Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

IIA-CIA-Part3-3P CIA Exam Part Three: Business Knowledge for Internal Auditing Questions and Answers

Questions 4

A restaurant deeded to expand its business to include delivery services rather than relying on third-party food delivery services. Which of the following best describes the restaurant ' s strategy?

Options:

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Buy Now
Questions 5

Which of the following COSO internal control framework components encompasses establishing structures, reporting lines, authorities, and responsibilities?

Options:

A.

Control environment.

B.

Control activities.

C.

Information and communication.

D.

Monitoring.

Buy Now
Questions 6

Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?

Options:

A.

PKI uses an independent administrator to manage the public key.

B.

The public key is authenticated against reliable third-party identification.

C.

PKI ' s public accessibility allows it to be used readily for e-commerce.

D.

The private key uniquely authenticates each party to a transaction.

Buy Now
Questions 7

The following transactions and events occurred during the year:

- $300,000 of raw materials were purchased, of which $20,000 were returned because of defects

- $600,000 of direct labor costs were incurred.

- S750.000 of manufacturing overhead costs were incurred.

What is the organization ' s cost of goods sold for the year?

Options:

A.

$1.480.000

B.

$1 500 000

C.

$1,610.000

D.

$1650 000

Buy Now
Questions 8

Which of the following is useful for forecasting the required level of inventory?

1) Statistical modeling.

2) Information about seasonal variations in demand.

3) Knowledge of the behavior of different business cycles.

4) Pricing models linked to seasonal demand.

Options:

A.

1 and 2 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, 3, and 4

Buy Now
Questions 9

The greatest advantage of functional departmentalization is that it:

Options:

A.

Facilitates communication between primary functions.

B.

Helps to focus on the achievement of organizational goals.

C.

Provides for efficient use of specialized knowledge .

D.

Accommodates geographically dispersed companies

Buy Now
Questions 10

Which of the following statements is most accurate with respect to various forms, elements, and characteristics of business contracts?

Options:

A.

A contract is a tool used by both suppliers and customers, the model and complexity of which generally remains constant

B.

Collaboration during contract negotiation encourages stakeholders to develop consensus but typically increases cycle times and the likelihood that the contract will fail

C.

Differing legal requirements affect the attitudes of contracting parties as well as the length content and language of contracts

D.

A contract is a tool used by both suppliers and customers though it offers commercial assurance of the relationship, purely from a customer perspective

Buy Now
Questions 11

An organization is developing a new online collaboration tool for employees. The tool includes a homepage that is customized to each employee according to his department and job function Which of the following engagements should be conducted to ensure that the organization has included all departments and job functions in the system before it is implemented?

Options:

A.

An application control review

B.

A source code review

C.

A design review

D.

An access control review

Buy Now
Questions 12

Which of the following are the most common characteristics of big data?

Options:

A.

Visibility, validity, vulnerability

B.

Velocity, variety volume.

C.

Complexity completeness constancy

D.

Continuity, control convenience

Buy Now
Questions 13

Which of the following options correctly defines a transmission control protocol/Internet protocol (TCP/IP)?

Options:

A.

System software that acts as an interface between a user and a computer.

B.

A standardized set of guidelines that facilitates communication between computers on different

networks.

C.

System software that translates hypertext markup language to allow users to view a remote webpage.

D.

A network of servers used to control a variety of mission-critical operations.

Buy Now
Questions 14

Which of the following is likely to occur when an organization decides to adopt a decentralized organizational structure?

Options:

A.

A slower response to external change.

B.

Less controlled decision making.

C.

More burden on higher-level managers.

D.

Less use of employees ' true skills and abilities.

Buy Now
Questions 15

Which of the following is the best example of IT governance controls?

Options:

A.

Controls that focus on segregation of duties, financial and change management

B.

Personnel policies that define and enforce conditions for staff in sensitive IT areas

C.

Standards that support IT policies by more specifically defining required actions

D.

Controls that focus on data structures and the minimum level of documentation required

Buy Now
Questions 16

When using data analytics during a review of the procurement process what is the first step in the analysis process?

Options:

A.

Identity data anomalies and outliers

B.

Define questions to be answered

C.

identify data sources available

D.

Determine the scope of the data extract

Buy Now
Questions 17

The leadership of an organization encourages employees to form voluntary problem-solving groups whereby several employees from the same work area meet regularity during work hours to discuss improvements and creative ways to reduce costs. Which of the following best describes this approach?

Options:

A.

Open-book management

B.

Quality control circles

C.

Self-managed teams

D.

Cross-functional teams

Buy Now
Questions 18

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

Options:

A.

Rooting.

B.

Eavesdropping.

C.

Man in the middle.

D.

Session hijacking.

Buy Now
Questions 19

An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two.

Which of the following could be the reason for the decline in the net profit margin for year two?

Options:

A.

Cost of sales increased relative to sales.

B.

Total sales increased relative to expenses.

C.

The organization had a higher dividend payout rate in year two.

D.

The government increased the corporate tax rate.

Buy Now
Questions 20

Which of the following stages of group development is associated with accepting team responsibilities?

Options:

A.

Forming stage.

B.

Performing stage.

C.

Norming stage.

D.

Storming stage.

Buy Now
Questions 21

Which of the following would provide the most relevant assurance that the application under development will provide maximum value to the organization?

Options:

A.

Use of a formal systems development lifecycle.

B.

End-user involvement.

C.

Adequate software documentation.

D.

Formalized non-regression testing phase.

Buy Now
Questions 22

An organization uses a database management system (DBMS) as a repository for data. The DBMS, in turn, supports a number of end-user developed applications which were created using fourth-generation programming languages. Some of the applications update the database. Which of the following is the most important control related to the integrity of the data in the database?

