Which of the following best describes this cybersecurity risk?
An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?A . Shoulder suitingB . Pharming,C . Phishing.D . Social engineering.View AnswerAnswer: C
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?A . Variety.B . Velocity.C . Volume.D . Veracity.View AnswerAnswer: D
As such: which of the following would be a characteristic of the now highly centralized organization?
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the following would be a characteristic of the now highly centralized organization?A . Top management does little monitoring of the decisions made at lower levels.B...
In implementing this GRC resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?A . The board should be fully satisfied that there is...
When determining the level of physical controls required for a workstation, which of the following factors should be considered?
When determining the level of physical controls required for a workstation, which of the following factors should be considered?A . Ease of use.B . Value to the business.C . Intrusion prevention.D . Ergonomic model.View AnswerAnswer: B
Which of the following best explains the matching principle?
Which of the following best explains the matching principle?A . Revenues should be recognized when earned.B . Revenue recognition is matched with cash.C . Expense recognition is tied to revenue recognition.D . Expenses are recognized at each accounting period.View AnswerAnswer: C
Which of the following is an effective preventive control for data center security?
Which of the following is an effective preventive control for data center security?A . Motion detectors.B . Key card access to the facility.C . Security cameras.D . Monitoring access to data center workstationsView AnswerAnswer: B
Which of the following statements is true regarding user-developed applications (UDAs)?
Which of the following statements is true regarding user-developed applications (UDAs)?A . UDAs are less flexible and more difficult to configure than traditional IT applications.B . Updating UDAs may lead to various errors resulting from changes or corrections.C . UDAs typically are subjected to application development and change management controls.D...
What is the most likely root cause for tins issue?
During an audit of the payroll system, the internal auditor identifies and documents the following condition: "Once a user is logged into the system, the user has access to all functionality within the system." What is the most likely root cause for tins issue?A . The authentication process relies on...
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?A . Security.B . Status.C . Recognition.D . Relationship with coworkersView AnswerAnswer: C