Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the IIA CIA Challenge Exam IIA-ACCA Questions and answers with ValidTests

Exam IIA-ACCA All Questions
Exam IIA-ACCA Premium Access

View all detail and faqs for the IIA-ACCA exam

Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?

Options:

A.

PKI uses an independent administrator to manage the public key.

B.

The public key is authenticated against reliable third-party identification.

C.

PKI's public accessibility allows it to be used readily for e-commerce.

D.

The private key uniquely authenticates each party to a transaction.

Expert Solution
Questions # 77:

The audit committee of a global corporation has mandated a change in the organization's business ethics policy. Which of the following approaches describes the best way to accomplish the policy's diffusion worldwide?

Options:

A.

Deploy the policy in the corporate headquarters' language, so everyone gets an unfiltered version simultaneously.

B.

Introduce the policy region by region, using any lessons learned to change the subsequent version of the policy for the next area.

C.

Consult with legal and operational management in each affected country to ensure the final version can be implemented globally, following audit committee approval.

D.

Send the board-approved version of the policy to each country's senior leadership, and empower them to tailor the policy to the local language and culture.

Expert Solution
Questions # 78:

Which of the following describes the free trade zone in an e-commerce environment?

Options:

A.

Zone that separates an organization's servers from outside forces.

B.

Area in which messages are scrutinized to determine if they are authorized.

C.

Area where communication and transactions occur between trusted parties.

D.

Zone where data is encrypted, users are authenticated, and user traffic is filtered.

Expert Solution
Questions # 79:

Organizational activities that complement each other and create a competitive advantage are called a:

Options:

A.

Merger.

B.

Strategic fit.

C.

Joint venture.

D.

Strategic goal.

Expert Solution
Questions # 80:

Which of the following strategies is most appropriate for an industry that is in decline?

Options:

A.

Invest in marketing.

B.

Invest in research and development.

C.

Control costs.

D.

Shift toward mass production.

Expert Solution
Questions # 81:

Providing knowledge, motivating organizational members, controlling and coordinating individual efforts, and expressing feelings and emotions are all functions of:

Options:

A.

Motivation.

B.

Performance.

C.

Organizational structure.

D.

Communication.

Expert Solution
Questions # 82:

The first stage in the development of a crisis management program is to:

Options:

A.

Formulate contingency plans.

B.

Conduct a risk analysis.

C.

Create a crisis management team.

D.

Practice the response to a crisis.

Expert Solution
Questions # 83:

For an engineering department with a total quality management program, important elements of quality management include all of the following except:

Options:

A.

Basing performance evaluations on the number of projects completed.

B.

Comparing results with those of other engineering departments.

C.

Creating a quality council within the engineering department.

D.

Conducting post-project surveys on performance.

Expert Solution
Questions # 84:

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange?

Options:

A.

A time-sensitive just-in-time purchase environment.

B.

A large volume of custom purchases.

C.

A variable volume sensitive to material cost.

D.

A currently inefficient purchasing process.

Expert Solution
Questions # 85:

An organization facing rapid growth decides to employ a third party service provider to manage its customer relationship management function. Which of the following is true regarding the supporting application software used by that provider compared to an in-house developed system?

1. Updating documentation is always a priority.

2. System availability is usually more reliable.

3. Data security risks are lower.

4. Overall system costs are lower.

Options:

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 4 only

D.

3 and 4 only

Expert Solution
Questions # 86:

Which of the following is a key component of an organization's cybersecunty governance?

Options:

A.

Administrators monitoring the use, assignment and configuration of privileges on the network.

B.

The IT department establishing^ implementing, and actively managing security configurations.

C.

Management identifying and classifying the types of critical data in the organization's system

D.

Senior management of the organization setting the cybersecurity policy

Expert Solution
Questions # 87:

An employee frequently uses a personal smart device to send and receive work-related emails. Which of the following controls would be most effective to mitigate security risks related to these transmissions?

Options:

A.

Hardware encryption.

B.

Software encryption

C.

Data encryption.

D.

Authentication.

Expert Solution
Questions # 88:

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:

A.

Direct product costs

B.

Indirect product costs

C.

Direct period costs

D.

Indirect period costs.

Expert Solution
Questions # 89:

Which of the following would provide the most relevant assurance that the application under development will provide maximum value to the organization?

Options:

A.

Use of a formal systems development lifecycle.

B.

End-user involvement.

C.

Adequate software documentation.

D.

Formalized non-regression testing phase.

Expert Solution
Questions # 90:

The board has requested that the internal audit activity be involved in all phases of the organization's outsourcing of its network management. During which of the following stages is the internal auditor most likely to verify that the organization's right-to-audit clause is drafted effectively?

Options:

A.

Implementation and transition phase.

B.

Monitoring and reporting phase

C.

Decision-making and business-case phase.

D.

Tendering and contracting phase.

Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions