Which of the following best describes a potential benefit of using data analyses?
A. It easily aligns with existing internal audit competencies to reduce expenses
B. It provides a more holistic view of the audited area.
C. Its outcomes can be easily interpreted into audit: conclusions.
D. Its application increases internal auditors' adherence to the Standards
The budgeted cost of work performed is a metric best used to measure which project management activity?
A. Resource planning
B. Cost estimating
C. Cost budgeting
D. Cost control
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
A. Cybercriminals hacking into the organization's time and expense system to collect employee personal data.
B. Hackers breaching the organization's network to access research and development reports
C. A denial-of-service attack that prevents access to the organization's website
D. A hacker accessing she financial information of the company
Which of the following is the best example of a compliance risk that Is likely to arise when adopting a bring-your-own-device (BYOD) policy?
A. The risk that users try to bypass controls and do not install required software updates
B. The risk that smart devices can be lost or stolen due to their mobile nature.
C. The risk that an organization intrusively monitors personal Information stored on smart devices.
D. The risk that proprietary information is not deleted from the device when an employee leaves.
Which of the following is a sound network configuration practice to enhance information security?
A. Change management practices to ensure operating system patch documentation is retained.
B. User role requirements are documented in accordance with appropriate application-level control needs.
C. Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
D. Interfaces reinforce segregation of duties between operations administration and database development.
Page 1 out of 67 Pages |