Enjoy 15% Discount With Coupon 15off

Monthly Archives - December 2022

Which of the following is most likely to be a disadvantage of this outsourcing decision?

After the team member who specialized in fraud investigations left the internal audit team, the chief audit executive decided to outsource fraud investigations to a third party service provider on an as needed basis. Which of the following is most likely to be a disadvantage of this outsourcing decision?A ....

Read more...

Which of the following would the auditor do to test the reliability of a customer database1?

An internal auditor is examining the organization's internal control processes. Which of the following would the auditor do to test the reliability of a customer database1?A . Perform a site visit to see whether the organization's servers are operational B. Interview end users to determine whether they understand how to...

Read more...

What are two of the ways that Disciplined Agile provides a solid foundation for business agility?

What are two of the ways that Disciplined Agile provides a solid foundation for business agility?A . Enforces adherence to organizational standards. B. Provides guidance to streamline processes in a context-sensitive manner. C. Creates awesome teams that foster joy. D. Describes the trade-offs associated with a range of options. E....

Read more...

COMPRESSION = AUTO can automatically detect below compression techniques when FORMAT TYPE is CSV

COMPRESSION = AUTO can automatically detect below compression techniques when FORMAT TYPE is CSVA . GZIP B. BZ2 C. BROTLI D. ZSTD E. DEFLATE F. RAW_DEFLATEView AnswerAnswer: A,B,D,E,F Explanation: AUTO Compression algorithm detected automatically, except for Brotli-compressed files, which cannot currently be detected automatically. If loading Brotli-compressed files, explicitly use...

Read more...

Which of the following types of policies is used to regulate data storage on the network?

Which of the following types of policies is used to regulate data storage on the network?A . Password B. Acceptable use C. Account management D. RetentionView AnswerAnswer: D Explanation: Reference: http://www.css.edu/administration/information-technologies/computing-policies/computer-and- network-policies.html

Read more...

What are the five pillars of ISO standards?

What are the five pillars of ISO standards?A . Equal footing of members Market need Consensus Voluntary participation and application Worldwide applicability B. Equal footing of members Direction of Market Consensus Voluntary participation and application Worldwide applicability C. Equal footing of members Direction of Market Global alignment Voluntary participation and...

Read more...

Which tool should the auditor use?

During a consulting engagement an internal auditor wants to determine whether all principal stakeholders are involved in a project. Which tool should the auditor use?A . RACI (responsible, accountable, consult and inform) chart B. Flowchart C. SWOT {strengths. weaknesses opportunities, and threats) analysis D. Workflow analysisView AnswerAnswer: A

Read more...