Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?
An organization's board of directors is particularly focused on positioning, the organization as a leader in the industry and beating the competition. Which of the following strategies offers the greatest alignment with the board's focus?
An organization produces products X and Y. The materials used for the production of both products are limited to 500 Kilograms
(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows in order to maximize profit, how much of product Y should the organization produce each month?
$10 $13
2 kg
70 units
6 kg
120 units
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Which of the following is a disadvantage in a centralized organizational structure?
Which of the following application controls, implemented by management, monitors data being processed to ensure the data remains consistent and accurate?
Which of the following is a sound network configuration practice to enhance information security?
Which of the following best describes a potential benefit of using data analyses?
Management is pondering the following question:
"How does our organization compete?"
This question pertains to which of the following levels of strategy?
Which of the following is true regarding the use of remote wipe for smart devices?
In accounting, which of the following statements is true regarding the terms debit and credit?
Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?
What relationship exists between decentralization and the degree, importance, and range of lower-level decision making?
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the
following would be a characteristic of the now highly centralized organization?
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?
After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.
Which of the following is the most likely control weakness demonstrated by the seller?
Which of the following best explains why an organization would enter into a capital lease contract?
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data.
What would be the most appropriate directive control in this area?
Which of the following application controls is the most dependent on the password owner?
Which of the following is an example of a physical control designed to prevent security breaches?
Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?