IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 28

List of questions
Question 271

What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
Question 272

Which of the following sites would an Internet service provider most likely use to restore operations after its servers were damaged by a natural disaster?
Question 273

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?
Question 274

The budgeted cost of work performed is a metric best used to measure which project management activity?
Question 275

According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
Question 276

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?
Question 277

Which of the following statements Is true regarding the use of centralized authority to govern an organization?
Question 278

Which of the following physical security controls is able to serve as both a detective and preventive control?
Question 279

When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
Question 280

Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?
Question