Options:

A.

End users have their read-only applications approved by the information systems department before accessing the database.

B.

Concurrency update controls are in place.

C.

End-user applications are developed on personal computers before being implemented on the

mainframe.

D.

A hierarchical database model is adopted so that multiple users can be served at the same time.

Buy Now
Questions 23

Which of the following is a limiting factor for capacity expansion?

Options:

A.

Government pressure on organizations to increase or maintain employment.

B.

Production orientation of management.

C.

Lack of credible market leader in the industry.

D.

Company diversification.

Buy Now
Questions 24

Which of the following are appropriate functions for an IT steering committee?

1) Assess the technical adequacy of standards for systems design and programming.

2) Continually monitor of the adequacy and accuracy of software and hardware in use.

3) Assess the effects of new technology on the organization`s IT operations.

4) Provide broad oversight of implementation, training, and operation of new systems.

Options:

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Buy Now
Questions 25

For an engineering department with a total quality management program, important elements of quality management include all of the following except:

Options:

A.

Basing performance evaluations on the number of projects completed.

B.

Comparing results with those of other engineering departments.

C.

Creating a quality council within the engineering department.

D.

Conducting post-project surveys on performance.

Buy Now
Questions 26

Which of the following performance measures would be appropriate for evaluating an investment center, which has responsibility for its revenues, costs, and investment base, but would not be appropriate for evaluating cost, revenue, or profit centers?

Options:

A.

A flexible budget.

B.

Variance analysis.

C.

A contribution margin income statement by segment.

D.

Residual income.

Buy Now
Questions 27

According to Porter ' s model of competitive strategy, which of the following is a generic strategy?

1 Differentiation.

2) Competitive advantage.

3) Focused differentiation.

4) Cost focus.

Options:

A.

2 only

B.

3 and 4 only

C.

1, 3, and 4 only

D.

1, 2, 3, and 4

Buy Now
Questions 28

An organization is considering mirroring the customer data for one regional center at another center. A disadvantage of such an arrangement would be:

Options:

A.

Lack of awareness of the state of processing.

B.

Increased cost and complexity of network traffic.

C.

Interference of the mirrored data with the original source data.

D.

Confusion about where customer data are stored.

Buy Now
Questions 29

Within an enterprise, IT governance relates to the:

1) Alignment between the enterprise ' s IT long term plan and the organization ' s objectives.

2) Organizational structures of the company that are designed to ensure that IT supports the organization ' s strategies and objectives.

3) Operational plans established to support the IT strategies and objectives.

4) Role of the company ' s leadership in ensuring IT supports the organization ' s strategies and objectives.

Options:

A.

1 and 2 only

B.

3 and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 30

Which of the following statements is true regarding outsourced business processes?

Options:

A.

Outsourced business processes should not be considered in the internal audit universe because the controls are owned by the external service provider.

B.

Generally, independence is improved when the internal audit activity reviews outsourced business processes.

C.

The key controls of outsourced business processes typically are more difficult to audit because they are designed and managed externally.

D.

The system of internal controls may be better and more efficient when the business process is

outsourced compared to internally sourced.

Buy Now
Questions 31

The mobility of personal smart devices significantly increases which of the following risks?

Options:

A.

Data integrity risks

B.

Compliance risks.

C.

Physical security risks

D.

Privacy risks

Buy Now
Questions 32

Which of the following best describes a market signal?

Options:

A.

The bargaining power of buyers is forcing a drop in market prices.

B.

There is pressure from the competitor ' s substitute products.

C.

Strategic analysis by the organization indicates feasibility of expanding to new market niches.

D.

The competitor announces a new warranty program.

Buy Now
Questions 33

A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25,000 shirts. Actual sales total $300,000.

What is margin of safety sales for the company?

Options:

A.

$100,000

B.

$200,000

C.

$275,000

D.

$500,000

Buy Now
Questions 34

Which of the following principles is shared by both hierarchical and open organizational structures?

1) A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions

2) A supervisor ' s span of control should not exceed seven subordinates

3) Responsibility should be accompanied by adequate authority

4) Employees at all levels should be empowered to make decisions.

Options:

A.

1 and 3 only.

B.

1 and 4 only.

C.

2 and 3 only

D.

3 and 4 only.

Buy Now
Questions 35

Which of the following IT-related activities is most commonly performed by the second line of defense?

Options:

A.

Block unauthorized traffic.

B.

Encrypt data.

C.

Review disaster recovery test results.

D.

Provide independent assessment of IT security.

Buy Now
Questions 36

Which of the following is a primary objective of the theory of constraints?

Options:

A.

Full or near capacity in processes.

B.

Smooth workflow among processes.

C.

Few or no defects.

D.

Lowered inventory levels.

Buy Now
Questions 37

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization ' s needs, in order to quickly recover operational

capability in the event of a disaster.

Which of the following best describes this approach to disaster recovery planning?

Options:

A.

Cold recovery plan.

B.

Outsourced recovery plan.

C.

Storage area network recovery plan.

D.

Hot recovery plan.

Buy Now
Questions 38

During an audit of the organization ' s annual financial statements, the internal auditor notes that the current cost of goods sold percentage is substantially higher than in prior years. Which of the following is the most likely explanation for this increase?

Options:

A.

Cost of raw material inventory items is decreasing.

B.

Process to manufacture goods is more efficient.

C.

Labor productivity to produce goods is increasing.

D.

Write-off of inventory is increasing.

Buy Now
Questions 39

Which of the following is a project planning methodology that involves a complex series ot required simulations to provide information about schedule risk?

