According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?
Which of the following is a characteristic of using a hierarchical control structure?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
Which of the following physical security controls is able to serve as both a detective and preventive control?
A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25.000 shirts. Actual sales total S300.000. What is margin of safety sales for the company?
Which of the following IT-related activities is most commonly performed by the second line of defense?
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
Which of the following statements is true regarding cost-volume-profit analysis?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Which of the following storage options would give the organization the best chance of recovering data?
An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?
A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:
“Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.” The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?
Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?