Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?A . The term describes budgets that exclude fixed costs. B. Flexible budgets exclude outcome projections, which are hard to determine, and instead rely on the most recent actual outcomes. C. The term...
Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?
Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?A . A traditional key lock B. A biometric device C. A card-key system D. A proximity deviceView AnswerAnswer: B
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?A . Frozen site B. Cold site C. Warm site D. Hot siteView AnswerAnswer: B
Which of the following best describes a man-in-the-middle cyber-attack?
Which of the following best describes a man-in-the-middle cyber-attack?A . The perpetrator is able to delete data on the network without physical access to the device. B. The perpetrator is able to exploit network activities for unapproved purposes. C. The perpetrator is able to take over control of data communication...
Which of the following changes would be expected with this new structure?
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?A . Lower costs. B. Slower decision making at the senior executive level. C. Limited creative freedom in lower-level managers. D. Senior-level executives more focused on short-term, routine decision makingView...
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?A . Tampering B. Hacking C. Phishing D. PiracyView AnswerAnswer: B
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?A . Project plan development. B. Project plan execution C. Integrated change control. D. Project quality planningView AnswerAnswer: A
Which of the following best describes a potential benefit of using data analyses?
Which of the following best describes a potential benefit of using data analyses?A . It easily aligns with existing internal audit competencies to reduce expenses B. It provides a more holistic view of the audited area. C. Its outcomes can be easily interpreted into audit: conclusions. D. Its application increases...
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?A . There is a greater need for organizations to rely on users to comply with policies and procedures. B. With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures. C. Incident...
Which of the following should the organization ensure in exchange for the employees' consent?
A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software that will remotely wipe data in case of theft or other incidents. Which of the following should the organization ensure in...