FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CGEIT Exam
  4. ISACA.CGEIT.v2026-01-12.q170 Dumps
  • ««
  • «
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • …
  • »
  • »»
Download Now

Question 111

A retail enterprise has cost reduction as its top priority. From a governance perspective, which of the following should be the MOST important consideration when evaluating different IT investment options?

Correct Answer: D
The most important consideration for IT governance is to align IT investments with business objectives and deliver value to the enterprise. Cost reduction is one of the possible objectives, but not the only one. Therefore, the business value impact of each option should be evaluated to ensure that the IT investment supports the enterprise strategy and goals. References:= CGEIT Exam Content Outline, Domain 1: Governance of Enterprise IT, Subtopic A: Governance Framework, Task 1: Establish and maintain a governance framework that aligns with enterprise objectives, ensures value creation from IT-enabled investments, and manages risk at an acceptable level.
insert code

Question 112

An enterprise has lost an unencrypted backup tape of archived customer dat a. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?

Correct Answer: C
From an ethical standpoint, the enterprise should communicate the breach to customers, because they have a right to know that their personal data has been compromised and may be at risk of identity theft, fraud, or other malicious activity. Even if the data breach report is not mandatory in the relevant jurisdiction, the enterprise has a moral duty to respect the privacy and dignity of its customers, and to be transparent and accountable for its actions. Communicating the breach to customers can also help to preserve the trust and reputation of the enterprise, and to mitigate the potential legal and financial consequences of the breach. According to some data ethics experts, data breaches should be treated as public health issues, and organizations should adopt a proactive and responsible approach to inform and protect their customers12. Some examples of data breach communication best practices are: notifying customers as soon as possible, providing clear and accurate information about the nature and extent of the breach, explaining what actions the enterprise is taking to remedy the situation and prevent future incidents, offering assistance and support to affected customers, such as identity protection services or credit monitoring, and apologizing sincerely and expressing commitment to data ethics34.
Reference:
Data ethics: What it means and what it takes | McKinsey
The Skeleton of a Data Breach: The Ethical and Legal Concerns
Data breaches: A public health issue? | TheHill
How to Communicate a Data Breach Effectively - IT Governance Blog
insert code

Question 113

An enterprise plans to implement a business intelligence (Bl) tool with data sources from various enterprise applications. Which of the following is the GREATEST challenge to implementation?

Correct Answer: C
insert code

Question 114

Fill in the blank with an appropriate phrase.
The _________ provides investment management services to the firm and directs on how to take decisions on fund.

Correct Answer:
fund manager
insert code

Question 115

Fill in the blank with an appropriate phrase.
_______are activities that are dangerous to complete and manage such as construction, electrical work, or manufacturing.

Correct Answer:
Pure risks
insert code
  • ««
  • «
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CGEIT.v2026-01-12.q170 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.