Which of the following would be the strongest control to prevent unauthorized wireless network access?
Which of the following would be the strongest control to prevent unauthorized wireless network access?A . Allowing access to the organization's network only through a virtual private network. B. Logging devices that access the network, including the date. time, and identity of the user. C. Tracking all mobile device physical...
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?A . Income statement. B. Owner's equity statement. C. Balance sheet. D. Statement of cash flows.View AnswerAnswer: D
Which of the following statements. Is most accurate concerning the management and audit of a web server?
Which of the following statements. Is most accurate concerning the management and audit of a web server?A . The file transfer protocol (FTP) should always be enabled. B. The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts. C. The number of ports and protocols allowed...
Which of the following is the best example of a compliance risk that Is likely to arise when adopting a bring-your-own-device (BYOD) policy?
Which of the following is the best example of a compliance risk that Is likely to arise when adopting a bring-your-own-device (BYOD) policy?A . The risk that users try to bypass controls and do not install required software updates. B. The risk that smart devices can be lost or stolen...
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?A . Key performance indicators. B. Reports of software customization. C. Change and patch management. D. Master data managementView AnswerAnswer: A
Which of the following would be classified as IT general controls?
Which of the following would be classified as IT general controls?A . Error listings. B. Distribution controls. C. Transaction logging. D. Systems development controls.View AnswerAnswer: C
For the manufacturer to accept the offer, which of the following assumptions needs to be true?
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for ยง10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which...
Which of the following strategies offers the greatest alignment with the board's focus?
An organization's board of directors is particularly focused on positioning, the organization as a leader in the industry and beating the competition. Which of the following strategies offers the greatest alignment with the board's focus?A . Divesting product lines expected to have negative profitability. B. Increasing the diversity of strategic...
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?A . Esteem by colleagues. B. Self-fulfillment C. Series of belonging in the organization D. Job securityView AnswerAnswer:...
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?A . An extranet B. A local area network C. An Intranet D. The internetView AnswerAnswer: B