exam questions

Exam IIA-CIA-Part3 All Questions

View all questions & answers for the IIA-CIA-Part3 exam

Exam IIA-CIA-Part3 topic 1 question 190 discussion

Actual exam question from IIA's IIA-CIA-Part3
Question #: 190
Topic #: 1
[All IIA-CIA-Part3 Questions]

Which of the following describes a typical desktop workstation used by most employees in their daily work?

  • A. Workstation contains software that prevents unauthorized transmission of information into and out of the organization's network.
  • B. Workstation contains software that controls information flow between the organization's network and the Internet.
  • C. Workstation contains software that enables the processing of transactions and is not shared among users of the organization's network.
  • D. Workstation contains software that manages user's access and processing of stored data on the organization's network.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Community vote distribution
D (50%)
B (33%)
C (17%)

Comments

Chosen Answer:
This is a voting comment. You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Elvoo
4 weeks ago
Selected Answer: D
C or D? and why?
upvoted 1 times
...
emtofid
1 month, 1 week ago
Selected Answer: C
SORRY I MEANT C
upvoted 1 times
...
emtofid
1 month, 1 week ago
Selected Answer: B
After a second review i think the answer might be B, A typical desktop workstation in an organization is a personal computer assigned to an individual employee. These workstations are equipped with software applications specific to the user's role, enabling them to process transactions and perform their daily tasks effectively.
upvoted 1 times
...
emtofid
2 months, 2 weeks ago
Selected Answer: B
B This describes a typical desktop workstation used by most employees in their daily work. It refers to software such as firewalls, proxies, or other security software that controls and monitors the flow of information between the workstation, the organization's network, and external networks like the Internet. This helps ensure secure communication and prevents unauthorized access or data leakage.
upvoted 1 times
...
seanshine
8 months ago
Selected Answer: D
Why not D? Processing of transactions can be specific for some workstation.
upvoted 2 times
...
Tico
3 years, 7 months ago
Please someone explain why C is the best answer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
200-301
Chicago, 1 minute ago