Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?A . An extranetB . A local area networkC . An IntranetD . The internetView AnswerAnswer: B
Which of the following is true of matrix organizations?
Which of the following is true of matrix organizations?A . A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.B . A combination of product and functional departments allows management to utilize personnel from various Junctions.C . Authority, responsibility and accountability of the units Involved...
Which of the following is a disadvantage in a centralized organizational structure?
Which of the following is a disadvantage in a centralized organizational structure?A . Communication conflictsB . Slower decision making.C . Loss of economies of scaleD . Vulnerabilities in sharing knowledgeView AnswerAnswer: B
How should the expense be reported on that year's financial statements?
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?A . It should be reported as an administrative expense on the...
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?A . Veracity, velocity, and variety.B . Integrity, availability, and confidentiality.C . Accessibility, accuracy, and effectiveness.D . Authorization, logical access, and physical access.View AnswerAnswer: B
With regard to project management, which of the following statements about project crashing Is true?
With regard to project management, which of the following statements about project crashing Is true?A . It leads to an increase in risk and often results in rework.B . It is an optimization technique where activities are performed in parallel rather than sequentially.C . It involves a revaluation of project...
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?A . Internal auditors perform reconciliation procedures to support an external audit of financial reporting.B . Internal auditors perform a systems-focused analysis to review relevant controls.C . Internal auditors perform a risk assessment to...
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?A . Project plan development.B . Project plan executionC . Integrated change control.D . Project quality planningView AnswerAnswer: B
Which of the following is the ideal solution for management in this scenario?
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in...
Which of the following best describes a potential benefit of using data analyses?
Which of the following best describes a potential benefit of using data analyses?A . It easily aligns with existing internal audit competencies to reduce expensesB . It provides a more holistic view of the audited area.C . Its outcomes can be easily interpreted into audit: conclusions.D . Its application increases...