Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is an example of an application control?

A.

Automated password change requirements.

B.

System data backup process.

C.

User testing of system changes.

D.

Formatted data fields.

Which of the following is the most appropriate way to record each partner’s initial investment in a partnership?

A.

At the value agreed upon by the partners

B.

At book value

C.

At fair value

D.

At the original cost

During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?

A.

IT application-based controls

B.

IT systems development controls

C.

Environmental controls

D.

IT governance controls

Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room

B.

Review the password length, frequency of change, and list of users for the workstation’s login process

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity

Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?

A.

Higher cash flow and treasury balances.

B.

Higher inventory balances.

C.

Higher accounts receivable.

D.

Higher accounts payable.

What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical products across all of its markets?

A.

Export strategy.

B.

Transnational strategy.

C.

Multi-domestic strategy.

D.

Globalization strategy.

Which of the following differentiates a physical access control from a logical access control?

A.

Physical access controls secure tangible IT resources, whereas logical access controls secure software and data internal to the IT system.

B.

Physical access controls secure software and data internal to the IT system, whereas logical access controls secure tangible IT resources.

C.

Physical access controls include firewalls, user IDs, and passwords, whereas logical access controls include locks and security guards.

D.

Physical access controls include input processing and output controls, whereas logical access controls include locked doors and security guards.

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

Favorable labor efficiency variance

Adverse labor rate variance

Adverse labor efficiency variance

Favorable labor rate variance

A.

1 and 2.

B.

1 and 4.

C.

3 and 4.

D.

2 and 3.

During which phase of the contracting process are contracts drafted for a proposed business activity?

A.

Initiation phase.

B.

Bidding phase.

C.

Development phase.

D.

Management phase.

According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?

A.

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations

B.

Drafting a strong contract that requires regular vendor control reports and a right-to-audit clause

C.

Applying administrative privileges to ensure right-to-access controls are appropriate

D.

Creating a standing cybersecurity committee to identify and manage risks related to data security