Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software

that will remotely wipe data in case of theft or other incidents.

Which of the following should the organization ensure in exchange for the employees' consent?

A.

That those employees who do not consent to MDM software cannot have an email account.

B.

That personal data on the device cannot be accessed and deleted by system administrators.

C.

That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.

D.

That employee consent includes appropriate waivers regarding potential breaches to their privacy.

Which of the following statements is true regarding an organization's servers?

A.

Servers optimize data processing by sharing it with other computers on the information system

B.

Servers manage the interconnectivity of system hardware devices in the information system.

C.

Servers manage the data stored in databases residing on the information system.

D.

Servers enforce access controls between networks transmitting data on the information system

Which of the following authentication controls combines what a user knows with the unique characteristics of the user respectively?

A.

Voice recognition and token.

B.

Password and fingerprint.

C.

Fingerprint and voice recognition

D.

Password and token

Which of the following statements is true regarding cybersecurity risk?

A.

Cybersecurity risks are identical across all organizations regardless of industry

B.

Installation of antivirus and malware software prevents cybersecurity risks

C.

Deployment of proper cybersecurity measures assures business success

D.

Information value extends the emergence of cybersecurity risks

Which of the following risks would involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a focal area?

A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Which of the following examples demonstrates that the internal audit activity uses descriptive analytics in its engagements?

A.

An internal auditor analyzed electricity production and sales interim reports and compiled a risk assessment.

B.

An internal auditor extracted sales data to a spreadsheet and applied judgmental analysis for sampling.

C.

An internal auditor classified solar panel sales by region and discovered unsuccessful sales

representatives.

D.

An internal auditor broke down a complex process into smaller pieces to make it more understandable.

An organization is considering outsourcing its IT services, and the internal auditor is assessing the related risks. The auditor grouped the related risks into three categories:

Risks specific to the organization itself.

Risks specific to the service provider.

Risks shared by both the organization and the service provider.

Which of the following risks should the auditor classify as specific to the service provider?

A.

Unexpected increases in outsourcing costs.

B.

Loss of data privacy.

C.

Inadequate staffing.

D.

Violation of contractual terms.

Which of the following statements is true regarding user-developed applications (UDAs) and traditional IT applications?

A.

UDAs and traditional IT applications typically follow a similar development life cycle.

B.

A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.

C.

Unlike traditional IT applications, UDAs typically are developed with little consideration of controls.

D.

IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.

Which of me following statements is true regarding the reporting of tangible and intangible assets?

A.

For plant assets cost includes the purchase price and the cost of design and construction

B.

For intangible assets cost includes the purchase price and development costs

C.

Due to their indefinite nature intangible assets are not subject to amortization

D.

The organization must expense any cost incurred in developing a plant asset

Which of me following is true of matrix organizations?

A.

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager

B.

A combination of product and functional departments allows management lo utilize personnel from various functions

C.

Authority responsibility and accountability of the units involved may vary based on the project's life, or the organization's culture

D.

It is best suited for firms with scattered locations or for multi-lira. large-scale firms