Enjoy 15% Discount With Coupon 15off

Monthly Archives - October 2022

Which type of endpoint should App1 use to obtain an access token?

You plan to migrate App1 to Azure. The solution must meet the authentication and authorization requirements. Which type of endpoint should App1 use to obtain an access token?A . Azure Instance Metadata Service (IMDS) B. Azure AD C. Azure Service Management D. Microsoft identity platformView AnswerAnswer: A Explanation: Scenario: To...

Read more...

Which of the following situations undermines the independence of the internal audit activity?

Which of the following situations undermines the independence of the internal audit activity?A . The internal audit activity is responsible for the company's risk management function, and its head manager reports to the chief audit executive. B. A senior member of the internal audit activity once worked in the corporate...

Read more...

What is a benefit software-defined networks when compared to traditional network?

What is a benefit software-defined networks when compared to traditional network?A . They improve information capture from the network by enabling model-driven telemetry, whereas traditional networks use SNMP for capturing logs from devices. B. They facilitate network management by replacing network services that run on dedicated hardware, whereas traditional networks...

Read more...

Which of the following best demonstrates that the internal audit activity is using due professional care?

Which of the following best demonstrates that the internal audit activity is using due professional care?A . The internal audit activity reports directly to the board on the engagements it performs. B. Internal auditors undertake the necessary training to complete their audit work. C. The completion of engagements is based...

Read more...

A risk with a high frequency of occurrence but with a low impact, is best managed by which one of the following risk response strategies?

A risk with a high frequency of occurrence but with a low impact, is best managed by which one of the following risk response strategies?A . Risk avoidance B. Risk acceptance C. Risk transfer D. Risk reductionView AnswerAnswer: D

Read more...

Which of the following best demonstrates conformance with the Standards relating to continuing professional development of internal auditors?

Which of the following best demonstrates conformance with the Standards relating to continuing professional development of internal auditors?A . Regulatory approval from an accrediting agency. B. Self-assessments against a competency framework. C. Approval and signoff from the board of directors. D. A review by external auditors on an annual basisView...

Read more...

Which three components can you use?

You need to design the chat solution to answer the inquiry from Guest1. Which three components can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Variables B. Escalations C. Smart match D. Synonyms E. TopicsView AnswerAnswer: A,C,D Explanation: Scenario: Guest1...

Read more...

Which of the following IIA Code of Ethics principles was violated in this scenario?

During a payroll audit, the internal auditor discovered that several individuals who have the same position classification as he are earning a significantly higher salary. The auditor noted the names and amounts of each, and he planned to prepare a request to the chief audit executive for a salary increase...

Read more...