An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?
According to IIA guidance, which of the following statements is true regarding penetration testing?
Which of following best demonstrates the application of the cost principle?
Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?
A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25.000 shirts. Actual sales total S300.000. What is margin of safety sales for the company?
An organization contracted a third-party service provider to plan, design, and build a new facility. Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?
Which of the following statements Is true regarding the use of centralized authority to govern an organization?
During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?
Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Which of the following best describes a potential benefit of using data analyses?
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
Which of the following networks is suitable for an organization that has operations In multiple cities and countries?
Which of the following best describes the type of control provided by a firewall?