Options:

Buy Now
Questions 40

Organization X owns a 38 percent equity stake in Organization Y. Which of the following statements is true regarding the financial treatment for this relationship?

Options:

A.

Y should be listed as an investment asset on X ' s balance sheet

B.

X must consolidate the financial statements for both organizations

C.

Y should be reported as a footnote to X ' s financial statements

D.

Y should not be reported by X as X does not have a controlling interest

Buy Now
Questions 41

Which of the following IT operational areas is responsible for the integrity of data flow within an

organization?

Options:

A.

Network

B.

Database

C.

Operating system

D.

Server

Buy Now
Questions 42

Which of the following is an example of a physical control?

Options:

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization ' s critical data

Buy Now
Questions 43

Which of the following IT controls includes protection for mainframe computers and workstations?

Options:

A.

Change management controls

B.

Physical and environmental controls.

C.

System software controls

D.

Organization and management controls

Buy Now
Questions 44

Which of the following is an example of a phishing attack?

Options:

A.

An employee receives an email that appears to be from the organization ' s bank, though it is not. The employee replies to the email and sends the requested confidential information.

B.

An organization ' s website has been hacked. The hacker added political content that is not consistent with the organization ' s views.

C.

An organization ' s systems have been compromised by malicious software. The software locks the organization ' s operating system until d ransom is paid.

D.

An organization ' s communication systems have been intercepted. A communication session is controlled by an unauthorized third party.

Buy Now
Questions 45

The board has requested that the internal audit activity be involved in all phases of the organization ' s outsourcing of its network management. During which of the following stages is the internal auditor most likely to verify that the organization ' s right-to-audit clause is drafted effectively?

Options:

A.

Implementation and transition phase.

B.

Monitoring and reporting phase

C.

Decision-making and business-case phase.

D.

Tendering and contracting phase.

Buy Now
Questions 46

According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?

Options:

A.

Project portfolio.

B.

Project development.

C.

Project governance.

D.

Project management methodologies.

Buy Now
Questions 47

Which of the following statements is true regarding the " management-by-objectives " method?

Options:

A.

Management by objectives is most helpful in organizations that nave rapid changes.

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.

Management by objectives helps organizations to keep employees motivated.

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals

Buy Now
Questions 48

Which of the following factors is most responsible for the increasing risk that unauthorized parties may obtain or tamper with personal data?

Options:

A.

The lack of legal and industry frameworks on privacy.

B.

The absence of generally accepted privacy principles.

C.

The rapid growth and evolution of technology.

D.

The legislated need to retain sensitive personal information.

Buy Now
Questions 49

What would be the effect if an organization paid one of its liabilities twice during the year in error?

Options:

A.

Assets liabilities and owners ' equity would be understated

B.

Assets net income and owners ' equity would be unaffected

C.

Assets and liabilities would be understated

D.

Assets net income and owners ' equity would be understated, but liabilities would be overstated

Buy Now
Questions 50

An internal auditor is investigating a potential fraudulent activity. What is the first test the auditor should perform on the transaction data under scrutiny?

Options:

A.

Digital analysis for statistically unlikely occurrences that may indicate system tampering.

B.

Verification of the completeness and integrity of the obtained data.

C.

Detailed review of the data contents to strategize the best analytical techniques.

D.

Calculation of statistical parameters to identify outliers requiring further scrutiny.

Buy Now
Questions 51

For employees, the primary value of implementing job enrichment is which of the following?

Options:

A.

Validation of the achievement of their goals and objectives.

B.

Increased knowledge through the performance of additional tasks.

C.

Support for personal growth and a meaningful work experience.

D.

An increased opportunity to manage better the work done by their subordinates.

Buy Now
Questions 52

Which of the following statements is true regarding partnership liquidation?

Options:

A.

Operations can continue after the liquidation if all partners agree

B.

Partnership liquidation ends both the legal and economic life of an entity

C.

Partnership liquidation occurs when there is capital deficiency Stable

D.

When a partnership is liquidated, each partner pays creditors from cash received

Buy Now
Questions 53

An organization requires an average of 58 days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?

Options:

A.

26 days.

B.

90 days.

C.

100 days.

D.

110 days.

Buy Now
Questions 54

An employee ' s mobile device used for work was stolen in a home burglary.

Which control, if already implemented by the organization, would best prevent unauthorized access to organizational data stored on the employee ' s device?

Options:

A.

Access control via biometric authentication.

B.

Access control via passcode authentication.

C.

Access control via swipe pattern authentication.

D.

Access control via security question authentication.

Buy Now
Questions 55

Which of the following is a security feature that involves the use of hardware and software to fitter or prevent specific information from moving between the outside network and the outside network?

Options:

A.

Authorization

B.

Architecture model

C.

Firewall

D.

Virtual private network

Buy Now
Questions 56

An internal auditor reviews a data population and calculates the mean, median, and range.

What is the most likely purpose of performing this analytic technique?

Options:

A.

To inform the classification of the data population.

B.

To determine the completeness and accuracy of the data.

C.

To identify whether the population contains outliers.

D.

To determine whether duplicates in the data inflate the range.

Buy Now
Questions 57

Which of the following is a typical example of structured data?

Options:

A.

Production information maintained in relational tables.

B.

Tweets and posts of users on social media.

C.

Photos and videos stored in hard drive catalogs.

D.

Sales reports documented in word processing software.

Buy Now
Questions 58

Which of the following statements is true regarding an organization ' s inventory valuation1?

Options:

A.

The valuation will be incorrect it the inventory includes goods m transit shipped free on board (FOB) destination to another organization

B.

The valuation will be correct if the inventory includes goods received on consignment from another organization

C.

The valuation will be incorrect it the inventory includes goods in transit shipped FOB shipping point from another organization

D.

The valuation will be correct it the inventory includes goods sent on consignment to another

organization

Buy Now
Questions 59

An organization has a complex systems infrastructure consisting of multiple internally developed, off the shelf, and purchased but significantly customized applications. Some of these applications share databases or process data that is used by another stand-alone application, and interfaces have been written to move data between these applications as needed through batch processing Which of the following situations presents the greatest risk exposure given this environment?

Options:

A.

Documentation of each system and its interactions, interfaces, and dependencies with other systems and databases is not gathered and maintained.

B.

Batch processing jobs include key financial data that is not posted to the accounting system until the next day. preventing real-time queries.

C.

The job scheduling tool frequently malfunctions, causing scheduled jobs not to run. An error message is sent to IT personnel when a job fails.

D.

The implementation of a major update for a key application is delayed until any potential

interdependencies are identified and analyzed.

Buy Now
Questions 60

While conducting audit procedures at the organization ' s data center, an internal auditor noticed the following:

Backup media was located on data center shelves.

Backup media was organized by date.

Backup schedule was one week in duration.

The system administrator was able to present restore logs.

Which of the following is reasonable for the internal auditor to conclude?

Options:

A.

Backup media is not properly stored, as the storage facility should be off-site.

B.

Backup procedures are adequate and appropriate according to best practices.

C.

Backup media is not properly indexed, as backup media should be indexed by system, not date.

D.

Backup schedule is not sufficient, as full backup should be conducted daily.

Buy Now
Questions 61

Which of the following recognized competitive strategies focuses on gaining efficiencies?

Options:

A.

Focus

B.

Cost leadership

C.

Innovation

D.

Differentiation

Buy Now
Questions 62

An organization has a total asset turnover of 3.0 times and a total debt-to-total assets ratio of 80 percent. If the organization has total debt of $1 000 000 what is the organization ' s sales level?

Options:

A.

$266.667

B.

$416,667

C.

$3.750.000

D.

$5 000.000

Buy Now
Questions 63

In which of the following scenarios would transfer pricing be used?

Options:

A.

Company A owns Company B; Company B sells goods to Company A.

B.

Company A does not own Company B. Company A charges Company B a fee to sell Company B ' s goods without taking ownership of the goods.

C.

Company A owns both Company B and Company C; all three companies sell goods to the public.

D.

Company A moves goods internally from one location to another.

Buy Now
Questions 64

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet. When the spreadsheet was opened, the cybercriminal was able to attack the company ' s network and gain access to an unpublished and highly anticipated book.

Which of the following controls would be most effective to prevent such an attack?

Options:

A.

Monitoring network traffic.

B.

Using whitelists and blacklists to manage network traffic.

C.

Restricting access and blocking unauthorized access to the network.

D.

Educating employees throughout the company to recognize phishing attacks.

Buy Now
Questions 65

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:

A.

Direct product costs

B.

Indirect product costs

C.

Direct period costs

D.

Indirect period costs.

Buy Now
Questions 66

Which of the following actions would senior management need to consider as pan of new IT guidelines regarding the organization ' s cybersecurity policies?

Options:

A.

Assigning new roles and responsibilities for senior IT management.

B.

Growing use of bring your own devices tor organizational matters

C.

Expansion of operations into new markets with united IT access

D.

Hiring new personnel within the IT department tor security purposes

Buy Now
Questions 67

Which of the following security controls would be the most effective in preventing security breaches?

Options:

A.

Approval of identity request.

B.

Access logging.

C.

Monitoring privileged accounts.

D.

Audit of access rights.

Buy Now
Questions 68

An internal audit manager is explaining to a newly hired staff auditor the various analytics techniques frequently used by the internal audit activity Which of the following statements is true regarding these analytics techniques?

Options:

A.

Process mining is a type of data analysts where the data subject is a process

B.

Process analysis is a type of data mining where the data subject is a designated area of a process

C.

Data mining is a type of data analysis that focuses on finding statistical relationships in order to create

profiles

D.

Data mining involves examining small amounts of structured data in a systematic manner

Buy Now
Questions 69

In terms of international business strategy, which of the following is true regarding a multi-domestic strategy?

Options:

A.

It uses the same products in all countries.

B.

It centralizes control with little decision-making authority given to the local level.

C.

It is an effective strategy when large differences exist between countries.

D.

It provides cost advantages, improves coordinated activities, and speeds product development.

Buy Now
Questions 70

The most important reason to use risk assessment in audit planning is to:

Options:

A.

Identify redundant controls.

B.

Improve budgeting accuracy.

C.

Enhance assurance provided to management.

D.

Assist in developing audit programs.

Buy Now
Questions 71

If a bank ' s activities are categorized under such departments as community banking, institutional banking, and agricultural banking, what kind of departmentalization is being utilized?

Options:

A.

Product departmentalization.

B.

Process departmentalization.

C.

Functional departmentalization.

D.

Customer departmentalization.

Buy Now
Questions 72

A capital investment project will have a higher net present value, everything else being equal, if it has:

Options:

A.

A higher initial investment level.

B.

A higher discount rate.

C.

Cash inflows that are larger in the later years of the life of the project.

D.

Cash inflows that are larger in the earlier years of the life of the project.

Buy Now
Questions 73

Which of the following are appropriate reasons for internal auditors to document processes as part of an audit engagement?

1) To determine areas of primary concern.

2) To establish a standard format for process mapping.

3) To define areas of responsibility within the organization.

4) To assess the performance of employees.

Options:

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 3 only

D.

2 and 4 only

Buy Now
Questions 74

Which of the following is the best reason for considering the acquisition of a nondomestic organization?

