Gest S 483
Gest S 483
Question Part 1:
- 1. Which one of the following definitions does not characterize an
Advanced persistent threats (APTs) ?
Anything that is capable of acting against an asset in a manner that can result in harm
Control
Secure optimal value from I&T-enabled initiatives, services and assets; cost-effective delivery
of solutions and services; and a reliable and accurate picture of costs and likely benefits so
that business needs are supported effectively and efficiently = EDM02
Ensure that the enterprise is compliant with all applicable external requirements = MEA03
Realize desired business value and reduce the risk of unexpected delays, costs and value
erosion. To do so, improve communications to and involvement of business and end users,
ensure the value and quality of program deliverables and follow-up of projects within the
programs, and maximize program contribution to the investment portfolio = BAI01
Support the digital transformation strategy of the organization and deliver the desired value
through a road map of incremental changes. Use a holistic I&T approach, ensuring that each
initiative is clearly connected to an overarching strategy. Enable change in all different
aspects of the organization, from channels and processes to data, culture, skills, operating
model and incentives = APO02
- 6. Match some of the seven Management component to their most relevant definitions:
Informations and Technology Governance Framework
Desired behavior into practical guidance for day to day management = (long answer)
- 9. Which of the following is an alignment Goals related to the “Internal and Operations”
dimension of an Information and Technology organisation ?
Delivery of programs on time on budget and meeting requirements and quality standards
- 12. Which of the following is an Entreprise Goals related to the “Financial” dimension of an
Information and Technology organisation ?
Portfolio of competitive products and services
- 13. Digital Entreprises Manage Work Through Products Not Projects. Indicate those
elements that are more specific to PRODUCTS (than to projects). Select all that apply to
PRODUCTS.
Stops when product is retired, delivers regular releases until then; but resourcing and
releases may diminish late in life cycle
- 14. What are the three main activities related to the governance of Information
Technology Risks ? Select the three answers that apply.
---Risk Governance : Establish and Maintain a Common Risk View – Integrate with Enterprise
Risk Management – Make Risk-aware Business Decisions
---Risk Response: Articulate Risk – Manage Risk – React to Events
---Risk Evaluation: Collect Data – Analyse Risk – Maintain Risk Profile
- 16. What is the most logical sequence that organisations take when implementing the GRC
concept.
Compliance, Risk and finally Governance
- 17. The waterfall model is a classical model used in systeme development life cycle to
create a system with a linear and sequential approach. Which one is an advantage of a
waterfall approach (all others are drawbacks/disadvantages).
Upfront planning and in-depth documentation
- 19. Where would a customer’s initial service targets be recorded before the service level
agreement (SLA) is produced? Choose one right answer.
In a list of service level requirements (SLR)
- 20. Which is the CORRECT explanation of how a service facilitates an outcome ? Choose
one right answer
By enhancing the performance of associated tasks and reducing the effect of constraints
- 21. A vulnerability is “an exploitable weakness that results in a loss.” Associate the
vulnerabilities to their categories.
Errors in management: decision-making:planning or ignorance = Organizational
Coding errors: inadequate passwords:Open network ports = Technical
Failure to monitor logs: Failure to patch software = Process
Errors in design; Implementation; Placement or configuration = Technical
- 22. What risk response is related to the fact of “Contracting an insurance”. Select only one
answer.
Risk Transfer
- 23. Risks should be prioritized based on which three of the following elements?
Threat occurrences
Vulnerability level
Strategy and Security needs of the organisation
- 24. Which are the five major domains of activity as defined by the NIST Cybersecurity
framework ?
Identify
- 25. Which of the following stakeholders are to be involved in addressing information and
technology management objectives and related activities and who should be held
accountable for achieving expected outcome, implementing performance and indicators
and improving maturity components.
- 26. Indicate which symptom is related to an organisation that does not have a high
maturity in the Process component ?
Software development life cycle method is not adopted by the organisation. Each project
improvises a specific development methodology, but many are labelled as agile methods
- 1. Trinichain decided to move most of its data storage to the cloud. They signed an
agreement with a leading Cloud services provider to host all personal data and financial
records of the bank clients. While evaluating the feasibility of that move, which of the
following management objectives should be considered during the build phase to ensure the
integration of new with existing technologies in a coherent and maintainable manner ?
- 2. While evaluating the use of cloud services in relation to the adequate protection of clients
personal data, which of the following management objectives should be considered ?
- 3. To ensure continued client satisfaction during the move to the cloud, the senior
management of Trinichain requested to implement performance indicators tracking the
impact on clients. Which of the following indicators is not relevant ?
- 4. When the new systems were integrated and cloud storage was completely connected to
core applications, the banking authority wished to ensure that only approved and tested
systems were operating the new applications. Which management objective will be required
- 5. Then bank decided to initiate a major investment program in a new banking application
that allows to access clients banking activites through their social media and IOT devices.
They decided to go in a step by step phases to ensure all decisions are adequately made and
authorized by senior management. They adopted a systems development life cycle method
for the initiation of this program.
- 6. When the program scope and objectives are adequately defined, the CIO initiated and
activity to evaluate the effort and the cost of the investment. Prior to that, it is essential that
one of the following actions are performed:
- 8. Establish a project baseline that is appropriately reviewed approved and incorporated into
the integrated project plan.
- 11. Trinichain management identified recurrent pain points within their organisation.
Which management domain should be addressed in priority to reduce the impact of
those pain points:
-Insufficient IT resources,staff with inadequate skills or staff burnout
-Excessively high costs of IT
-Service delivery problems by the IT outsource
Frustration between business departements and the IT department because of failed
initiatives or a perception of low contribution to business value
Select the domain that should gain high maturity to reach the required mitigation target: