Which of the following factors is most responsible for the increasing risk that unauthorized parties may obtain or tamper with personal data?
Answer : C
An internal audit manager is explaining to a newly hired staff auditor the various analytics techniques frequently used by the internal audit activity Which of the following statements is true regarding these analytics techniques?
Answer : C
Which of the following control techniques would minimize the risk of interception during transmission in an electronic data interchange system?
1) Encryption.
2) Traffic padding.
3) Edit checks.
4) Structured data format.
Answer : A
A restaurant deeded to expand its business to include delivery services rather than relying on third-party food delivery services. Which of the following best describes the restaurant's strategy?
Answer : B
An internal auditor discovered that several unauthorized modifications were made to the production version of an organization's accounting application. Which of the following best describes this deficiency?
Answer : D
Which of the following performance measures disincentivizes engaging in earnings management?
Answer : A
Which of the following is a typical example of structured data?
Answer : A