Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

IIA-ACCA Exam Dumps - ACCA CIA Challenge Exam

Go to page:
Question # 65

The decision to implement enhanced failure detection and back-up systems to improve data integrity is an example of which risk response?

A.

Risk acceptance.

B.

Risk sharing.

C.

Risk avoidance.

D.

Risk reduction.

Full Access
Question # 66

Which of the following IT-related activities is most commonly performed by the second line of defense?

A.

Block unauthorized traffic.

B.

Encrypt data.

C.

Review disaster recovery test results.

D.

Provide independent assessment of IT security.

Full Access
Question # 67

Which of the following methods, if used in conjunction with electronic data interchange (EDI), will improve the organization's cash management program, reduce transaction data input time and errors, and allow the organization to negotiate discounts with EDI vendors based on prompt payment?

A.

Electronic funds transfer.

B.

Knowledge-based systems.

C.

Biometrics.

D.

Standardized graphical user interface.

Full Access
Question # 68

Which of the following statements is true regarding the capital budgeting procedure known as discounted payback period?

A.

It calculates the overall value of a project

B.

It ignores the time value of money

C.

It calculates the time a project takes to break even.

D.

It begins at time zero for the project.

Full Access
Question # 69

Which of the following techniques would be least effective in resolving the conflict created by an internal audit client's perception of the audit report as a personal attack on his management performance?

A.

The auditor should focus on the audit client as a person and understand him, rather than just concentrating on the problem.

B.

The auditor should make recommendations based on objective criteria, rather than based on a subjective assessment.

C.

The auditor should explore alternative solutions to address the audit problem, so the audit client has options.

D.

The auditor should take a flexible position on the recommendations and focus on resolving the issue by addressing the interests of the people concerned.

Full Access
Question # 70

According to MA guidance on IT. which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?

A.

Formulas and static data are locked or protected.

B.

The spreadsheet is stored on a network server that is backed up daily.

C.

The purpose and use of the spreadsheet are documented.

D.

Check-in and check-out software is used to control versions.

Full Access
Question # 71

An organization has instituted a bring-your-own-device (BYOD) work environment Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?

A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.

B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process

C.

Institute detection and authentication controls for all devices used for network connectivity and data storage

D.

Use management software to scan and then prompt patch reminders when devices connect to the network

Full Access
Question # 72

Which of the following application controls checks the integrity of data entered into a business application?

A.

Input controls.

B.

Output controls

C.

Processing controls

D.

Integrity controls

Full Access
Go to page: