Which of the following scenarios indicates an effective use of financial leverage?
Which of the following scenarios indicates an effective use of financial leverage?A . An organisation has a rate of return on equity of 20% and a rate of return on assets of 15%.B . An organization has a current ratio of 2 and an inventory turnover of 12.C . An...
Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?
Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?A . First-in. first-out method (FIFO).B . Last-in, first-out method (LIFO).C . Specific identification method.D . Average-cost methodView AnswerAnswer: A
Which of the following best describes this cybersecurity risk?
An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?A . Shoulder suitingB . Pharming,C . Phishing.D . Social engineering.View AnswerAnswer: C
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?A . Variety.B . Velocity.C . Volume.D . Veracity.View AnswerAnswer: D
As such: which of the following would be a characteristic of the now highly centralized organization?
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the following would be a characteristic of the now highly centralized organization?A . Top management does little monitoring of the decisions made at lower levels.B...
In implementing this GRC resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?A . The board should be fully satisfied that there is...
When determining the level of physical controls required for a workstation, which of the following factors should be considered?
When determining the level of physical controls required for a workstation, which of the following factors should be considered?A . Ease of use.B . Value to the business.C . Intrusion prevention.D . Ergonomic model.View AnswerAnswer: B
Which of the following best explains the matching principle?
Which of the following best explains the matching principle?A . Revenues should be recognized when earned.B . Revenue recognition is matched with cash.C . Expense recognition is tied to revenue recognition.D . Expenses are recognized at each accounting period.View AnswerAnswer: C
Which of the following is an effective preventive control for data center security?
Which of the following is an effective preventive control for data center security?A . Motion detectors.B . Key card access to the facility.C . Security cameras.D . Monitoring access to data center workstationsView AnswerAnswer: B
Which of the following statements is true regarding user-developed applications (UDAs)?
Which of the following statements is true regarding user-developed applications (UDAs)?A . UDAs are less flexible and more difficult to configure than traditional IT applications.B . Updating UDAs may lead to various errors resulting from changes or corrections.C . UDAs typically are subjected to application development and change management controls.D...