IIA IIA-CIA-Part3 - Business Knowledge for Internal Auditing
Which of the following is a benefit from the concept of Internet of Things?
Which of the following scenarios best illustrates a spear phishing attack?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the
following would be a characteristic of the now highly centralized organization?
Which of the following best describes the primary objective of cybersecurity?
Which of the following IT layers would require the organization to maintain communication with a vendor in a tightly controlled and monitored manner?
Which of the following would most likely serve as a foundation for individual operational goats?
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?
A small chain of grocery stores made a reporting error and understated its ending inventory. What effect would this have on the income statement for the following year?
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?