Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following security controls would provide the most efficient and effective authentication for customers to access their online shopping account?

A.

12-digit password feature.

B.

Security question feature.

C.

Voice recognition feature.

D.

Two-level sign-on feature.

Which of the following statements is true regarding the capital budgeting procedure known as discounted payback period?

A.

It calculates the overall value of a project

B.

It ignores the time value of money

C.

It calculates the time a project takes to break even.

D.

It begins at time zero for the project.

According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization's network and data?

A.

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations

B.

Drafting a strong contract that requires regular vendor control reports and a right-to-audit clause.

C.

Applying administrative privileges to ensure right-to-access controls are appropriate

D.

Creating a standing cybersecurity committee to identify and manage risks related to data security

An internal auditor is reviewing the organization's performance appraisal process. Which of the following methods would be most effective to identify stereotyping?

A.

Use a behaviorally anchored rating scale to Break down jobs into their components.

B.

Analyze and compare the ratings for different classes or groupings of employees.

C.

Compare the ratings of selective employees with their previous appraisals.

D.

Analyze the number and percentages of employee appraisals that fall into each rating category

According to HA guidance or IT which of the following spreadsheets is most likely to be considered a high-risk user-develop application?

A.

A revenue calculation spreadsheet supported with price and volume reports from the production department

B.

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions

C.

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantitates

D.

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances.

Which of the following is the best example of IT governance controls?

A.

Controls that focus on segregation of duties, financial and change management

B.

Personnel policies that define and enforce conditions for staff in sensitive IT areas

C.

Standards that support IT policies by more specifically defining required actions

D.

Controls that focus on data structures and the minimum level of documentation required

Which of the following statements is true regarding cost-volume-profit analysis?

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.

B.

Breakeven point is the amount of units sold to cover variable costs.

C.

Breakeven occurs when the contribution margin covers fixed costs

D.

Following breakeven, net operating income will increase by the excess of fixed costs less the variable costs per units sold

Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?

A.

Perform gap testing.

B.

Join different data sources.

C.

Perform duplicate testing.

D.

Calculate statistical parameters.

An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is unable to get the desired return on investment and output per hour of labor. Based on this information the organization is most likely focused on which of the following?

A.

Capital investment and not marketing

B.

Marketing and not capital investment.

C.

Efficiency and not input economy.

D.

Effectiveness and not efficiency.

Which of the following data analytics tools would be applied by an internal audit activity positioned at the lowest level of maturity?

A.

Workflow and data capture technology

B.

Data visualization applications.

C.

Software integrated with central data warehouse

D.

Spreadsheets.