A company is considering selling products online, and the CIO has been asked to advise the board of directors of potential problems with this strategy. Which of the following is the ClO's BEST course of action?
A. Review the security framework.
B. Conduct a return on investment (ROI) analysis.
C. Review the enterprise architecture (EA).
D. Perform a risk assessment.
In an enterprise that has worldwide business units and a centralized financial control model, which of the following is a barrier to strategic alignment of business and IT?
A. Each business unit has its own steering committee for IT investment and prioritization.
B. Uniform portfolio management is in place throughout the business units.
C. IT is the exclusive provider of IT services to the business units.
D. The enterprise's CIO is a member of the executive committee.
Which of the following should be established FIRST so that data owners can consistently assess the level of data protection needed across the enterprise?
A. Data encryption program
B. Data risk management program
C. Data retention policy
D. Data classification policy
Which of the following is the MOST effective way for a CIO to govern business unit deployment of shadow IT applications in a cloud environment?
A. Implement controls to block the installation of unapproved applications.
B. Educate the executive team about the risk associated with shadow IT applications.
C. Provide training to the help desk to identify shadow IT applications.
D. Review and update the application implementation process.
Which of the following should be done FIRST when defining responsibilities for ownership of information and systems?
A. Require an information risk assessment.
B. Identify systems that are outsourced.
C. Ensure information is classified.
D. Require an inventory of information assets.
Val IT is a suite of documents that provide a framework for the governance of IT investments, produced by the IT Governance Institute (ITGI). It is a formal statement of principles and processes for IT portfolio management. Drag and drop the correct domain ('Portfolio management') next to the IT processes defined by Val IT.
Select and Place:
Drag and drop the various architecture domains for TOGAF at the appropriate places.
Select and Place:
The Information Technology Infrastructure Library (ITIL) is a set of concepts and policies for managing information technology (IT) infrastructure, development, and operations. Drag and drop the ITIL processes that focus on service operation,
i.e. operational processes in Service Support, in the correct places.
Select and Place:
The Information Technology Infrastructure Library (ITIL) is a set of concepts and policies for managing information technology (IT) infrastructure, development, and operations. Drag and drop the ITIL processes that focus on service planning,
i.e. tactical processes in Service Delivery, in the correct places.
Select and Place:
Choose and reorder the steps required in the development of business case.
Select and Place:
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Isaca exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CGEIT exam preparations and Isaca certification application, do not hesitate to visit our Vcedump.com to find your solutions here.