Which verification activity would best help the institution avoid falling victim to phishing?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?A . Reviewing the customer's wire activity to determine whether the request is typical.B . Calling the customer...
Which of the following best explains the matching principle?
Which of the following best explains the matching principle?A . Revenues should be recognized when earned.B . Revenue recognition is matched with cash.C . Expense recognition is tied to revenue recognition.D . Expenses are recognized at each accounting period.View AnswerAnswer: C
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?A . Income statement.B . Owner's equity statement.C . Balance sheet.D . Statement of cash flows.View AnswerAnswer: D
Which of the following would be classified as IT general controls?
Which of the following would be classified as IT general controls?A . Error listings.B . Distribution controls.C . Transaction logging.D . Systems development controls.View AnswerAnswer: D
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?A . Prompt response and remediation policyB . Inventory of information assetsC . Information access managementD . Standard security configurationsView AnswerAnswer: C
Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?
Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?A . Phishing.B . Ransomware.C . Hacking.D . MakvareView AnswerAnswer: D
Which of the following best describes the primary objective of cybersecurity?
Which of the following best describes the primary objective of cybersecurity?A . To protect the effective performance of IT general and application controls.B . To regulate users ‘behavior it the web and cloud environment.C . To prevent unauthorized access to information assets.D . To secure application of protocols and authorization...
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?A . An incorrect program fix was implemented just prior to the database backup.B . The organization is preparing to train all employees on the new self-service...
Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?
Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?A . Higher cash flow and treasury balances.B . Higher inventory balancesC . Higher accounts receivable.D . Higher accounts payableView AnswerAnswer: D
The management of working capital is most crucial for which of the following aspects of business?
The management of working capital is most crucial for which of the following aspects of business?A . LiquidityB . ProfitabilityC . SolvencyD . EfficiencyView AnswerAnswer: A