What is the most likely purpose of performing this analytic technique?
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?A . To inform the classification of the data population. B. To determine the completeness and accuracy of the data. C. To identify whether the population...
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?A . Whether customers are asked to renew their consent for their data processing at least quarterly. B. Whether private data is processed in accordance with the purpose for which the consent...
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?A . Variable entity approach. B. Control ownership. C. Risk and reward. D. Voting interest.View AnswerAnswer: D
Which of the following would be the best method to collect information about employees' job satisfaction?
Which of the following would be the best method to collect information about employees' job satisfaction?A . Online surveys sent randomly to employees. B. Direct onsite observations of employees. C. Town hall meetings with employees. D. Face-to-face interviews with employees.View AnswerAnswer: D
Which of the following capital budgeting techniques considers the tune value of money?
Which of the following capital budgeting techniques considers the tune value of money?A . Annual rate of return. B. Incremental analysis. C. Discounted cash flow. D. Cash paybackView AnswerAnswer: C
What is the primary purpose of an Integrity control?
What is the primary purpose of an Integrity control?A . To ensure data processing is complete, accurate, and authorized. B. To ensure data being processed remains consistent and intact. C. To monitor the effectiveness of other controls D. To ensure the output aligns with the intended result.View AnswerAnswer: A
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?A . Prompt response and remediation policy B. Inventory of information assets C. Information access management D. Standard security configurationsView AnswerAnswer: C
Which of the following is the best example of IT governance controls?
Which of the following is the best example of IT governance controls?A . Controls that focus on segregation of duties, financial, and change management, B. Personnel policies that define and enforce conditions for staff in sensitive IT areas. C. Standards that support IT policies by more specifically defining required actions...
Which of the following is a project planning methodology that involves a complex series of required simulations to provide information about schedule risk?
CORRECT TEXT Which of the following is a project planning methodology that involves a complex series of required simulations to provide information about schedule risk?A . Monte Carlo Analysis. B. Project Management Information System (PMIS). C. Earned Value Management (EVM). D. Integrated Project PlanView AnswerAnswer: A
Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?
Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?A . Data center operations manager B. Response and support team. C. Database administrator, D. Network administratorView AnswerAnswer: D