Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?A . Veracity, velocity, and variety.B . Integrity, availability, and confidentiality.C . Accessibility, accuracy, and effectiveness.D . Authorization, logical access, and physical access.View AnswerAnswer: B
Which of the following costs would be relevant to this decision?
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?A . Incremental processing costs, incremental revenue, and variable manufacturing expenses.B . Joint costs, incremental processing costs, and variable manufacturing expenses.C . Incremental revenue, joint costs, and incremental processing...
Which of the following best describes her primary motivation to remain in the job?
During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?A . Intrinsic reward.B . Job enrichmentC...
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?A . The spam filter removed Incoming communication that included certain keywords and domains.B . The spam filter deleted commercial ads automatically, as they were recognized as unwanted.C . The spam filter routed to...
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?A . Variable entity approach.B . Control ownership.C . Risk and reward.D . Voting interest.View AnswerAnswer: B
Which of the following best describes a man-in-the-middle cyber-attack?
Which of the following best describes a man-in-the-middle cyber-attack?A . The perpetrator is able to delete data on the network without physical access to the device.B . The perpetrator is able to exploit network activities for unapproved purposes.C . The perpetrator is able to take over control of data communication...
Which of the following would be the best method to collect information about employees' job satisfaction?
Which of the following would be the best method to collect information about employees' job satisfaction?A . Online surveys sent randomly to employees.B . Direct onsite observations of employees.C . Town hall meetings with employees.D . Face-to-face interviews with employees.View AnswerAnswer: A
Which of the following best describes a potential benefit of using data analyses?
Which of the following best describes a potential benefit of using data analyses?A . It easily aligns with existing internal audit competencies to reduce expensesB . It provides a more holistic view of the audited area.C . Its outcomes can be easily interpreted into audit: conclusions.D . Its application increases...
Which of the following backup methodologies would be most efficient in backing up a database in the production environment?
Which of the following backup methodologies would be most efficient in backing up a database in the production environment?A . Disk mirroring of the data being stored on the database.B . A differential backup that is performed on a weekly basis.C . An array of independent disks used to back...
Which of the following would be the strongest control to prevent unauthorized wireless network access?
Which of the following would be the strongest control to prevent unauthorized wireless network access?A . Allowing access to the organization's network only through a virtual private network.B . Logging devices that access the network, including the date. time, and identity of the user.C . Tracking all mobile device physical...