When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?
When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?A . ActivityB . SubprocessC . Major processD . Mega processView AnswerAnswer: A
Which of the following application controls is the most dependent on the password owner?
Which of the following application controls is the most dependent on the password owner?A . Password selectionB . Password agingC . Password lockoutD . Password rotationView AnswerAnswer: A
Which of the following techniques would best meet this objective?
Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?A . Analysis of the full population of existing data.B . Verification of the...
Which of the following controls would be most efficient to protect business data from corruption and errors?
Which of the following controls would be most efficient to protect business data from corruption and errors?A . Controls to ensure data is unable to be accessed without authorization.B . Controls to calculate batch totals to identify an error before approval.C . Controls to encrypt the data so that corruption...
Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?
Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?A . Risk toleranceB . PerformanceC . Threats and opportunitiesD . GovernanceView AnswerAnswer: C
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?A . The term describes budgets that exclude fixed costs.B . Flexible budgets exclude outcome projections, which are hard to determine, and instead rely on the most recent actual outcomes.C . The term...
Which of the following backup methodologies would be most efficient in backing up a database in the production environment?
Which of the following backup methodologies would be most efficient in backing up a database in the production environment?A . Disk mirroring of the data being stored on the database.B . A differential backup that is performed on a weekly basis.C . An array of independent disks used to back...
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?A . The spam filter removed Incoming communication that included certain keywords and domains.B . The spam filter deleted commercial ads automatically, as they were recognized as unwanted.C . The spam filter routed to...
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?A . A just-in-time purchasing environmentB . A Large volume of custom purchasesC . A variable volume sensitive to material costD . A currently inefficient purchasing processView AnswerAnswer: A
Which of the following is a benefit from the concept of Internet of Things?
Which of the following is a benefit from the concept of Internet of Things?A . Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.B . Physical devices, such as thermostats and heat pumps, can be set to react...