Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?
A small furniture-manufacturing firm with 100 employees is located in a two-story building and does not plan to expand. The furniture manufactured is not special-ordered or custom-made. The most likely structure for this organization would be:
At a manufacturing plant, how would using Internet of Things during the production process benefit the organization?
Which of the following budgets serves as a basis for the budgeted income statement?
Which of me following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?
An organization decided to install a motion detection system in its warehouse to protect against after-hours theft. According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?
Which of the following is useful for forecasting the required level of inventory?
1) Statistical modeling.
2) Information about seasonal variations in demand.
3) Knowledge of the behavior of different business cycles.
4) Pricing models linked to seasonal demand.
Which of the following are typical audit considerations for a review of authentication?
1) Authentication policies and evaluation of controls transactions.
2) Management of passwords, independent reconciliation, and audit trail.
3) Control self-assessment tools used by management.
4) Independent verification of data integrity and accuracy.