Which of the following would be a concern related to the authorization controls utilized for a system?
Which of the following would be a concern related to the authorization controls utilized for a system?A . Users can only see certain screens in the system.B . Users are making frequent password change requests.C . Users Input Incorrect passwords and get denied system accessD . Users are all permitted...
Which of the following application controls is the most dependent on the password owner?
Which of the following application controls is the most dependent on the password owner?A . Password selectionB . Password agingC . Password lockoutD . Password rotationView AnswerAnswer: A
Which of the following changes would be expected with this new structure?
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?A . Lower costs.B . Slower decision making at the senior executive level.C . Limited creative freedom in lower-level managers.D . Senior-level executives more focused on short-term, routine decision makingView...
The management of working capital is most crucial for which of the following aspects of business?
The management of working capital is most crucial for which of the following aspects of business?A . LiquidityB . ProfitabilityC . SolvencyD . EfficiencyView AnswerAnswer: A
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?A . Esteem by colleagues.B . Self-fulfillmentC . Series of belonging in the organizationD . Job securityView AnswerAnswer:...
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?A . The business continuity management charter.B . The business continuity risk assessment plan.C . The business Impact analysis planD . The business case for business continuity planningView...
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?A . There is a greater need for organizations to rely on users to comply with policies and procedures.B . With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.C . Incident...
In this scenario, the organization agreed to which of the following types of contracts?
A organization finalized a contract in which a vendor is expected to design, procure, and construct a power substation for $3,000,000. In this scenario, the organization agreed to which of the following types of contracts?A . A cost-reimbursable contract.B . A lump-sum contract.C . A time and material contract.D ....
What type of attack was perpetrated?
An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?A . Boundary attack.B . Spear phishing attack.C . Brute force attack.D . Spoofing attack.View AnswerAnswer: B
Which of the following best describes the primary objective of cybersecurity?
Which of the following best describes the primary objective of cybersecurity?A . To protect the effective performance of IT general and application controls.B . To regulate users ‘behavior it the web and cloud environment.C . To prevent unauthorized access to information assets.D . To secure application of protocols and authorization...