Options:

A.

Relatively fast market entry.

B.

Improved cash flow of the acquiring organization.

C.

Increased diversity of corporate culture.

D.

Opportunity to influence local government policy.

Buy Now
Questions 75

Which of the following is an example of a nonfinancial internal failure quality cost?

Options:

A.

Decreasing gross profit margins over time.

B.

Foregone contribution margin on lost sales.

C.

Defective units shipped to customers.

D.

Excessive time to convert raw materials into finished goods.

Buy Now
Questions 76

An organization has recorded the following profit and expenses:

Profit before interest and tax

$200,000

Sales

$2,300,000

Purchases of materials

$700,000

Interest expenses

$30,000

If the value-added tax (VAT) rate is 20 percent and the corporate tax rate is 30 percent, which of the following

is the amount of VAT that the organization has to pay?

Options:

A.

$34,000

B.

$51,000

C.

$60,000

D.

$320,000

Buy Now
Questions 77

Which of the following statements is correct regarding corporate compensation systems and related bonuses?

1) A bonus system should be considered part of the control environment of an organization and should be considered in formulating a report on internal control.

2) Compensation systems are not part of an organization ' s control system and should not be reported as such.

3) An audit of an organization ' s compensation system should be performed independently of an audit of the control system over other functions that impact corporate bonuses.

Options:

A.

1 only

B.

2 only

C.

3 only

D.

2 and 3 only

Buy Now
Questions 78

Which of the following describes the free trade zone in an e-commerce environment?

Options:

A.

Zone that separates an organization ' s servers from outside forces.

B.

Area in which messages are scrutinized to determine if they are authorized.

C.

Area where communication and transactions occur between trusted parties.

D.

Zone where data is encrypted, users are authenticated, and user traffic is filtered.

Buy Now
Questions 79

Listening effectiveness is best increased by:

Options:

A.

Resisting both internal and external distractions.

B.

Waiting to review key concepts until the speaker has finished talking.

C.

Tuning out messages that do not seem to fit the meeting purpose.

D.

Factoring in biases in order to evaluate the information being given.

Buy Now
Questions 80

Which of the following statements about COBIT is not true?

Options:

A.

COBIT helps management understand and manage the risks associated with information technology (IT) processes.

B.

Management needs to determine the cost-benefit ratio of adopting COBIT control objectives.

C.

COBIT control objectives are specific to various IT platforms and help determine minimum controls.

D.

COBIT provides management with the capability to conduct self-assessments against industry best practices.

Buy Now
Questions 81

An internal audit activity is piloting a data analytics model, which aims to identify anomalies in payments to vendors and potential fraud indicators Which of the following would be the most appropriate criteria for assessing the success of the piloted model?

Options:

A.

The percentage of cases flagged by the model and confirmed as positives.

B.

The development and maintenance costs associated with the model

C.

The feedback of auditors involved with developing the model

D.

The number of criminal investigations initiated based on the outcomes of the model

Buy Now
Questions 82

Which of the following cost of capital methods identifies the time period required to recover the cost of the capital investment from the annual inflow produced?

Options:

A.

Cash payback technique.

B.

Annual rate of return technique.

C.

Internal rate of return method.

D.

Net present value method.

Buy Now
Questions 83

Which of the following is a cybersecurity monitoring activity that involves assessing the strength of an organization ' s IT protection?

Options:

A.

Boundary defense

B.

Malware defense

C.

Penetration tests

D.

Wireless access controls

Buy Now
Questions 84

During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an analytics tool to identify the top five vendors that received the highest sum of payments.

Which of the following analytics techniques did the auditor apply?

Options:

A.

Process analysis.

B.

Process mining.

C.

Data analysis.

D.

Data mining.

Buy Now
Questions 85

Which of the following statements is true regarding the risks associated with the increased use of smart devices at work?

Options:

A.

Due to their small size and portability smart devices and their associated data are typically less susceptible to physical loss

B.

The Bluetooth and WI-FI features of smart devices enhance the security of data while in transit

C.

The global positioning system (GPS) capability of smart devices could be exploited to plan cyberattacks

D.

When the user fads to perform jailbreaking or rooting, data security and privacy risks we increased

Buy Now
Questions 86

Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?

Options:

A.

Cost method

B.

Equity method

C.

Consolidation method

D.

Fair value method

Buy Now
Questions 87

An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?

Options:

A.

Duplicate testing.

B.

Joining data sources

C.

Gap analysis

D.

Classification

Buy Now
Questions 88

Which of the following is the first step an internal audit activity should undertake when executing a data analytics process?

Options:

A.

Conduct a risk assessment regarding the effectiveness of the data analytics process.

B.

Analyze possible and available sources of raw data

C.

Define the purpose and the anticipated value

D.

Select data for cleaning and normalization procedures.

Buy Now
Questions 89

Which of the following devices best controls both physical and logical access to information systems?

Options:

A.

Plenum.

B.

Biometric lock.

C.

Identification card.

D.

Electromechanical lock.

Buy Now
Questions 90

According to IIA guidance, which of the following is the correct order to conduct a business impact analysis (BIA) for the potential loss of an organization ' s network services ' '

1. identify resources and partners to provide required recovery services

2. Identify the business processes supporting the network functionality

3. Obtain approval of the BIA from the operating managers relative to their areas of responsibility

4. Identify the business impact if the network services cannot be performed

Options:

A.

1, 2, 3, 4

B.

2, 1, 4, 3

C.

2, 4, 1, 3

D.

4, 2, 1, 3

Buy Now
Questions 91

According to IIA guidance, which of the following statements is true regarding analytical procedures?

