What is the lowest level of the IT governance maturity model where an IT balanced scorecard exists?
What is the lowest level of the IT governance maturity model where an IT balanced scorecard
exists?
Which of the following BEST ensures that modifications made to in-house developed business applications do not
Which of the following BEST ensures that modifications made to in-house developed business
applications do not introduce new security exposures?
Which project management plan will be the best guide for John to communicate to the external stakeholders?
John is the project manager of the NHQ Project for his company. His project has 75 stakeholders,
some of which are external to the organization. John needs to make certain that he communicates
about risk in the most appropriate method for the external stakeholders. Which project
management plan will be the best guide for John to communicate to the external stakeholders?
Responsibility for the governance of IT should rest with the:
Responsibility for the governance of IT should rest with the:
The advantage of Virtual Private Network (VPN) tunneling for remote users is that it:
The advantage of Virtual Private Network (VPN) tunneling for remote users is that it:
Where should she document the risks associated with this technology so she can track the risk status and respo
Adrian is a project manager for a new project using a technology that has recently been released
and there’s relatively little information about the technology. Initial testing of the technology makes
the use of it look promising, but there’s still uncertainty as to the longevity and reliability of the
technology. Adrian wants to consider the technology factors a risk for her project. Where should
she document the risks associated with this technology so she can track the risk status and
responses?
What should the IS auditor recommend?
An IS auditor identifies that reports on product profitability produced by an organization’s finance
and marketing departments give different results. Further investigation reveals that the product
definition being used by the two departments is different. What should the IS auditor recommend?
Which of the following is MOST effective for securing wireless networks as a point of entry into a corporate n
Which of the following is MOST effective for securing wireless networks as a point of entry into a
corporate network?
Which of the following controls would you use that BEST protects an enterprise from unauthorized individuals g
You are the administrator of your enterprise. Which of the following controls would you use that
BEST protects an enterprise from unauthorized individuals gaining access to sensitive
information?
From a control perspective, the key element in job descriptions is that they:
From a control perspective, the key element in job descriptions is that they: