Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
A. An extranet
B. A local area network.
C. An intranet
D. The internet
Which of the following factors is most responsible for the increasing risk that unauthorized parties may obtain or tamper with personal data?
A. The lack of legal and industry frameworks on privacy.
B. The absence of generally accepted privacy principles.
C. The rapid growth and evolution of technology.
D. The legislated need to retain sensitive personal information.
A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
A. Lack of coordination among different business units.
B. Operational decisions are inconsistent with organizational goals.
C. Suboptimal decision-making.
D. Duplication of business activities.
Which of the following data security policies is most likely to be the result of a data privacy law?
A. Access to personally identifiable information is limited to those who need it to perform their job.
B. Confidential data must be backed up and recoverable within a 24-hour period.
C. Updates to systems containing sensitive data must be approved before being moved to production.
D. A record of employees with access to insider information must be maintained and those employees may not trade company stock during blackout periods
An investor has acquired an organization that has a dominant position in a mature, slow- growth industry and consistently creates positive financial income Which of the following terms would the investor most likely label this investment in her portfolio?
A. A star
B. A cash cow
C. A Question mark
D. A dog
Which of the following application controls verifies the accuracy of transaction results in a system?
A. Input controls
B. Output controls
C. Processing controls
D. Integrity controls
Which of me following application controls is the most dependent on the password owner?
A. Password selection
B. Password aging
C. Password lockout
D. Password rotation
Which of the following control features consists of a set of authorization codes that distinguishes among actions such as reading, adding, and deleting records?
A. Internally encrypted passwords
B. System access privileges.
C. Logon passwords
D. Protocol controls.
Which of the following principles is shared by both hierarchical and open organizational structures?
1) A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions 2) A supervisor's span of control should not exceed seven subordinates 3) Responsibility should be accompanied by adequate authority 4) Employees at all levels should be empowered to make decisions.
A. 1 and 3 only.
B. 1 and 4 only.
C. 2 and 3 only
D. 3 and 4 only.
Operational management in the IT department has introduced performance evaluation policies that are linked to employees achieving continuing education hours. This activity is designed to prevent which of the following conditions?
A. Knowledge/skills gap
B. Monitoring gap
C. Accountability/reward failure.
D. Communication failure.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your IIA-CIA-PART3-3P exam preparations and IIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.