During the second half of the audit year, the chief audit executive (CAE) identified significant negative variances to the approved audit budget required to complete the internal audit plan. Which of the following actions should the CAE take?
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?
The chief audit executive (CAE) identified an unacceptable risk and believes that the risk is not being mitigated to an acceptable level. Which of the following is the CAE's next step in this situation?
How should internal auditors respond when the manager of an area under review disagrees with a finding?
Management is pondering the following question:
"How does our organization compete?"
This question pertains to which of the following levels of strategy?
Which of the following best describes the type of control provided by a firewall?
A new chief audit executive (CAE) reviews long overdue audit recommendations, which have been repeatedly reported to senior management but have not been implemented, and is unsure which issues should be escalated to the board. Which of the following would serve as the best guide in this scenario?
Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
Which of the following responsibilities would ordinary fall under the help desk function of an organization?
Which of the following is true regarding the use of remote wipe for smart devices?
An organization suffered significant damage to its local: file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor. Which of the following approaches has been used by the organization?