IIA IIA-CIA-Part3 - Business Knowledge for Internal Auditing
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
Which of the following lists is comprised of computer hardware only?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?
An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
Which of the following techniques would best detect on inventory fraud scheme?
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
Which of the following IT-related activities is most commonly performed by the second line of defense?