Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is classified as a product cost using the variable costing method?

1) Direct labor costs

2) Insurance on a factory.

3) Manufacturing supplies.

4) Packaging and shipping costs

A.

1 and 2

B.

1 and 3

C.

2 and 4

D.

3 and 4

Which of the following is a key responsibility of a database administrator?

A.

Troubleshoot end user problems

B.

Provide production support.

C.

Provide physical security of databases

D.

Maintain database integrity

An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two.

Which of the following could be the reason for the decline in the net profit margin for year two?

A.

Cost of sales increased relative to sales.

B.

Total sales increased relative to expenses.

C.

The organization had a higher dividend payout rate in year two.

D.

The government increased the corporate tax rate.

When using cost-volume-profit analysts which of the following will increase operating income once the break-even point has been reached?

A.

Fixed costs per unit for each additional unit sold

B.

Variable costs per unit for each additional unit sold

C.

Contribution margin per unit for each additional unit sold

D.

Gross margin per unit for each additional unit sold

Which of the following most accurately describes the purpose of application authentication controls?

A.

To ensure that data input into business applications is valid, complete, and accurate.

B.

To prevent or detect errors in data processed using business applications.

C.

To ensure that business applications are protected from unauthorized logical access.

D.

To ensure the validity, accuracy, and completeness of outputs from business applications.

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet. When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book.

Which of the following controls would be most effective to prevent such an attack?

A.

Monitoring network traffic.

B.

Using whitelists and blacklists to manage network traffic.

C.

Restricting access and blocking unauthorized access to the network.

D.

Educating employees throughout the company to recognize phishing attacks.

Which of the following types of analytics focuses less on analysis and more on condensing data into mote meaningful pieces of information?

A.

Diagnostic analytics

B.

Descriptive analytics

C.

Prescriptive analytics

D.

Predictive analytics

A large hospital has an existing contract with a vendor in another country to provide software support and maintenance of the hospital's patient records information system. From the hospital management's perspective, which of the following controls would be most effective to address privacy risks related to this outsourcing arrangement?

A.

Conduct periodic reviews of the privacy policy to ensure that the existing policy meets current

legislation requirements in both regions.

B.

Include a "right to audit" clause in the contract and impose detailed security obligations on the

outsourced vendor

C.

Implement mandatory privacy training for management to help with identifying privacy risks when outsourcing services

D.

Develop an incident monitoring and response plan to track breaches from internal and external sources

Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?

A.

Risk tolerance

B.

Performance.

C.

Threats and opportunities.

D.

Governance

Which of the following re a result of implementing an e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and billing?

A.

Higher cash flow and treasury balances

B.

Higher inventory balances

C.

Higher accounts receivable

D.

Higher accounts payable