Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > COBIT > COBIT-Design-and-Implementation

COBIT-Design-and-Implementation ISACACOBIT Design and Implementation certificate Question and Answers

Question # 4

Who would be identified as an external stakeholder when soliciting feedback on a business case associated with a new system upgrade to satisfy new regulations?

A.

Implementation team

B.

Staff utilizing the solution

C.

IT audit committee

D.

Current IT service vendor

Full Access
Question # 5

Which of the following tools would be MOST useful for measuring and monitoring performance and the realization of benefits from an EGIT implementation program plan project?

A.

IT balanced scorecard

B.

Project management software

C.

Gantt chart

D.

RACI chart

Full Access
Question # 6

What can management do to help ensure a planned IT initiative will meet future state objectives?

A.

Conduct stage gate reviews during implementation.

B.

Establisha return on investment (ROI)target.

C.

Monitor key risk indicators (KRIs).

D.

Define operational performance metrics.

Full Access
Question # 7

When considering the IT implementation methods design factor, and the design factor value is agile, which of the following should be a management objective priority?

A.

Managed data (AP014)

B.

Managed enterprise architecture

C.

Managed risk

D.

Managed IT changes

Full Access
Question # 8

Which of the following is BEST suited for evaluating the performance of processes?

A.

Key performance areas

B.

Aligned goals

C.

Capability levels

D.

Key goal indicators

Full Access
Question # 9

Which of the following would a COBIT implementation expert consider as a COBIT design factor in tailoring enterprise strategy?

A.

Cost leadership

B.

Risk optimization

C.

Business transformation

D.

Value delivery

Full Access
Question # 10

Which of the following is an example of a specific focus area to which COBIT could be customized?

A.

Information items

B.

Cybersecurity

C.

Capability levels

D.

Enterprise goals

Full Access
Question # 11

When adapting the goals cascade of the COBIT 2019 framework, an enterprise with a growth strategy is MOST likely to select which of the following enterprise goals?

A.

Managed digital transformation programs

B.

Portfolio of competitive products and services

C.

Quality of management information

D.

Optimization of business process costs

Full Access
Question # 12

When assessing the current state of I&T, a continual improvement task includes:

A.

developing metrics to monitor l&T performance.

B.

identifying potential process improvements.

C.

identifying key enterprise and supporting alignment goals.

D.

raising executive awareness of IT and the value of EGIT.

Full Access
Question # 13

Which of the following needs to be resolved when finalizing the initial governance design?

A.

Misaligned enterprise and IT goals

B.

Budgeted versus actual resources

C.

Objectives exceeding enterprise appetite

D.

Conflicting inputs and priorities

Full Access
Question # 14

Which of the following is a KEY change enablement task that must be completed during the driver identification phase of an IT initiative?

A.

Identify the business and governance drivers.

B.

Define high-level improvement targets.

C.

Assign high-level roles and responsibilities.

D.

Establish urgency for the changes needed.

Full Access
Question # 15

At which stage of the governance system design flow are design factors translated into governance and management priorities?

A.

Concluding the governance system design

B.

Understanding the enterprise strategy

C.

Determining the initial scope

D.

Refining the scope

Full Access
Question # 16

An enterprise is considering threat landscape as a design factor for its governance system. Which of the following would be a reason to classify the threat landscape as high?

A.

IT trends that could be used in favor of the enterprise

B.

Service delivery problems byIT outsourcers

C.

Geopolitical situations affecting the enterprise

D.

Potential new competitors entering the market

Full Access
Question # 17

After a bank experienced cyber attacks that severely impacted operations and raised questions from regulators, the board mandated the newly hired CIO to implement global best practices to mitigate thisrisk. The CIO is using COBIT 2019 to tailor the governance system and has identified high threat landscape as a critical design factor. Which of the following should the CIO identify NEXT?

A.

Security-related processes

B.

Risk management practices

C.

IT security solutions

D.

Technology personnel

Full Access
Question # 18

In which of the following phases should long-term targets be adjusted based on experience?

A.

How do we get there?

B.

Where are we now?

C.

What needs to be done?

D.

Did we get there?

Full Access