Which item describes a key component of a Governance System?
A. Setting the Governance Framework
B. Identifying responsibilities for governance
C. Ensuring compliance with regulations
D. Optimization of IT assets, resources and capabilities
In what order would the following outputs of the COBIT 5 Goals cascade mechanism be produced?
1.
Enterprise Goals
2.
Stakeholder needs 3 Enabler Goals
4. IT-related Goals
A. 2, 1, 4, 3
B. 1, 2, 3, 4
C. 2. 3, 1, 4
D. 3, 2, 4, 1
What do lead indicators monitor in the Generic Enabler model?
A. Good practices are being applied
B. Stakeholder needs are being addressed
C. Enabler goals are being achieved
D. Enabler outcomes are being made available
In what order would the following stages of the Information Cycle occur?
1 Transform Information 2 Create Value 3 Transform Knowledge
A. 2,3,1
B. 1,2,3
C. 3,1,2
D. 1,3,2
What is a collection of practices influenced by the enterprise's policies and procedures that takes input from a number of sources, manipulates the inputs and produces outputs known as?
A. Process
B. Intrinsic goals
C. Enterprise goals
D. Dimensions
What is the name of the architectural principle that meets changing business needs effectively and efficiently?
A. Reuse
B. Agility
C. Simplicity
D. Openness
Which of the following figures BEST illustrates the context of an enterprise governance of information and technology (EGIT) system?
A.
B.
C.
Which COBIT principle addresses the need to consider how any changes in technology or strategy impact the enterprise governance system as a whole?
A. A governance system should be tailored to the enterprise's needs
B. A governance system should cover the enterprise end to end
C. A governance system should be dynamic
Which of the following components of the governance system are required for successful completion of all activities?
A. Principles, policies and frameworks
B. Processes
C. People, skills and competencies
Which of the following is a CRITICAL requirement when the IT function is strategic and crucial to the success of the business?
A. Highly capable security-related processes and ensured risk optimization
B. High involvement of IT-related roles in organizational structures
C. Documented IT policies and procedures