11.11 Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Isaca COBIT-Design-and-Implementation Dumps Questions Answers

ISACACOBIT Design and Implementation certificate Questions and Answers

Question 1

Which of the following is the BEST approach to resolve competing priorities for the design of a governance system?

Options:

A.

Base the design on initiatives that will yield the most immediate benefit for the enterprise.

B.

Defer to risk and assurance management to determine priorities.

C.

Utilize generic, pre-programmed computations to generate quantitative priorities for governance objectives.

D.

Include all key stakeholders in the discussion of the design.

Buy Now
Question 2

It is CRITICAL to perform a due diligence review following which type of event?

Options:

A.

Shifts in the market or economy

B.

Merger, acquisition, or divestiture

CNew business strategy or priority

C.

External consultant assessment

Question 3

While tailoring design factors, which of the following roles of IT demonstrates the HIGHEST level of enterprise dependency on I&T?

Options:

A.

Turnaround

B.

Strategic

C.

Support

D.

Factory

Question 4

What is a PRIMARY responsibility of the program management office during the planning phase that defines the initial program concept business case?

Options:

A.

Identifying business priorities and business strategy dependent on IT

B.

Providing advice regarding controls and potential risks

C.

Identifying success factors and a way to monitor progress

D.

Ensuring that both needs and business objectives are stated

Question 5

Which of the following is a KEY change enablement task that must be completed during the driver identification phase of an IT initiative?

Options:

A.

Identify the business and governance drivers.

B.

Define high-level improvement targets.

C.

Assign high-level roles and responsibilities.

D.

Establish urgency for the changes needed.

Question 6

Which of the following is the PRIMARY benefit or output derived from setting targeted capability levels and performing a capability-level gap analysis for selected processes?

Options:

A.

Identification of process improvement opportunities

B.

Identification and mitigation of all identified risks

C.

Development of enterprise goals that align to established targets

D.

Development of a business case outline

Question 7

After a bank experienced cyber attacks that severely impacted operations and raised questions from regulators, the board mandated the newly hired CIO to implement global best practices to mitigate thisrisk. The CIO is using COBIT 2019 to tailor the governance system and has identified high threat landscape as a critical design factor. Which of the following should the CIO identify NEXT?

Options:

A.

Security-related processes

B.

Risk management practices

C.

IT security solutions

D.

Technology personnel

Question 8

Which function within the IT corporate structure is responsible for classifying information using an agreed-upon classification scheme for a new data collection system?

Options:

A.

Information security

B.

Information privacy

C.

.IT governance

D.

Enterprise architecture

Question 9

Options:

A.

Risk frameworks

B.

Implementation costs

C.

Enterprise goals

D.

Performance management

Question 10

A traditional brick-and-mortar company is planning to fast-track its growth by implementing an information and technology governance system to achieve enterprise goals. Which of the following is the KEY enabler of success in achieving the goals?

Options:

A.

Establishing applicable governance and management objectives

B.

Setting capability levels for key business processes

C.

Conducting stafftraining programs for performing IT-enabled processes

D.

Tailoringthe security policy according to the technology deployed

Question 11

Which of the following functions would be responsible for executing a contract that retains independent legal consultants to review the level of regulatory compliance of a proposed IT solution?

Options:

A.

I&T security

B.

Executive leadership team

C.

Legal office

D.

Procurement office

Question 12

Which of the following would BEST enable the prioritization of governance objectives?

Options:

A.

The IT strategic plan

B.

A matrixed scoring methodology

C.

The enterprises risk tolerance

D.

Expected performance outcomes

Question 13

Which of the following components should be considered for inclusion when considering the threat landscape design factor?

Options:

A.

Compliance and assurance capabilities

B.

Information security focus areas

C.

Information flows including security policy

D.

Impact and probability levels

Question 14

Who is responsible for performing a stakeholder satisfaction survey and gathering feedback on lessons learned from the implementation of an EGIT program plan?

Options:

A.

IT managers and IT process owners

B.

The risk and compliance function and IT audit

C.

The CIO and the programsteeringcommittee

D.

Business executives and the l&T governance board

Question 15

Who is responsible for monitoring the achievement of the overall EGIT implementation program plan results, including the achievement of goals and realization of benefits?

Options:

A.

IT managers

B.

IT process owners

C.

Program steering committee

D.

ICIO

Question 16

A CEO of a domestic enterprise plans to expand its operations globally. The CEO has selected enterprise goals using the COBIT goals cascade and has tasked the CIO with tailoring COBIT as required. After selecting the relevant alignment goals, which of the following should be the CIOsNEXTpriority?

Options:

A.

Management objectives

B.

Design factors

C.

Organizational structure

D.

Management activities

Question 17

When tailoring a governance system using COBIT 2019 for a nonprofit enterprise seeking to improve IT service delivery, which of the following enterprise strategy design factors is MOST relevant?

Options:

A.

Cost

B.

Stability

C.

Innovation

D.

Growth

Question 18

Which of the following describes the difference between the Risk Profile design factor and the I&T-Related Issues design factor?

Options:

A.

IT risk scenarios describe potential events that could impact the organization in the future, whereas IT issues describe events or current situations affecting the organization.

B.

IT risk scenarios are more detailed and IT issues are more summarized and the organization can decide which one to use when designing its governance system

C.

IT issues describe potential events that could impact the organization in the future, whereas IT risk scenarios describe events or current situations affecting the organization.

D.

IT risk scenarios have been described in more detail the COBIT 2019 Design Guide that IT issues in order to cover a wide range of potential risk