What is the most likely root cause for tins issue?
During an audit of the payroll system, the internal auditor identifies and documents the following condition: "Once a user is logged into the system, the user has access to all functionality within the system." What is the most likely root cause for tins issue?A . The authentication process relies on...
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?A . Security.B . Status.C . Recognition.D . Relationship with coworkersView AnswerAnswer: C
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?A . Theory of constraints.B . Just-in-time method.C . Activity-based costing.D . Break-even analysisView AnswerAnswer: C
Which of the following best describes this approach?
Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze, improve, and control. Which of the following best describes this approach?A . Six Sigma,B . Quality circle.C . Value chain analysis.D . Theory of constraints.View AnswerAnswer:...
Which of the following scenarios best illustrates a spear phishing attack?
Which of the following scenarios best illustrates a spear phishing attack?A . Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.B . A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded...
What would be the most appropriate directive control in this area?
An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data. What would be the most appropriate directive control in this area?A . Require a Service Organization Controls (SOC) report from the service providerB . Include a...
Which of the following is the most likely control weakness demonstrated by the seller?
After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products. Which of the following is the most likely control weakness demonstrated by the seller?A . Excessive collecting of informationB . Application of social engineeringC ....
A company records income from an investment in common stock when it does which of the following?
A company records income from an investment in common stock when it does which of the following?A . Purchases bonds.B . Receives interest.C . Receives dividendsD . Sells bonds.View AnswerAnswer: B
Which of the following types of accounts must be closed at the end of the period?
Which of the following types of accounts must be closed at the end of the period?A . Income statement accounts.B . Balance sheet accounts.C . Permanent accounts.D . Real accounts.View AnswerAnswer: A
Which of the following best describes the restaurants strategy?
A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services. Which of the following best describes the restaurants strategy?A . DiversificationB . Vertical integrationC . Risk avoidanceD . DifferentiationView AnswerAnswer: B