In addition to data protection, which of the following is a control that is typically used by companies to safeguard the privacy rights of their customers?I). End-user computing.II). Encryption of data.III). Spyware.IV). Intrusion detection.
Answer(s): C
When reviewing the information security in an organization, an internal auditor should always recommend to management the strongest security system that is compatible with the organization's
Answer(s): B
Which of the following best describes the procedures used by the representatives of an organization's stakeholders to provide oversight of the processes administered by management?
Answer(s): A
Which of the following statements regarding organizational governance is not correct?
Post your Comments and Discuss IIA CIA exam with other Community members:
jalal ali Commented on February 25, 2025 What factors should be considered when evaluating the independence of the internal audit activity by a peer review team? Anonymous
Joseph Zormelo Commented on January 12, 2025 Q21 is A. To maximize value, an enterprise-wide risk assessment should focus on enterprise-level risks, as these pose the greatest threat or opportunity to the organization's overall success. Anonymous
koussenoudo roger Commented on January 10, 2025 très bonne plateforme Anonymous
MAX Commented on December 21, 2024 Q114 Should be D Anonymous