New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CGEIT Exam - Topic 10 Question 2 Discussion

Actual exam question for Isaca's CGEIT exam
Question #: 2
Topic #: 10
[All CGEIT Questions]

An enterprise considers implementing a system that uses a technology that is not in line with its IT strategy. The business case indicates significant benefit to the enterprise. Which of the following is the BEST way to manage this situation within an IT governance framework?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Eleni
4 months ago
Significant benefits can sometimes outweigh alignment issues.
upvoted 0 times
...
Tish
4 months ago
Option D makes sense, exceptions can be useful if justified.
upvoted 0 times
...
Pearlie
4 months ago
Surprised this is even a question! Non-alignment should be a hard no.
upvoted 0 times
...
Holley
4 months ago
I disagree, we shouldn't just change our strategy for one tech.
upvoted 0 times
...
Anglea
5 months ago
Updating the IT strategy seems like the best move.
upvoted 0 times
...
Annamae
5 months ago
Updating the IT strategy seems like it could lead to more flexibility, but I wonder if it might cause confusion in the long run.
upvoted 0 times
...
Dannie
5 months ago
I think we practiced a question similar to this where we had to weigh the benefits against the risks of changing the strategy.
upvoted 0 times
...
Antione
5 months ago
I remember discussing how aligning IT strategy with new technologies can sometimes be beneficial, but I'm not sure if it's always the best move.
upvoted 0 times
...
Laquanda
5 months ago
I feel like rejecting based on non-alignment could be too rigid, but I'm uncertain if the architecture exception process is the right approach either.
upvoted 0 times
...
Gaynell
5 months ago
Okay, let's see... I know iPXE is related to network booting, so it's probably IPv4 and TFTP.
upvoted 0 times
...
Nicholle
5 months ago
This is a tricky one. I know Certificate-based VPNs are more secure, but I'm not sure if that applies across different vendors. I'll make sure to read the question thoroughly and consider all the options before answering.
upvoted 0 times
...
Marguerita
5 months ago
I'm a bit unsure about this one. I know there are different types of permissions, but I'm not sure I can confidently identify the two correct options here. I'll have to think it through.
upvoted 0 times
...
Stephaine
5 months ago
I did practice some questions on this, and I feel like the answer might lean towards 1962, but it could also be 1955.
upvoted 0 times
...

Save Cancel