Which of the following is the MOST effective means for IT management to report to executive management regarding the value of IT?
A. IT process maturity level
B. Cost-benefit analysis
C. Resource assessment
D. Balanced scorecard
Which of the following should be management's GREATEST consideration when trying to optimize the use of benefits from IT?
A. Value delivery
B. Quality management
C. Process improvement
D. Alignment of business to IT
The CEO of a large enterprise has announced me commencement of a major business expansion that will double the size of the organization. IT will need to support the expected demand expansion. What should the CIO do FIRST?
A. Review the resource utilisation matrix.
B. Recruit IT resources based on the expansion decision.
C. Embed IT personnel in the business units.
D. Update the IT strategic plan to align with the decision.
An enterprise's information security function is making changes to its data retention and backup policies. Which of the following presents the GREATEST risk?
A. Business data owners were not consulted.
B. The new policies Increase the cost of data backups.
C. Data backups will be hosted at third-party locations.
D. The retention period for data backups is Increased.
Which of the following BEST facilitates governance oversight of data protection measures?
A. Information ownership
B. Information classification
C. Information custodianship
D. Information life cycle management
A large retail chain realizes that while there has not been any loss of data, IT security has not been a priority and should become a key goal for the enterprise. What should be the FIRST high-level initiative for a newly created IT strategy committee in order to support this business goal?
A. Identifying gaps in information asset protection
B. Defining data archiving and retrieval policies
C. Recruiting and training qualified IT security staff
D. Modernizing internal IT security practices
Which of the following should be the ClO's GREATEST consideration when making changes to the IT strategy'?
A. Has the impact to the enterprise architecture (EA) been assessed?
B. Has the investment portfolio been revised?
C. Have key stakeholders been consulted?
D. Have IT risk metrics been adjusted?
Which of the following is the BEST way to ensure new systems can be adequately supported once in production?
A. Establish a resource management framework.
B. Evaluate the operational requirements of the business stakeholders.
C. Identify key performance indicators (KPIs).
D. Require operational management be identified in the business case.
The CIO of a global technology company is considering introducing a bring your own device (BYOD) program. What should the CIO do FIRST?
A. Ensure the infrastructure can meet BYOD requirements.
B. Establish a business case.
C. Define a clear and inclusive BYOD policy.
D. Focus on securing data and access to data.
Which of the following issues identified during an IT review is MOST important to address to improve the alignment between the business and IT?
A. Services in the IT portfolio are not traceable to the IT strategy.
B. IT strategy reviews are conducted only after business strategy changes.
C. Business satisfaction surveys are not conducted regularly.
D. IT dashboards have not been established.