Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?
Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?A . A traditional key lockB . A biometric deviceC . A card-key systemD . A proximity deviceView AnswerAnswer: B
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?A . Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.B . Review the password length, frequency of change,...
Which of the following intangible assets is considered to have an indefinite life?
Which of the following intangible assets is considered to have an indefinite life?A . Underground oil depositsB . CopyrightC . TrademarkD . LandView AnswerAnswer: C
Which of the following is a project planning methodology that involves a complex series of required simulations to provide information about schedule risk?
CORRECT TEXT Which of the following is a project planning methodology that involves a complex series of required simulations to provide information about schedule risk?A . Monte Carlo Analysis.B . Project Management Information System (PMIS).C . Earned Value Management (EVM).D . Integrated Project PlanView AnswerAnswer: A
Which of the following is an indicator of liquidity that is more dependable than working capital?
Which of the following is an indicator of liquidity that is more dependable than working capital?A . Acid-test (quick) ratioB . Average collection periodC . Current ratio.D . Inventory turnover.View AnswerAnswer: A
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?A . Esteem by colleagues.B . Self-fulfillmentC . Series of belonging in the organizationD . Job securityView AnswerAnswer:...
Which of the following would be the strongest control to prevent unauthorized wireless network access?
Which of the following would be the strongest control to prevent unauthorized wireless network access?A . Allowing access to the organization's network only through a virtual private network.B . Logging devices that access the network, including the date. time, and identity of the user.C . Tracking all mobile device physical...
Which of the following best explains the matching principle?
Which of the following best explains the matching principle?A . Revenues should be recognized when earned.B . Revenue recognition is matched with cash.C . Expense recognition is tied to revenue recognition.D . Expenses are recognized at each accounting period.View AnswerAnswer: C
Which of the following network types is illustrated by this scenario?
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is...
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?A . Variable entity approach.B . Control ownership.C . Risk and reward.D . Voting interest.View AnswerAnswer: D