Which of the following roles should be responsible for data normalization when it is found that a new system includes duplicates of data items?
Correct Answer: B
A data steward is a role that is responsible for data normalization when it is found that a new system includes duplicates of data items, because a data steward is accountable for the quality, integrity, and consistency of the data in the enterprise. A data steward can define and enforce data standards, policies, and rules, and perform data cleansing, validation, and reconciliation activities to ensure that the data is accurate, complete, and reliable12.
Question 297
Which of the following processes contained in the Value Governance domain of Val IT defines information requirements?
Correct Answer: C
Question 298
Which of the following is the BEST IT architecture concept to ensure consistency, interoperability, and agility for infrastructure capabilities?
Correct Answer: B
Standards-based reference architecture and design specifications. A reference architecture is a set of principles, patterns, standards, and best practices that guide the design and implementation of IT solutions. A design specification is a detailed document that describes the technical requirements, features, and functionalities of an IT solution. By using standards-based reference architecture and design specifications, an enterprise can ensure that its IT infrastructure is aligned with its business needs and goals, and that it can support the integration, compatibility, and scalability of its IT systems and services. Some examples of standards-based reference architectures are: The Open Group Architecture Framework (TOGAF) 1, The Federal Enterprise Architecture Framework (FEAF) 2, and The Cloud Computing Reference Architecture (CCRA) 3.
Question 299
IT governance within an enterprise is attempting to drive a cultural shift to enhance compliance with IT security policies. The BEST way to support this objective is to ensure that enterprise IT policies are:
Correct Answer: D
Integrating IT security policies into individual performance objectives is the best way to support the objective of driving a cultural shift to enhance compliance with IT security policies. This is because performance objectives are specific, measurable, achievable, relevant, and time-bound (SMART) goals that define what each employee is expected to accomplish and how they will be evaluated1. By integrating IT security policies into performance objectives, the enterprise can: * Communicate the importance and value of IT security policies to each employee2 * Motivate and incentivize employees to comply with IT security policies2 * Monitor and measure employees' compliance with IT security policies2 * Provide feedback and recognition to employees who comply with IT security policies2 * Identify and address any gaps or issues in employees' compliance with IT security policies2 Integrating IT security policies into performance objectives can help to create a culture of accountability, responsibility, and awareness for IT security within the enterprise. It can also help to align the individual goals of employees with the organizational goals of IT governance. The other options, communicating IT security policies on a regular basis, acknowledging and signing IT security policies by each employee, and centrally posting IT security policies with detailed instructions are not as effective as integrating IT security policies into performance objectives for supporting the objective of driving a cultural shift to enhance compliance with IT security policies. They are more related to the dissemination and implementation of IT security policies, rather than their integration and evaluation. They may not have a significant impact on the behavior and attitude of employees towards IT security policies, as they may not provide sufficient motivation, feedback, or recognition for compliance. They may also be perceived as passive, formal, or coercive methods of enforcing IT security policies, rather than active, informal, or collaborative methods of engaging employees in IT security policies. References := Performance Objectives - SMART Goals - BusinessBalls, How to Integrate Security Into Employee Performance Objectives, IT Security Policy: Key Components & Best Practices for Every Business ...
Question 300
A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?