What is the most likely purpose of performing this analytic technique?
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?A . To inform the classification of the data population.B . To determine the completeness and accuracy of the data.C . To identify whether the population...
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?A . Whether customers are asked to renew their consent for their data processing at least quarterly.B . Whether private data is processed in accordance with the purpose for which the consent...
Which of the following best describes a man-in-the-middle cyber-attack?
Which of the following best describes a man-in-the-middle cyber-attack?A . The perpetrator is able to delete data on the network without physical access to the device.B . The perpetrator is able to exploit network activities for unapproved purposes.C . The perpetrator is able to take over control of data communication...
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?A . The business continuity management charter.B . The business continuity risk assessment plan.C . The business Impact analysis planD . The business case for business continuity planningView...
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?A . TamperingB . HackingC . PhishingD . PiracyView AnswerAnswer: B
Which of the following can be classified as debt investments?
Which of the following can be classified as debt investments?A . Investments in the capital stock of a corporationB . Acquisition of government bonds.C . Contents of an investment portfolio,D . Acquisition of common stock of a corporationView AnswerAnswer: B
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?A . Nondisclosure agreements between the firm and its employees.B . Logs of user activity within the information system.C . Two-factor authentication for access into the information system.D . limited access...
Which of the following statements is true concerning the basic accounting treatment of a partnership?
Which of the following statements is true concerning the basic accounting treatment of a partnership?A . The initial investment of each partner should be recorded at book value.B . The ownership ratio identifies the basis for dividing net income and net toss.C . A partner's capital only changes due to...
Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?
A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?A . Readiness assessment.B . Project risk assessment.C . Post-implementation review.D . Key phase review.View AnswerAnswer: C
Which of the following costs would be relevant to this decision?
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?A . Incremental processing costs, incremental revenue, and variable manufacturing expenses.B . Joint costs, incremental processing costs, and variable manufacturing expenses.C . Incremental revenue, joint costs, and incremental processing...