Options:

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences but cannot be used to identify the absence of differences

Buy Now
Questions 92

The management of working capital is most crucial for which of the following aspects of business?

Options:

A.

Liquidity.

B.

Profitability.

C.

Solvency.

D.

Efficiency.

Buy Now
Questions 93

At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?

Options:

A.

Project plan development.

B.

Project plan execution.

C.

Integrated change control.

D.

Project quality planning.

Buy Now
Questions 94

During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?

Options:

A.

Initiation phase.

B.

Bidding phase.

C.

Development phase.

D.

Negotiation phase

Buy Now
Questions 95

A chief audit executive wants to implement an enterprisewide resource planning software.

Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation ' s success?

Options:

A.

Readiness assessment.

B.

Project risk assessment.

C.

Post-implementation review.

D.

Key phase review.

Buy Now
Questions 96

Which of the following statements is true regarding cybersecurity risk?

Options:

A.

Cybersecurity risks are identical across all organizations regardless of industry

B.

Installation of antivirus and malware software prevents cybersecurity risks

C.

Deployment of proper cybersecurity measures assures business success

D.

Information value extends the emergence of cybersecurity risks

Buy Now
Questions 97

An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.

Which of the following would be considered the most significant cyber threat to the organization?

Options:

A.

Cybercriminals hacking into the organization ' s time and expense system to collect employee personal data.

B.

Hackers breaching the organization ' s network to access research and development reports.

C.

A denial-of-service attack that prevents access to the organization ' s website.

D.

A hacker accessing the financial information of the company.

Buy Now
Questions 98

Which of the following attributes of data is the most significantly impacted by the internet of things?

Options:

A.

Normalization.

B.

Velocity.

C.

Structurization.

D.

Veracity.

Buy Now
Questions 99

Which of the following examples demonstrates that the internal audit activity uses descriptive analytics in its engagements?

Options:

A.

An internal auditor analyzed electricity production and sales interim reports and compiled a risk assessment.

B.

An internal auditor extracted sales data to a spreadsheet and applied judgmental analysis for sampling.

C.

An internal auditor classified solar panel sales by region and discovered unsuccessful sales

representatives.

D.

An internal auditor broke down a complex process into smaller pieces to make it more understandable.

Buy Now
Questions 100

Which of the following is a key responsibility of a database administrator?

Options:

A.

Troubleshoot end user problems

B.

Provide production support.

C.

Provide physical security of databases

D.

Maintain database integrity

Buy Now
Questions 101

The critical path for any project is the path that exhibits which of the following characteristics?

Options:

A.

Has the longest duration in time.

B.

Costs the most money.

C.

Requires the largest amount of labor

D.

Is deemed most important to the project.

Buy Now
Questions 102

Which of the following data analytics tools would be applied by an internal audit activity positioned at the lowest level of maturity?

Options:

A.

Workflow and data capture technology

B.

Data visualization applications.

C.

Software integrated with central data warehouse

D.

Spreadsheets.

Buy Now
Questions 103

Technological uncertainty, subsidy, and spin-offs are usually characteristics of:

Options:

A.

Fragmented industries.

B.

Declining industries.

C.

Mature industries.

D.

Emerging industries.

Buy Now
Questions 104

An organization allows employees to use mobile devices for business purposes.

Which of the following could cause decreased employee productivity in case of data loss?

Options:

A.

Malware resulting in data leakage.

B.

Exposure of sensitive data.

C.

Lack of data encryption.

D.

Lack of data back up.

Buy Now
Questions 105

Which of the following statements best describes the frameworks set forth by the International Standards Organization?

Options:

A.

Globally accepted standards for industries and processes.

B.

Bridging the gaps among control requirements, technical issues, and business risks.

C.

Practical guidance and benchmarks for all organizations that use information systems.

D.

Frameworks and guidance on enterprise risk management, internal control, and fraud deterrence.

Buy Now
Questions 106

Which of the following strategies is most appropriate for an industry that is in decline?

Options:

A.

Invest in marketing.

B.

Invest in research and development.

C.

Control costs.

D.

Shift toward mass production.

Buy Now
Questions 107

The percentage of sales method, rather than the percentage of receivables method, would be used to estimate uncollectible accounts if an organization seeks to:

Options:

A.

Use an aging schedule to more closely estimate uncollectible accounts.

B.

Eliminate the need for an allowance for doubtful accounts.

C.

Emphasize the accuracy of the net realizable value of the receivables on the balance sheet.

D.

Use a method that approximates the matching principle.

Buy Now
Questions 108

According to the Standards, the internal audit activity must evaluate risk exposures relating to which of the following when examining an organization ' s risk management process?

1) Organizational governance.

2) Organizational operations.

3) Organizational information systems.

4) Organizational structure.

Options:

A.

1 and 3 only

B.

2 and 4 only

C.

1, 2, and 3 only

D.

1, 2, and 4 only

Buy Now
Questions 109

Which of the following application-based controls is an example of a programmed edit check?

Options:

A.

Reasonableness check.

B.

Transaction log.

C.

Input error correction.

D.

Authorization for access.

Buy Now
Questions 110

Which of the following is false with regard to Internet connection firewalls?

Options:

A.

Firewalls can protect against computer viruses.

B.

Firewalls monitor attacks from the Internet.

C.

Firewalls provide network administrators tools to retaliate against hackers.

D.

Firewalls may be software-based or hardware-based.

Buy Now
Questions 111

According to IIA guidance, which of the following is a typical risk associated with the tender process and contracting stage of an organization ' s IT outsourcing life cycle?

Options:

A.

The process is not sustained and is not optimized as planned.

B.

There is a lack of alignment to organizational strategies.

C.

