Which of the following is the MOST important reason to include internal audit as a stakeholder when establishing clear roles for the governance of IT?
Communicating which of the following to staff BEST demonstrates senior management's commitment to IT governance?
Which of the following roles should be responsible for data normalization when it is found that a new system includes duplicates of data items?
An enterprise has lost an unencrypted backup tape of archived customer data. A data breach report is not mandatory in the relevant jurisdiction. From an ethical standpoint, what should the enterprise do NEXT?
Which of the following BEST facilitates governance oversight of data protection measures?
Following a strategic planning session, new IT objectives were announced. Which of the following is the MOST effective way for the CIO to ensure these objectives are cascaded to IT personnel?
Which of the following is the MOST important consideration when developing a new IT service'?
An analysis of an organization s security breach is complete. The results indicate that the quality of the code used for updates to its primary customer-facing software has been declining and security flaws were introduced. The FIRST IT governance action to correct this problem should be to review:
Which of the following is the MOST valuable input when quantifying the loss associated with a major risk event?
Which of the following is MOST important to consider when planning to implement a cloud-based application for sharing documents with internal and external parties?
An internal audit revealed a widespread perception that the enterprise's IT governance reporting lacks transparency Which of the following should the CIO do FIRST?
Which of the following BEST supports the implementation of an effective data classification policy?
An enterprise is considering outsourcing non-core IT processes Which of the following should be the FIRST step?
The MAIN responsibility of the board of directors regarding the management of enterprise risk is to:
Which of the following BEST supports an enterprise's ability to comply with privacy laws and regulations?