According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
Which of the following statements is true regarding the management-by-objectives method?
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
How do data analysis technologies affect internal audit testing?
Which of the following physical access control is most likely to be based on ’’something you have" concept?
Which of the following techniques would best detect on inventory fraud scheme?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
Which of the following would be a concern related to the authorization controls utilized for a system?
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
For employees, the primary value of implementing job enrichment is which of the following?