The operational quality is less than projected.

D.

There is increased potential for loss of assets.

Buy Now
Questions 112

During a review of a web-based application used by customers to check the status of their bank accounts, it would be most important for the internal auditor to ensure that:

Options:

A.

Access to read application logs is restricted to authorized users.

B.

Account balance information is encrypted in the database.

C.

The web server used to host the application is located in a physically secure area.

D.

Sensitive data, such as account numbers, are submitted using encrypted communications.

Buy Now
Questions 113

An internal auditor has been asked to conduct an investigation involving allegations of independent contractor fraud. Which of the following controls would be least effective in detecting any potential fraudulent activity?

Options:

A.

Exception report identifying payment anomalies.

B.

Documented policy and procedures.

C.

Periodic account reconciliation of contractor charges.

D.

Monthly management review of all contractor activity.

Buy Now
Questions 114

In an organization where enterprise risk management practices are mature, which of the following is a core internal audit role?

Options:

A.

Giving assurance that risks are evaluated correctly.

B.

Developing the risk management strategy for the board ' s approval.

C.

Facilitating the identification and evaluation of risks.

D.

Coaching management in responding to risk.

Buy Now
Questions 115

Which of the following would best prevent unauthorized external changes to an organization ' s data?

Options:

A.

Antivirus software, firewall, data encryption.

B.

Firewall, data encryption, backup procedures.

C.

Antivirus software, firewall, backup procedures.

D.

Antivirus software, data encryption, change logs.

Buy Now
Questions 116

Which of the following price adjustment strategies encourages prompt payment?

Options:

A.

Cash discounts.

B.

Quantity discounts.

C.

Functional discounts.

D.

Seasonal discounts.

Buy Now
Questions 117

The decision to implement enhanced failure detection and back-up systems to improve data integrity is an example of which risk response?

Options:

A.

Risk acceptance.

B.

Risk sharing.

C.

Risk avoidance.

D.

Risk reduction.

Buy Now
Questions 118

Which of the following conflict resolution methods should be applied when the intention of the parties is to solve the problem by clarifying differences and attaining everyone ' s objectives?

Options:

A.

Accommodating.

B.

Compromising.

C.

Collaborating.

D.

Competing.

Buy Now
Questions 119

During the last year, an organization had an opening inventory of $300,000, purchases of $980,000, sales of $1,850,000, and a gross margin of 40 percent. What is the closing inventory if the periodic inventory system is used?

Options:

A.

$170,000

B.

$280,000

C.

$300,000

D.

$540,000

Buy Now
Questions 120

Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?

Options:

A.

Both the key used to encrypt the data and the key used to decrypt the data are made public.

B.

The key used to encrypt the data is kept private but the key used to decrypt the data is made public.

C.

The key used to encrypt the data is made public but the key used to decrypt the data is kept private.

D.

Both the key used to encrypt the data and the key used to decrypt the data are made private.

Buy Now
Questions 121

When developing an effective risk-based plan to determine audit priorities, an internal audit activity should start by:

Options:

A.

Identifying risks to the organization ' s operations.

B.

Observing and analyzing controls.

C.

Prioritizing known risks.

D.

Reviewing organizational objectives.

Buy Now
Questions 122

For a multinational organization, which of the following is a disadvantage of an ethnocentric staffing policy?

1) It significantly raises compensation and staffing costs.

2) It produces resentment among the organization ' s employees in host countries.

3) It limits career mobility for parent-country nationals.

4) It can lead to cultural myopia.

Options:

A.

1 and 4 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, and 4 only

Buy Now
Questions 123

Which of the following statements regarding organizational governance is not correct?

Options:

A.

An effective internal audit function is one of the four cornerstones of good governance.

B.

Those performing governance activities are accountable to the customer.

C.

Accountability is one of the key elements of organizational governance.

D.

Governance principles and the need for an internal audit function are applicable to governmental and not-for-profit activities.

Buy Now
Questions 124

Which of the following is a characteristic of just-in-time inventory management systems?

Options:

A.

Users determine the optimal level of safety stocks.

B.

They are applicable only to large organizations.

C.

They do not really increase overall economic efficiency because they merely shift inventory levels further up the supply chain.

D.

They rely heavily on high quality materials.

Buy Now
Questions 125

Which of the following is not a method for implementing a new application system?

Options:

A.

Direct cutover.

B.

Parallel.

C.

Pilot.

D.

Test.

Buy Now
Questions 126

According to IIA guidance, which of the following corporate social responsibility (CSR) evaluation activities may be performed by the internal audit activity?

1) Consult on CSR program design and implementation.

2) Serve as an advisor on CSR governance and risk management.

3) Review third parties for contractual compliance with CSR terms.

4) Identify and mitigate risks to help meet the CSR program objectives.

Options:

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Buy Now
Questions 127

Which of the following borrowing options is an unsecured loan?

Options:

A.

Second-mortgage financing from a bank.

B.

An issue of commercial paper.

C.

Pledged accounts receivable.

D.

Asset-based financing.

Buy Now
Questions 128

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange?

Options:

A.

A time-sensitive just-in-time purchase environment.

B.

A large volume of custom purchases.

C.

A variable volume sensitive to material cost.

D.

A currently inefficient purchasing process.

Buy Now
Questions 129

Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?

Options:

A.

Intranet.

B.

Extranet.

C.

Digital subscriber line.

D.

Broadband.

Buy Now
Questions 130

During which phase of disaster recovery planning should an organization identify the business units, assets, and systems that are critical to continuing an acceptable level of operations?

Options:

A.

Scope and initiation phase.

B.

Business impact analysis.

C.

Plan development.

D.

Testing.

Buy Now
Questions 131

Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?

