An internal auditor was asked to review an equal equity partnership. In one sampled transaction, Partner A transferred equipment into the partnership with a self-declared value of $10,000, and Partner B contributed equipment with a self-declared value of $15,000. The capital accounts of each partner were subsequently credited with $12,500. Which of the following statements is true regarding this transaction?
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
Which of the following statements is true regarding data backup?
Which of the following application controls is the most dependent on the password owner?
With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?
According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?
Which of the following security controls would be appropriate to protect the exchange of information?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical products across all of its markets?