IIA IIA-CIA-Part3 - Business Knowledge for Internal Auditing
According to IIA guidance, which of the following statements is true regarding analytical procedures?
According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?
According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?
Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Which of the following are the most common characteristics of big data?
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?
Which of the following best explains why an organization would enter into a capital lease contract?