When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?

When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?A . Activity B. Subprocess C. Major process D. Mega processView AnswerAnswer: A

February 12, 2023 No Comments READ MORE +

Which of the following controls would be most efficient to protect business data from corruption and errors?

Which of the following controls would be most efficient to protect business data from corruption and errors?A . Controls to ensure data is unable to be accessed without authorization. B. Controls to calculate batch totals to identify an error before approval. C. Controls to encrypt the data so that corruption...

February 12, 2023 No Comments READ MORE +

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?A . Higher cash flow and treasury balances. B. Higher inventory balances C. Higher accounts receivable. D. Higher accounts payableView AnswerAnswer: C

February 12, 2023 No Comments READ MORE +

Which of the following situations best illustrates a "false positive" in the performance of a spam filter?

Which of the following situations best illustrates a "false positive" in the performance of a spam filter?A . The spam filter removed Incoming communication that included certain keywords and domains. B. The spam filter deleted commercial ads automatically, as they were recognized as unwanted. C. The spam filter routed to...

February 11, 2023 No Comments READ MORE +

Which of the following techniques would best meet this objective?

Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?A . Analysis of the full population of existing data. B. Verification of the...

February 11, 2023 No Comments READ MORE +

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?A . Phishing. B. Ransomware. C. Hacking. D. MakvareView AnswerAnswer: D

February 11, 2023 No Comments READ MORE +

Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?

Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?A . Risk tolerance B. Performance C. Threats and opportunities D. GovernanceView AnswerAnswer: C

February 11, 2023 No Comments READ MORE +

Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?

A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?A . Readiness assessment. B. Project risk assessment. C. Post-implementation review. D. Key phase review.View AnswerAnswer: C

February 11, 2023 No Comments READ MORE +

Which type of bond did the organization issue?

An organization with a stable rating, as assessed by International rating agencies, has issued a bond not backed by assets or collateral. Payments of the interests and the principal to bondholders are guaranteed by the organization. Which type of bond did the organization issue?A . A sinking fund bond. B....

February 11, 2023 No Comments READ MORE +

Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?

Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?A . Internal auditors perform reconciliation procedures to support an external audit of financial reporting. B. Internal auditors perform a systems-focused analysis to review relevant controls. C. Internal auditors perform a risk assessment to...

February 10, 2023 No Comments READ MORE +