Which of the following activities best illustrates a user's authentication control?
An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.
Which of the following would be considered the most significant cyber threat to the organization?
A manager decided to build his team's enthusiasm by giving encouraging talks about employee empowerment, hoping to change the perception that management should make all decisions in the department.
The manager is most likely trying to impact which of the following components of his team's attitude?
The critical path for any project is the path that exhibits which of the following characteristics?
Which of the following controls would be the most effective in preventing the disclosure of an organization’s confidential electronic information?
What would an internal auditor do to ensure that a process to mitigate risk is in place for the organization's change management process?
Which of the following factors is most responsible for the increasing risk that unauthorized parties may obtain or tamper with personal data?
During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an analytics tool to identify the top five vendors that received the highest sum of payments.
Which of the following analytics techniques did the auditor apply?
Which of the following is a logical access control designed to enhance the security of a computer-based application system?
An internal auditor computed that one of the organization's accounting divisions is processing 30 travel reports per hour while another accounting division is processing 22 travel reports per hour.
Which of the following efficiency measures did the internal auditor most likely employ?