Q: 1
An organization's technician was granted a role that enables him to prioritize projects throughout the
organization. Which type of authority will the technician most likely be exercising?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
An internal auditor discusses user-defined default passwords with the database administrator. Such
passwords will be reset as soon as the user logs in for the first time, but the initial value of the
password is set as "123456." Which of the following are the auditor and the database administrator
most likely discussing in this situation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
During which phase of the contracting process ere contracts drafted for a proposed business activity?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which of the following is an established systems development methodology?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
An organization's IT systems can only be accessed using the organization's virtual private network.
However, organizational emails, videoconferencing, and file-sharing tools are cloud-based and can
be accessed using multi-factor authentication via any device. Which of the following risks should the
organization acknowledge?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Which of the following best describes a transformational leader, as opposed to a transactional
leader?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Employees at an events organization use a particular technique to solve problems and improve
processes. The technique consists of five steps: define, measure, analyze,
improve, and control. Which of the following best describes this approach?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which of the following is a systems software control?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered
a high-risk user-developed application?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
A new manager received computations of the internal fate of return regarding the project proposal.
What should the manager compare the computation results to in order to determine whether the
project is potentially acceptable?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2