Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?
During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?
Which of the following Issues would be a major concern for internal auditors when using a free software to analyze a third-party vendor's big data?
Which of the following responsibilities would ordinary fall under the help desk function of an organization?
Which of the following is most important for an internal auditor to check with regard to the database version?
In light of increasing emission taxes in the European Union, a car manufacturer introduced a new middle-class hybrid vehicle specifically for the European market only. Which of the following competitive strategies has the manufacturer used?
An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
Which of the following activities best illustrates a user's authentication control?
An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?
Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
What is the primary risk associated with an organization adopting a decentralized structure?
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Which of the following performance measures includes both profits and investment base?
An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?
According to 11A guidance on IT, which of the following are indicators of poor change management?
1. Inadequate control design.
2. Unplanned downtime.
3. Excessive troubleshooting .
4. Unavailability of critical services.
Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
Which of the following is a disadvantage in a centralized organizational structure?
According to IIA guidance, which of the following is an IT project success factor?
Which of the following IT-related activities is most commonly performed by the second line of defense?
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
Which of the following statements is true regarding cost-volume-profit analysis?
A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?
Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?
Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
Which of the following IT disaster recovery plans includes a remote site designated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?
A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?
In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?
With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?
Which of the following controls is the most effective for ensuring confidentially of transmitted information?
Which of the following types of budgets will best provide the basis for evaluating the organization's performance?
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?