What would be the primary purpose of this strategy?
Several organizations have developed a strategy to open co-owned shopping malls. What would be the primary purpose of this strategy?A . To exploit core competence.B . To increase market synergy.C . To deliver enhanced value.D . To reduce costs.View AnswerAnswer: B
Assuming there is adequate manufacturing capacity and ail other variables are constant, what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?
A company produces water buckets with the following costs per bucket: Direct labor = 82 Direct material = $5 Fixed manufacturing = 83.50 Variable manufacturing = 82.50 The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each. Assuming...
Which of the following facilitates data extraction from an application?
Which of the following facilitates data extraction from an application?A . Application program code.B . Database system.C . Operating system.D . Networks.View AnswerAnswer: B
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?A . Greater cost-effectivenessB . Increased economies of scaleC . Larger talent poolD . Strong internal controlsView AnswerAnswer: C
Which of the following types of smart device risks should the internal Auditor be most concerned about?
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal Auditor...
What is the primary purpose of an Integrity control?
What is the primary purpose of an Integrity control?A . To ensure data processing is complete, accurate, and authorized.B . To ensure data being processed remains consistent and intact.C . To monitor the effectiveness of other controlsD . To ensure the output aligns with the intended result.View AnswerAnswer: B
What is the most likely purpose of performing this analytic technique?
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?A . To inform the classification of the data population.B . To determine the completeness and accuracy of the data.C . To identify whether the population...
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?A . Whether customers are asked to renew their consent for their data processing at least quarterly.B . Whether private data is processed in accordance with the purpose for which the consent...
Which of the following best describes a man-in-the-middle cyber-attack?
Which of the following best describes a man-in-the-middle cyber-attack?A . The perpetrator is able to delete data on the network without physical access to the device.B . The perpetrator is able to exploit network activities for unapproved purposes.C . The perpetrator is able to take over control of data communication...
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?A . The business continuity management charter.B . The business continuity risk assessment plan.C . The business Impact analysis planD . The business case for business continuity planningView...