Which of the following approaches is most appropriate to address this concern?
An internal auditor performed a review of IT outsourcing and found that the service provider was failing to meet the terms of the service level agreement. Which of the following approaches is most appropriate to address this concern?A . The organization should review the skill requirements and ensure that the...
Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?
Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?A . Continually evaluate the needs and opinions of all stakeholder groups.B . Ensure strict compliance with applicable laws and regulations to avoid incidents.C . Maintain a comprehensive publicity...
Which of the following would best prevent unauthorized external changes to an organization's data?
Which of the following would best prevent unauthorized external changes to an organization's data?A . Antivirus software, firewall, data encryption.B . Firewall, data encryption, backup procedures.C . Antivirus software, firewall, backup procedures.D . Antivirus software, data encryption, change logs.View AnswerAnswer: A
Which of the following price adjustment strategies encourages prompt payment?
Which of the following price adjustment strategies encourages prompt payment?A . Cash discounts.B . Quantity discounts.C . Functional discounts.D . Seasonal discounts.View AnswerAnswer: A
Which of the following is a disadvantage of selecting a commercial software package rather than developing an application internally?
Which of the following is a disadvantage of selecting a commercial software package rather than developing an application internally?A . Lack of flexibility.B . Incompatibility with client/server technology.C . Employee resistance to change.D . Inadequate technical support.View AnswerAnswer: A
During which phase of disaster recovery planning should an organization identify the business units, assets, and systems that are critical to continuing an acceptable level of operations?
During which phase of disaster recovery planning should an organization identify the business units, assets, and systems that are critical to continuing an acceptable level of operations?A . Scope and initiation phase.B . Business impact analysis.C . Plan development.D . Testing.View AnswerAnswer: B
Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?
Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?A . Intranet.B . Extranet.C . Digital subscriber line.D . Broadband.View AnswerAnswer: B
Which of the following is the primary benefit of including end users in the system development process?
Which of the following is the primary benefit of including end users in the system development process?A . Improved integrity of programs and processing.B . Enhanced ongoing maintenance of the system.C . Greater accuracy of the testing phase.D . Reduced need for unexpected software changes.View AnswerAnswer: C
Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?
Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?A . Continually evaluate the needs and opinions of all stakeholder groups.B . Ensure strict compliance with applicable laws and regulations to avoid incidents.C . Maintain a comprehensive publicity...
According to the waterfall cycle approach to systems development, which of the following sequence of events is correct?
According to the waterfall cycle approach to systems development, which of the following sequence of events is correct?A . Program design, system requirements, software design, analysis, coding, testing, operations.B . System requirements, software design, analysis, program design, testing, coding, operations.C . System requirements, software design, analysis, program design, coding, testing,...