IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 4
List of questions
Related questions
A newly appointed board member received an email that appeared to be from the company's CEO.
The email stated:
"Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners." The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the following would be a characteristic of the now highly centralized organization?
Which of the following types of accounts must be closed at the end of the period?
Which of the following would most likely serve as a foundation for individual operational goats?
According to 11A guidance on IT, which of the following are indicators of poor change management?
An analytical model determined that on Friday and Saturday nights the luxury brands stores should be open for extended hours and with a doubled number of employees present; while on Mondays and Tuesdays costs can be minimized by reducing the number of employees to a minimum and opening only for evening hours Which of the following best categorizes the analytical model applied?
Which of the following biometric access controls uses the most unique human recognition characteristic?
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze, improve, and control. Which of the following best describes this approach?
Question