Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?
Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?
At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?
Which of the following lists best describes the classification of manufacturing costs?
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and
telecommunications, but does not have servers or infrastructure equipment?
Which of the following best explains the matching principle?
Which of the following scenarios best illustrates a spear phishing attack?
An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Which of the following principles s shared by both hierarchies and open organizational structures?
1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. Employees at all levels should be empowered to make decisions.
Which of the following sites would an Internet service provider most likely use to restore operations after its servers were damaged by a natural disaster?
According to The IIA's Three Lines Model, which of the following IT security activities is commonly shared by all three lines?
Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
Which of the following is a likely result of outsourcing?
The manager of the sales department wants to Increase the organization's net profit margin by 7% (from 43% in the prior year to 50% in the current year). Given the information provided in the table below, what would be the targeted sales amount for the current year?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
An organization's account for office supplies on hand had a balance of $9,000 at the end of year one. During year two. The organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11 ,500 in office supplies on hand. Based on this Information, what would he recorded in the adjusting entry an the end of year two?
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?
Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?
The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
1. Favorable labor efficiency variance.
2. Adverse labor rate variance.
3. Adverse labor efficiency variance.
4. Favorable labor rate variance.
Which of the following IT layers would require the organization to maintain communication with a vendor in a tightly controlled and monitored manner?
Which of the following is a systems software control?
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?
Which of the following techniques would best detect an inventory fraud scheme?
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Which of the following can be viewed as a potential benefit of an enterprisewide resource planning system?
Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?
When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
Which of the following physical security controls is able to serve as both a detective and preventive control?
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?
Which of the following best describes depreciation?
Which of the following is an example of a physical control?
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?
According to IIA guidance on IT, which of the following controls the routing of data packets to link computers?
Which of these instances accurately describes the responsibilities for big data governance?
How can the concept of relevant cost help management with behavioral analyses?
Which of the following is a limitation of the remote wipe for a smart device?
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
Which of the following activities best illustrates a user's authentication control?
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?