Q: 11
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes
that the organization allows third parties (vendors and visitors) to use outside smart devices to
access its proprietary networks and systems. Which of the following types of smart device risks
should the internal
Auditor be most concerned about?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Which of the following best describes the purpose of fixed manufacturing costs?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Which of the following statements Is true regarding the use of centralized authority to govern an
organization?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
An organization produces products X and Y. The materials used for the production of both products
are limited to 500 Kilograms
(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details
are as follows in order to maximize profit, how much of product Y should the organization produce
each month?
$10 $13
2 kg
70 units
6 kg
120 units
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
For employees, the primary value of implementing job enrichment is which of the following?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
According to 11A guidance on IT, which of the following are indicators of poor change management?
1. Inadequate control design.
2. Unplanned downtime.
3. Excessive troubleshooting .
4. Unavailability of critical services.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Which of the following organization structures would most likely be able to cope with rapid changes
and uncertainties?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Which of the following controls would be most efficient to protect business data from corruption and
errors?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which of the following security controls focuses most on prevention of unauthorized access to the
power plant?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2