You are on page 1of 2

Answer of Past Year Question APRIL 2010 PART A 6.

Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses? A. Chief Information Officer B. Chief Privacy Officer (CFO) C. Chief Technology Officer (CTO) D. Chief Security Officer (CSO) Answer of Past Year Question APRIL 2009 PART A 9. It is the responsibility of the CIO to ensure effective communications between business and IT personnel. TRUE 9. Broad function of a CIO includes all of the following, except: A. ensuring the delivery of all IT projects, on time and within budget. B. ensuring that the strategic vision of IT is in line with the strategic vision of the organization. C. building and maintaining strong executive strong executive relationships. D. building and maintaining strong customer processes.

Answer of Past Year Question


OCT 2009
PART A
5) It is the responsibility of the Chief Information Officer (CIO) to ensure effective communications between business and Information Technology (IT) personnel. TRUE

PART B
4) Who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organizations information technology? A. CIO (Chief Information Officer) B. CPO (Chief Privacy Officer) C. CTO (Chief Technology Officer) D. CSO (Chief Security Officer)

PART C
B) Briefly explain the responsibility of CIO, CTO, CSO, CPO, and CKO. CIO responsibility is to ensure the strategic alignment of IT with business goals and objectives. CIO must possess a solid and detailed understanding of every aspect of an organization coupled with tremendous insight into the capacity of IT. CIOs must have strong IT skills. CTO responsibility is for ensuring the throughput, speed, accuracy, availability, and reliability of IT. CTOs have direct responsibility for ensuring the efficiency of IT systems throughout the organization and possess well-rounded knowledge of all aspects of IT including hardware, software, and telecommunications. CSO is responsible for ensuring the security system. Developing strategies against attacks from hackers and viruses. CPO is responsible for ensuring the ethical and legal use of information. CKO is responsible for collecting, maintaining, and distributing the organizations knowledge. CKOs design product and systems that make it easy for people to reuse knowledge.

You might also like