An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery...
Which of the following is a sound network configuration practice to enhance information security?
Which of the following is a sound network configuration practice to enhance information security?A . Change management practices to ensure operating system patch documentation is retained.B . User role requirements are documented in accordance with appropriate application-level control needs.C . Validation of intrusion prevention controls is performed to ensure intended...
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?A . An offboarding procedure is initiated monthly to determine redundant physical access rights.B . Logs generated by smart locks are automatically scanned to identify anomalies in access patterns.C . Requests for additional access...
Which of the following data security policies is most likely to be the result of a data privacy law?
Which of the following data security policies is most likely to be the result of a data privacy law?A . Access to personally identifiable information is limited to those who need It to perform their job.B . Confidential data must be backed up and recoverable within a 24-hour period.C ....
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?A . Assigning new roles and responsibilities for senior IT management.B . Growing use of bring your own devices for organizational matters.C . Expansion of operations into new markets...
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Which of the following contract concepts is typically given in exchange for the execution of a promise?A . Lawfulness.B . Consideration.C . Agreement.D . DischargeView AnswerAnswer: B
Which of the following must be adjusted to index a progressive tax system to inflation?
Which of the following must be adjusted to index a progressive tax system to inflation?A . Tax deductions, exemptions, and tax filings.B . Tax deductions, exemptions, and tax brackets.C . Tax brackets, tax deductions, and tax payments.D . Tax brackets, exemptions, and nominal tax receipts.View AnswerAnswer: B
Which of the following is a characteristic of just-in-time inventory management systems?
Which of the following is a characteristic of just-in-time inventory management systems?A . Users determine the optimal level of safety stocks.B . They are applicable only to large organizations.C . They do not really increase overall economic efficiency because they merely shift inventory levels further up the supply chain.D ....
One change control function that is required in client/server environments, but is not required in mainframe environments, is to ensure that:
One change control function that is required in client/server environments, but is not required in mainframe environments, is to ensure that:A . Program versions are synchronized across the network.B . Emergency move procedures are documented and followed.C . Appropriate users are involved in program change testing.D . Movement from the...
Which of the following would not be a typical responsibility for the CAE?
A chief audit executive (CAE) was asked to participate in the selection of an external auditor. Which of the following would not be a typical responsibility for the CAE?A . Evaluate the proposed external auditor fee.B . Recommend criteria to be used in the selection process.C . Develop appropriate performance...