Free CGEIT Exam Braindumps (page: 45)

Page 44 of 119

An enterprise has a zero-tolerance policy regarding security. This policy is causing a large number of email attachments to be blocked and is a disruption to the enterprise. Which of the following should be the FIRST governance step to address this email issue?

  1. Obtain senior management input based on identified risk.
  2. Direct the development of an email usage policy.
  3. Recommend business sign-off on the zero-tolerance policy.
  4. Introduce an exception process.

Answer(s): B



Which of the following is a CIO’s BEST approach to ensure IT executes against an approved strategy?

  1. Request IT senior leaders to collectively plan tactics for execution.
  2. Ask project management to define the IT activities for accomplishing the strategy.
  3. Provide specific direction for execution of the tasks across IT.
  4. Have IT leaders independently develop goals for their teams.

Answer(s): B



Which of the following is the MOST important outcome of a formal, documented IT policy?

  1. Alignment with IT service management
  2. Communication of IT management intent
  3. Mapping of business objectives
  4. Resource optimization for enterprise initiatives

Answer(s): C



Senior management is concerned about an increase in cybersecurity risk to the enterprise. Which of the following would be MOST helpful in establishing an early warning system to determine which potential threats should be escalated to senior management?

  1. Agreed-upon risk thresholds
  2. A risk appetite statement
  3. Key performance indicators (KPIs)
  4. Patch management logs

Answer(s): A






Post your Comments and Discuss ISACA CGEIT exam with other Community members:

CGEIT Discussions & Posts