applicable policy.

C.

Post awareness messages throughout the facility.

D.

Provide training on how to protect data on personal devices.

An enterprise has decided to implement an IT risk management program After establishing stakeholder desired outcomes, the MAIN goal of the IT strategy committee should be to:

A.

identify business data that requires protection.

B.

perform a risk analysis on key IT processes

C.

implement controls to address high risk areas

D.

ensure IT risk alignment with enterprise risk

When establishing a risk management process which of the following should be the FIRST step?

A.

Determine the probability of occurrence

B.

Identify threats

C.

Identify assets

D.

Assess risk exposures

A large enterprise has decided to use an emerging technology that needs to be integrated with the current IT infrastructure. Which of the following is the BEST way to prevent adverse effects to the enterprise resulting from the new technology?

A.

Develop key performance indicators (KPIs).

B.

Update the risk appetite statement

C.

Develop key risk indicators (KRIs).

D.

Implement service level agreements (SLAs)

Which of the following should be established FIRST so that data owners can consistently assess the level of data protection needed across the enterprise?

A.

Data encryption program

B.

Data risk management program

C.

Data retention policy

D.

Data classification policy

Business management is seeking assurance from the CIO that controls are in place to help minimize the risk of critical IT systems being unavailable during month-end financial processing. What is the BEST way to address this concern?

A.

Create a communication plan with risk owners.

B.

Outsource infrastructure hosting.

C.

Restrict and monitor user access.

D.

Develop key risk indicators (KRIs) and action plans.

A project sponsor has circumvented the request for proposal (RFP) selection process. Which of the following is the MOST likely reason for this control gap?

A.

Inadequate stage-gate reviews

B.

Inadequate board oversight

C.

Lack of accountability for policy adherence

D.

Lack of a legal and regulatory review process

The FIRST step in aligning resource management to the enterprise's IT strategic plan would be to

A.

develop a responsible, accountable, consulted and informed (RACI) chart

B.

assign appropriate roles and responsibilities

C.

perform a gap analysis

D.

identify outsourcing opportunities

After shifting from lease to purchase of IT infrastructure and software licenses, an enterprise has to pay for unexpected lease extensions causing significant cost overruns. The BEST direction for the IT steering committee would be to establish;

A.

an end-of-life program to remove aging infrastructure from the environment.

B.

budget cuts to compensate for the cost overruns.

C.

a program to annually review financial policy on overruns.

D.

a policy to consider total cost of ownership (TCO) in investment decisions.