All of the following are possible explanations for a significant unfavorable material efficiency variance except:
All of the following are possible explanations for a significant unfavorable material efficiency variance except:A . Cutbacks in preventive maintenance.B . An inadequately trained and supervised labor force.C . A large number of rush orders.D . Production of more units than planned for in the master budget.View AnswerAnswer: D
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?A . PKI uses an independent administrator to manage the public key.B . The public key is authenticated against reliable third-party identification.C . PKI's public accessibility allows it to be used readily...
The decision to implement enhanced failure detection and back-up systems to improve data integrity is an example of which risk response?
The decision to implement enhanced failure detection and back-up systems to improve data integrity is an example of which risk response?A . Risk acceptance.B . Risk sharing.C . Risk avoidance.D . Risk reduction.View AnswerAnswer: D
All of the following are possible explanations for a significant unfavorable material efficiency variance except:
All of the following are possible explanations for a significant unfavorable material efficiency variance except:A . Cutbacks in preventive maintenance.B . An inadequately trained and supervised labor force.C . A large number of rush orders.D . Production of more units than planned for in the master budget.View AnswerAnswer: D
Which of the following COSO internal control framework components encompasses establishing structures, reporting lines, authorities, and responsibilities?
Which of the following COSO internal control framework components encompasses establishing structures, reporting lines, authorities, and responsibilities?A . Control environment.B . Control activities.C . Information and communication.D . Monitoring.View AnswerAnswer: A
Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?
Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?A . Each party's negotiator presents a menu of options to the other party.B . Each party adopts one initial position from which to start.C . Each negotiator minimizes the information provided to the other party.D . Each...
Which control activity should not be part of this review?
An internal auditor is reviewing physical and environmental controls for an IT organization. Which control activity should not be part of this review?A . Develop and test the organization's disaster recovery plan.B . Install and test fire detection and suppression equipment.C . Restrict access to tangible IT resources.D . Ensure...
Which of the following annual interest rates is least expensive?
An organization needs to borrow a large amount of cash to fund its expansion plan. Which of the following annual interest rates is least expensive?A . 7 percent simple interest with a 10 percent compensating balance.B . 7 percent simple interest paid at the end of each year.C . 7...
Which of the following standards would be most useful in evaluating the performance of a customer-service group?
Which of the following standards would be most useful in evaluating the performance of a customer-service group?A . The average time per customer inquiry should be kept to a minimum.B . Customer complaints should be processed promptly.C . Employees should maintain a positive attitude when dealing with customers.D . All...
Ability to empathize with other people.
Ability to empathize with other people.A . 1 and 2 onlyB . 1 and 3 onlyC . 2 and 3 onlyD . 1, 2, and 3View AnswerAnswer: C