FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CGEIT Exam
  4. ISACA.CGEIT.v2024-05-21.q447 Dumps
  • ««
  • «
  • …
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • …
  • »
  • »»
Download Now

Question 296

Which of the following roles should be responsible for data normalization when it is found that a new system includes duplicates of data items?

Correct Answer: B
A data steward is a role that is responsible for data normalization when it is found that a new system includes duplicates of data items, because a data steward is accountable for the quality, integrity, and consistency of the data in the enterprise. A data steward can define and enforce data standards, policies, and rules, and perform data cleansing, validation, and reconciliation activities to ensure that the data is accurate, complete, and reliable12.
insert code

Question 297

Which of the following processes contained in the Value Governance domain of Val IT defines information requirements?

Correct Answer: C
insert code

Question 298

Which of the following is the BEST IT architecture concept to ensure consistency, interoperability, and agility for infrastructure capabilities?

Correct Answer: B
Standards-based reference architecture and design specifications. A reference architecture is a set of principles, patterns, standards, and best practices that guide the design and implementation of IT solutions. A design specification is a detailed document that describes the technical requirements, features, and functionalities of an IT solution. By using standards-based reference architecture and design specifications, an enterprise can ensure that its IT infrastructure is aligned with its business needs and goals, and that it can support the integration, compatibility, and scalability of its IT systems and services. Some examples of standards-based reference architectures are: The Open Group Architecture Framework (TOGAF) 1, The Federal Enterprise Architecture Framework (FEAF) 2, and The Cloud Computing Reference Architecture (CCRA) 3.
insert code

Question 299

IT governance within an enterprise is attempting to drive a cultural shift to enhance compliance with IT security policies. The BEST way to support this objective is to ensure that enterprise IT policies are:

Correct Answer: D
Integrating IT security policies into individual performance objectives is the best way to support the objective of driving a cultural shift to enhance compliance with IT security policies. This is because performance objectives are specific, measurable, achievable, relevant, and time-bound (SMART) goals that define what each employee is expected to accomplish and how they will be evaluated1. By integrating IT security policies into performance objectives, the enterprise can:
* Communicate the importance and value of IT security policies to each employee2
* Motivate and incentivize employees to comply with IT security policies2
* Monitor and measure employees' compliance with IT security policies2
* Provide feedback and recognition to employees who comply with IT security policies2
* Identify and address any gaps or issues in employees' compliance with IT security policies2 Integrating IT security policies into performance objectives can help to create a culture of accountability, responsibility, and awareness for IT security within the enterprise. It can also help to align the individual goals of employees with the organizational goals of IT governance.
The other options, communicating IT security policies on a regular basis, acknowledging and signing IT security policies by each employee, and centrally posting IT security policies with detailed instructions are not as effective as integrating IT security policies into performance objectives for supporting the objective of driving a cultural shift to enhance compliance with IT security policies. They are more related to the dissemination and implementation of IT security policies, rather than their integration and evaluation. They may not have a significant impact on the behavior and attitude of employees towards IT security policies, as they may not provide sufficient motivation, feedback, or recognition for compliance. They may also be perceived as passive, formal, or coercive methods of enforcing IT security policies, rather than active, informal, or collaborative methods of engaging employees in IT security policies. References := Performance Objectives - SMART Goals - BusinessBalls, How to Integrate Security Into Employee Performance Objectives, IT Security Policy: Key Components & Best Practices for Every Business ...
insert code

Question 300

A new and expanding enterprise has recently received a report indicating 90% of its data has been collected in just the last six months, triggering data breach and privacy concerns. What should be the IT steering committee's FIRST course of action to ensure new data is managed effectively?

Correct Answer: D
insert code
  • ««
  • «
  • …
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CGEIT.v2024-05-21.q447 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.