Rate this post

Get Latest [Oct-2022] Conduct effective penetration tests using BraindumpsIT CGEIT

Penetration testers simulate CGEIT exam PDF

What is the duration of the CGEIT Exam

  • Length of Examination: 4 hours
  • Format: Multiple choices, multiple answers

For more info visit:

Isaca CGEIT Exam Reference

 

QUESTION 86
Della works as a project manager for SoftTech Inc. She is working with the project stakeholders to begin the quantitative risk analysis process. Which of the following inputs will be needed for the quantitative risk analysis process in her project? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

QUESTION 87
Which of the following is MOST important to consider when planning to implement a cloud-based application for sharing documents with internal and external parties?

 
 
 
 

QUESTION 88
An enterprise is planning a change in business direction. As a result, IT risk will significantly increase. Which of the following should be the GO’S FIRST course of action?

 
 
 
 

QUESTION 89
Which of the following processes contained in the Value Governance domain of Val IT establishes the organizational structures?

 
 
 
 

QUESTION 90
To benefit from economies of scale, a CIO is deciding whether to outsource some IT services. Which of the following would be the MOST important consideration during the decision-making process?

 
 
 
 

QUESTION 91
An independent consultant has been hired to conduct an ad hoc audit of an enterprise’s information security office with results reported to the IT governance committee and the board. Which of the following is MOST important to provide to the consultant before the audit begins?

 
 
 
 

QUESTION 92
An enterprise has launched a series of critical new IT initiatives that are expected to produce substantial value Which of the following would BEST provide the board with an indication of progress of the IT initiatives?

 
 
 
 

QUESTION 93
Which of the following examples are included in the application controls embedded in business process applications? Each correct answer represents a complete solution.
Choose all that apply.

 
 
 
 

QUESTION 94
An enterprise plans to implement a business intelligence (BI) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

 
 
 
 

QUESTION 95
Which of the following BEST facilitates governance oversight of data protection measures?

 
 
 
 

QUESTION 96
Which of the following is a way of delivering value to customers by facilitating outcome that customers wish to get without the control of specific costs and risks?

 
 
 
 

QUESTION 97
Which of the following is the MOST appropriate mechanism for measuring overall IT organizational performance?

 
 
 
 

QUESTION 98
An enterprise has made the strategic decision to reduce operating costs for the next year and is taking advantage of cost reductions offered by an external cloud service provider. Which of the following should be the IT steering committee’s PRIMARY concern?

 
 
 
 

QUESTION 99
An enterprise wishes to establish key risk indicators (KRIs) in an effort to better manage IT risk. Which of the following should be identified FIRST?

 
 
 
 

QUESTION 100
An enterprise is conducting a SWOT analysis as part of IT strategy development. Which of the following would be MOST helpful to identify opportunities and threats?

 
 
 
 

QUESTION 101
IT Governance is used by the management to regulate the Information Systems, to accomplish its objectives. IT governance forms an integral part of corporate governance.
Which of the following elements are required to implement a good IT governance framework? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

QUESTION 102
Gary has identified a project risk that could injure project team members. He does not want to accept any risk where someone could become injured on this project so he hires a professional vendor to complete this portion of the project work. This workaround to the risk event is known as what type of risk response?

 
 
 
 

QUESTION 103
Which of the following quadrant analysis identifies the key issues of cost containment, predictability or reliability, continual unit cost improvement, and benchmarking for justification?

 
 
 
 

QUESTION 104
An enterprise considering implementing IT governance should FIRST develop the scope of the IT governance program and:

 
 
 
 

ISACA Governance of Enterprise IT Exam Syllabus Topics:

Topic Details Weights
Strategic Management

– Ensure that IT enables and supports the achievement of enterprise objectives through the integration and alignment of IT strategic plans with enterprise strategic plans.

Task Statements

  1. Evaluate, direct and monitor IT strategic planning processes to ensure alignment with enterprise goals.
  2. Ensure that appropriate policies and procedures are in place to support IT and enterprise strategic alignment.
  3. Ensure that the IT strategic planning processes and related outputs are adequately documented and communicated.
  4. Ensure that enterprise architecture (EA) is integrated into the IT strategic planning process.
  5. Ensure prioritization of IT initiatives to achieve enterprise objectives.
  6. Ensure that IT objectives cascade into clear roles, responsibilities and actions of IT personnel.

Knowledge Statements

  1. Knowledge of an enterprise’s strategic plan and how it relates to IT.
  2. Knowledge of strategic planning processes and techniques.
  3. Knowledge of impact of changes in business strategy on IT strategy.
  4. Knowledge of barriers to the achievement of strategic alignment.
  5. Knowledge of policies and procedures necessary to support IT and business strategic alignment.
  6. Knowledge of methods to document and communicate IT strategic planning processes (for example, IT dashboard/balanced scorecard, key indicators).
  7. Knowledge of components, principles and frameworks of enterprise architecture (EA).
  8. Knowledge of current and future technologies.
  9. Knowledge of prioritization processes related to IT initiatives.
  10. Knowledge of scope, objectives and benefits of IT investment programs.
  11. Knowledge of IT roles and responsibilities and methods to cascade business and IT objectives to IT personnel.
20%
Benefits Realization

– Ensure that IT-enabled investments are managed to deliver optimized business benefits and that benefit realization outcome and performance measures are established, evaluated and progress is reported to key stakeholders.

