Which of the following application controls is the most dependent on the password owner?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
In light of increasing emission taxes in the European Union, a car manufacturer introduced a new middle-class hybrid vehicle specifically for the European market only. Which of the following competitive strategies has the manufacturer used?
An internal auditor is assessing the risks related to an organization’s mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal auditor be most concerned about?
Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Which of the following best describes the purpose of fixed manufacturing costs?
According to 11A guidance on IT, which of the following are indicators of poor change management?
1. Inadequate control design.
2. Unplanned downtime.
3. Excessive troubleshooting .
4. Unavailability of critical services.
What is the primary risk associated with an organization adopting a decentralized structure?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Which of the following techniques would best detect an inventory fraud scheme?