Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following activities best illustrates a user's authentication control?

A.

Identity requests are approved in two steps.

B.

Logs are checked for misaligned identities and access rights.

C.

Users have to validate their identity with a smart card.

D.

Functions can be performed based on access rights.

An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.

Which of the following would be considered the most significant cyber threat to the organization?

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports.

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing the financial information of the company.

A manager decided to build his team's enthusiasm by giving encouraging talks about employee empowerment, hoping to change the perception that management should make all decisions in the department.

The manager is most likely trying to impact which of the following components of his team's attitude?

A.

Affective component.

B.

Cognition component.

C.

Thinking component.

D.

Behavioral component.

The critical path for any project is the path that exhibits which of the following characteristics?

A.

Has the longest duration in time.

B.

Costs the most money.

C.

Requires the largest amount of labor

D.

Is deemed most important to the project.

Which of the following controls would be the most effective in preventing the disclosure of an organization’s confidential electronic information?

A.

Non-disclosure agreements between the firm and its employees

B.

Logs of user activity within the information system

C.

Two-factor authentication for access into the information system

D.

Limited access to information based on employee duties

What would an internal auditor do to ensure that a process to mitigate risk is in place for the organization's change management process?

A.

Develop and enforce change policies to ensure employees are continually trained.

B.

Apply a risk-based approach and impose segregation of duties related to the change management process.

C.

Conduct a high-level threat analysis and implement a compensating control.

D.

Validate authorization, segregation of duties, testing of changes, and approval to move changes into production.

Which of the following factors is most responsible for the increasing risk that unauthorized parties may obtain or tamper with personal data?

A.

The lack of legal and industry frameworks on privacy.

B.

The absence of generally accepted privacy principles.

C.

The rapid growth and evolution of technology.

D.

The legislated need to retain sensitive personal information.

During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an analytics tool to identify the top five vendors that received the highest sum of payments.

Which of the following analytics techniques did the auditor apply?

A.

Process analysis.

B.

Process mining.

C.

Data analysis.

D.

Data mining.

Which of the following is a logical access control designed to enhance the security of a computer-based application system?

A.

User accounts will be locked alter three unsuccessful attempts to access the system

B.

Users will not be allowed to use any of their last five passwords to access the system

C.

Users will be assigned rights to access the system based on their job responsibilities

D.

Users will automatically lose access to the system after 15 minutes of inactivity

An internal auditor computed that one of the organization's accounting divisions is processing 30 travel reports per hour while another accounting division is processing 22 travel reports per hour.

Which of the following efficiency measures did the internal auditor most likely employ?

A.

Operating rate.

B.

Asset efficiency rate.

C.

Resource utilization rate.

D.

Productivity rate.