Task Statements

  1. Ensure that IT-enabled investments are managed as a portfolio of investments.
  2. Ensure that IT-enabled investments are managed through their economic life cycle to achieve business benefit.
  3. Ensure business ownership and accountability for IT-enabled investments are established.
  4. Ensure that IT investment management practices align with enterprise investment management practices.
  5. Ensure that IT-enabled investment portfolios, IT processes and IT services are evaluated and benchmarked to achieve business benefit.
  6. Ensure that outcome and performance measures are established and evaluated to assess progress towards the achievement of enterprise and IT objectives.
  7. Ensure that outcome and performance measures are monitored and reported to key stakeholders in a timely manner.
  8. Ensure that improvement initiatives are identified, prioritized, initiated and managed based on outcome and performance measures.

Knowledge Statements

  1. Knowledge of IT investment management processes, including the economic life cycle of investments.
  2. Knowledge of basic principles of portfolio management.
  3. Knowledge of benefit calculation techniques (for example, earned value, total cost of ownership, return on investment).
  4. Knowledge of process and service measurement techniques (for example, maturity models, benchmarking, key performance indicators [KPIs]).
  5. Knowledge of processes and practices for planning, development, transition, delivery, and support of IT solutions and services.
  6. Knowledge of continuous improvement concepts and principles.
  7. Knowledge of outcome and performance measurement techniques (for example, service metrics, key performance indicators [KPIs]).
  8. Knowledge of procedures to manage and report the status of IT investments.
  9. Knowledge of cost optimization strategies (for example, outsourcing, adoption of new technologies).
  10. Knowledge of models and methods to establish accountability over IT investments.
  11. Knowledge of value delivery frameworks (for example, Val IT).
  12. Knowledge of business case development and evaluation techniques.
16%
Resource Optimization

– Ensure the optimization of IT resources including information, services, infrastructure and applications, and people, to support the achievement of enterprise objectives.

Task Statements

  1. Ensure that processes are in place to identify, acquire and maintain IT resources and capabilities (i.e., information, services, infrastructure and applications, and people).
  2. Evaluate, direct and monitor sourcing strategies to ensure existing resources are taken into account to optimize IT resource utilization.
  3. Ensure the integration of IT resource management into the enterprise’s strategic and tactical planning.
  4. Ensure the alignment of IT resource management processes with the enterprise’s resource management processes.
  5. Ensure that a resource gap analysis process is in place so that IT is able to meet strategic objectives of the enterprise.
  6. Ensure that policies exist to guide IT resource sourcing strategies that include service level agreements (SLAs) and changes to sourcing strategies.
  7. Ensure that policies and processes are in place for the assessment, training and development of staff to address enterprise requirements and personal/professional growth.

Knowledge Statements

  1. Knowledge of IT resource planning methods.
  2. Knowledge of human resource procurement, assessment, training, and development methodologies.
  3. Knowledge of processes for acquiring application, information, and infrastructure resources.
  4. Knowledge of outsourcing and offshoring approaches that may be employed to meet the investment program and operation level agreements (OLAs) and service level agreements (SLAs).
  5. Knowledge of methods used to record and monitor IT resource utilization and availability.
  6. Knowledge of methods used to evaluate and report on IT resource performance.
  7. Knowledge of interoperability, standardization and economies of scale.
  8. Knowledge of data management and data governance concepts.
  9. Knowledge of service level management concepts.
15%
Risk Optimization

– Ensure that an IT risk management framework exists to identify, analyze, mitigate, manage, monitor, and communicate IT-related business risk, and that the framework for IT risk management is in alignment with the enterprise risk management (ERM) framework.

Task Statements

  1. Ensure that comprehensive IT risk management processes are established to identify, analyze, mitigate, manage, monitor, and communicate IT risk.
  2. Ensure that legal and regulatory compliance requirements are addressed through IT risk management.
  3. Ensure that IT risk management is aligned with the enterprise risk management (ERM) framework.
  4. Ensure appropriate senior level management sponsorship for IT risk management.
  5. Ensure that IT risk management policies, procedures and standards are developed and communicated.
  6. Ensure the identification of key risk indicators (KRIs).
  7. Ensure timely reporting and proper escalation of risk events and responses to appropriate levels of management.

Knowledge Statements

  1. Knowledge of the application of risk management at the strategic, portfolio, program, project and operations levels.
  2. Knowledge of risk management frameworks and standards (for example, RISK IT, the Committee of Sponsoring Organizations of the Treadway Commission Enterprise Risk Management—Integrated Framework (2004) [COSO ERM], International Organization for Standardization (ISO) 31000).
  3. Knowledge of the relationship of the risk management approach to legal and regulatory compliance.
  4. Knowledge of methods to align IT and enterprise risk management (ERM).
  5. Knowledge of the relationship of the risk management approach to business resiliency (for example, business continuity planning [BCP] and disaster recovery planning [DRP]).
  6. Knowledge of risk, threats, vulnerabilities and opportunities inherent in the use of IT.
  7. Knowledge of types of business risk, exposures and threats (for example, external environment, internal fraud, information security) that can be addressed using IT resources
  8. Knowledge of risk appetite and risk tolerance.
  9. Knowledge of quantitative and qualitative risk assessment methods.
  10. Knowledge of risk mitigation strategies related to IT in the enterprise.
  11. Knowledge of methods to monitor effectiveness of mitigation strategies and/or controls.
  12. Knowledge of stakeholder analysis and communication techniques.
  13. Knowledge of methods to establish key risk indicators (KRIs).
  14. Knowledge of methods to manage and report the status of identified risk.
24%

 

Tested Material Used To CGEIT Test Engine: https://www.braindumpsit.com/CGEIT_real-exam.html

         

Leave a comment

Your email address will not be published. Required fields are marked *

Enter the text from the image below