Options:

A.

Each party ' s negotiator presents a menu of options to the other party.

B.

Each party adopts one initial position from which to start.

C.

Each negotiator minimizes the information provided to the other party.

D.

Each negotiator starts with an offer, which is optimal from the negotiator ' s perspective.

Buy Now
Questions 132

Which of the following is a key characteristic of a zero-based budget?

Options:

A.

A zero-based budget provides estimates of costs that would be incurred under different levels of activity.

B.

A zero-based budget maintains focus on the budgeting process.

C.

A zero-based budget is prepared each year and requires each item of expenditure to be justified.

D.

A zero-based budget uses input from lower-level and middle-level managers to formulate budget plans.

Buy Now
Questions 133

Which of the following is true regarding an organization ' s relationship with external stakeholders?

Options:

A.

Specific guidance must be followed when interacting with nongovernmental organizations.

B.

Disclosure laws tend to be consistent from one jurisdiction to another.

C.

There are several internationally recognized standards for dealing with financial donors.

D.

Legal representation should be consulted before releasing internal audit information to other assurance

Buy Now
Questions 134

Which of the following statements about matrix organizations is false?

Options:

A.

In a matrix organization, conflict between functional and product managers may arise.

B.

In a matrix organization, staff under dual command is more likely to suffer stress at work.

C.

Matrix organizations offer the advantage of greater flexibility.

D.

Matrix organizations minimize costs and simplify communication.

Buy Now
Questions 135

Which stage of group development is characterized by a decrease in conflict and hostility among group members and an increase in cohesiveness?

Options:

A.

Forming stage.

B.

Norming stage.

C.

Performing stage.

D.

Storming stage.

Buy Now
Questions 136

Which of the following roles would be least appropriate for the internal audit activity to undertake with regard to an organization ' s corporate social responsibility (CSR) program?

Options:

A.

Consult on project design and implementation of the CSR program.

B.

Serve as an advisor on internal controls related to CSR.

C.

Identify and prioritize the CSR issues that are important to the organization.

D.

Evaluate the effectiveness of the organization ' s CSR efforts.

Buy Now
Questions 137

When an organization is choosing a new external auditor, which of the following is the most appropriate role for the chief audit executive to undertake?

Options:

A.

Review and acquire the external audit service.

B.

Assess the appraisal and actuarial services.

C.

Determine the selection criteria.

D.

Identify regulatory requirements to be considered.

Buy Now
Questions 138

Which of the following is not a common feature of cumulative preferred stock?

Options:

A.

Priority over common stock with regard to dilution of shares.

B.

Priority over common stock with regard to earnings.

C.

Priority over common stock with regard to dividend payment.

D.

Priority over common stock with regard to assets.

Buy Now
Questions 139

The first step in determining product price is:

Options:

A.

Determining the cost of the product.

B.

Developing pricing objectives.

C.

Evaluating prices set by the competitors.

D.

Selecting a pricing method.

Buy Now
Questions 140

Organizational activities that complement each other and create a competitive advantage are called a:

Options:

A.

Merger.

B.

Strategic fit.

C.

Joint venture.

D.

Strategic goal.

Buy Now
Questions 141

Which of the following techniques would be least effective in resolving the conflict created by an internal audit client ' s perception of the audit report as a personal attack on his management performance?

Options:

A.

The auditor should focus on the audit client as a person and understand him, rather than just

concentrating on the problem.

B.

The auditor should make recommendations based on objective criteria, rather than based on a subjective assessment.

C.

The auditor should explore alternative solutions to address the audit problem, so the audit client has options.

D.

The auditor should take a flexible position on the recommendations and focus on resolving the issue by addressing the interests of the people concerned.

Buy Now
Questions 142

A department purchased one copy of a software program for internal use. The manager of the department installed the program on an office computer and then made two complete copies of the original software.

Copy 1 was solely for backup purposes.

Copy 2 was for use by another member of the department.

In terms of software licenses and copyright law, which of the following is correct?

Options:

A.

Both copies are legal.

B.

Only copy 1 is legal.

C.

Only copy 2 is legal.

D.

Neither copy is legal.

Buy Now
Questions 143

Which of the following budgets must be prepared first?

Options:

A.

Cash budget.

B.

Production budget.

C.

Sales budget.

D.

Selling and administrative expenses budget.

Buy Now
Questions 144

Providing knowledge, motivating organizational members, controlling and coordinating individual efforts, and expressing feelings and emotions are all functions of:

Options:

A.

Motivation.

B.

Performance.

C.

Organizational structure.

D.

Communication.

Buy Now
Questions 145

An internal auditor is trying to assess control risk and the effectiveness of an organization ' s internal controls. Which of the following audit procedures would not provide assurance to the auditor on this matter?

Options:

A.

Interviewing the organization ' s employees.

B.

Observing the organization ' s operations.

C.

Reading the board ' s minutes.

D.

Inspecting manuals and documents.

Buy Now
Questions 146

Which of the following statements regarding database management systems is not correct?

Options:

A.

Database management systems handle data manipulation inside the tables, rather than it being done by the operating system itself in files.

B.

The database management system acts as a layer between the application software and the operating system.

C.

Applications pass on the instructions for data manipulation which are then executed by the database

management system.

D.

The data within the database management system can only be manipulated directly by the database management system administrator.

Buy Now
Exam Code: IIA-CIA-Part3-3P
Exam Name: CIA Exam Part Three: Business Knowledge for Internal Auditing
Last Update: May 6, 2026
Questions: 488

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now IIA-CIA-Part3-3P testing engine

PDF (Q&A)

$43.57  $124.49
buy now IIA-CIA-Part3-3P pdf