Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?

A.

A revenue calculation spreadsheet supported with price and volume reports from the production department.

B.

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions.

C.

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantities.

D.

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances

Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?

A.

IT database administrator.

B.

IT data center manager.

C.

IT help desk function.

D.

IT network administrator.

When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?

A.

Activity

B.

Subprocess

C.

Major process

D.

Mega process

Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?

A.

Only preventive measures.

B.

Alternative and reactive measures.

C.

Preventive and alternative measures.

D.

Preventive and reactive measures.

An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?

A.

Shoulder suiting

B.

Pharming,

C.

Phishing.

D.

Social engineering.

Which of the following is a characteristic of big data?

A.

Big data is being generated slowly due to volume.

B.

Big data must be relevant for the purposes of organizations.

C.

Big data comes from a single type of formal.

D.

Big data is always changing

Which of the following is a benefit from the concept of Internet of Things?

A.

Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.

B.

Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.

C.

Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.

D.

Data mining and data collection from internet and social networks is easier, and the results are more comprehensive

Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

A.

First-in. first-out method (FIFO).

B.

Last-in, first-out method (LIFO).

C.

Specific identification method.

D.

Average-cost method

Which of the following types of accounts must be closed at the end of the period?

A.

Income statement accounts.

B.

Balance sheet accounts.

C.

Permanent accounts.

D.

Real accounts.

Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?

A.

Last-in-first-Out (LIFO}.

B.

Average cost.

C.

First-in-first-out (FIFO).

D.

Specific identification