3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
Which of the following statements is true regarding the management-by-objectives method?
Which of the following security controls would be me most effective in preventing security breaches?
Which of these instances accurately describes the responsibilities for big data governance?
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the
following would be a characteristic of the now highly centralized organization?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?
An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
During which phase of the contracting process ere contracts drafted for a proposed business activity?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?
Which of the following capital budgeting techniques considers the expected total net cash flows from investment?
Which of the following is an effective preventive control for data center security?
A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?
Which of the following statements distinguishes a router from a typical switch?
Which of the following best describes the primary objective of cybersecurity?
In accounting, which of the following statements is true regarding the terms debit and credit?
A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?
An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?
Which of the following scenarios best illustrates a spear phishing attack?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
Which of the following is a disadvantage in a centralized organizational structure?
An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?
Which of the following would be a concern related to the authorization controls utilized for a system?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25.000 shirts. Actual sales total S300.000. What is margin of safety sales for the company?
An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?
A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software that will remotely wipe data in case of theft or other incidents. Which of the following should the organization ensure in exchange for the employees' consent?
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?
An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?