For employees, the primary value of implementing job enrichment is which of the following?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
The board is considering outsourcing the internal audit function to an external service provider. Which of the following would always remain the responsibility of the organization?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
Which of the following data privacy concerns can be attributed specifically to blockchain technologies?
An internal auditor uses a risk and control questionnaire as part of the preliminary survey for an audit of the organization's anti-bribery and corruption program. What is the primary purpose of using this approach?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
During the process of setting the annual audit plan, the chief audit executive receives a request from senior management to conduct an assurance engagement on the cybersecurity controls of the organization. Which of the following is a reason cybersecurity should be included in the annual internal audit plan?
An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?
Which of the following is a sound network configuration practice to enhance information security?
Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Which of the following best describes a transformational leader, as opposed to a transactional leader?