Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

IIA-CIA-Part3 Business Knowledge for Internal Auditing Questions and Answers

Questions 4

A third party who provides payroll services to the organization was asked to create audit or “read-only 1 functionalities in their systems. Which of the following statements is true regarding this request?

Options:

A.

This will support execution of the right-to-audit clause.

B.

This will enforce robust risk assessment practices

C.

This will address cybersecurity considerations and concerns.

D.

This will enhance the third party's ability to apply data analytics

Buy Now
Questions 5

Which of these instances accurately describes the responsibilities for big data governance?

Options:

A.

Management must ensure information storage systems are appropriately defined and processes to update critical data elements are clear.

B.

External auditors must ensure that analytical models are periodically monitored and maintained.

C.

The board must implement controls around data quality dimensions to ensure that they are effective.

D.

Internal auditors must ensure the quality and security of data, with a heightened focus on the riskiest data elements.

Buy Now
Questions 6

The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (lAArs) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA. Which of the following staffing approaches is the CAE most likely lo select?

Options:

A.

Assign a team with a trained audit manager to plan each audit and distribute field work tasks to various staff auditors.

B.

Assign a team of personnel who have different specialties to each audit and empower Team members to participate fully in key decisions

C.

Assign a team to each audit, designate a single person to be responsible for each phase of the audit, and limit decision making outside of their area of responsibility.

D.

Assign a team of personnel who have similar specialties to specific engagements that would benefit from those specialties and limit Key decisions to the senior person.

Buy Now
Questions 7

Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?

Options:

A.

A flat structure results in lower operating and support costs than a hierarchical structure.

B.

A flat structure results in a stable and very collaborative environment.

C.

A flat structure enables field auditors to report to and learn from senior auditors.

D.

A flat structure is more dynamic and offers more opportunities for advancement than a hierarchical structure.

Buy Now
Questions 8

An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?

Options:

A.

The organization will be unable to develop preventative actions based on analytics.

B.

The organization will not be able to trace and monitor the activities of database administers.

C.

The organization will be unable to determine why intrusions and cyber incidents took place.

D.

The organization will be unable to upgrade the system to newer versions.

Buy Now
Questions 9

An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?

Options:

A.

Horizontal analysis

B.

Vertical analysis

C.

Ratio analysis

D.

Trend analysis

Buy Now
Questions 10

According to I1A guidance on IT. which of the following activities regarding information security Is most likely to be the responsibility of line management as opposed to executive management, internal auditors, or the board?

Options:

A.

Review and monitor security controls.

B.

Dedicate sufficient security resources.

C.

Provide oversight to the security function.

D.

Assess information control environments.

Buy Now
Questions 11

An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?

Options:

A.

Infrastructure as a Service (laaS).

B.

Platform as a Service (PaaS).

C.

Enterprise as a Service (EaaS).

D.

Software as a Service (SaaS).

Buy Now
Questions 12

An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?

Options:

A.

Customers can access and update personal information when needed.

B.

The organization retains customers' personal information indefinitely.

C.

Customers reserve the right to reject sharing personal information with third parties.

D.

The organization performs regular maintenance on customers' personal information.

Buy Now
Questions 13

Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?

Options:

A.

Whether customers are asked to renew their consent for their data processing at least quarterly.

B.

Whether private data is processed in accordance with the purpose for which the consent was obtained?

C.

Whether the organization has established explicit and entitywide policies on data transfer to third parties.

D.

Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.

Buy Now
Questions 14

Which of the following is required in effective IT change management?

Options:

A.

The sole responsibility for change management is assigned to an experienced and competent IT team

B.

Change management follows a consistent process and is done in a controlled environment.

C.

Internal audit participates in the implementation of change management throughout the organisation.

D.

All changes to systems must be approved by the highest level of authority within an organization.

Buy Now
Questions 15

At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?

Options:

A.

Cost of goods sold will be understated and net income will be overstated.

B.

Cost of goods sold will be overstated and net income will be understated

C.

Cost of goods sold will be understated and there Wi-Fi be no impact on net income.

D.

There will be no impact on cost of goods sold and net income will be overstated

Buy Now
Questions 16

Focus An organization has decided to have all employees work from home. Which of the following network types would securely enable this approach?

Options:

A.

A wireless local area network (WLAN ).

B.

A personal area network (PAN).

C.

A wide area network (WAN).

D.

A virtual private network (VPN)

Buy Now
Questions 17

Which of the following performance measures includes both profits and investment base?

Options:

A.

Residual income

B.

A flexible budget

C.

Variance analysis.

D.

A contribution margin income statement by segment.

Buy Now
Questions 18

According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?

Options:

A.

A revenue calculation spreadsheet supported with price and volume reports from the production department.

B.

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions.

C.

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantities.

D.

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances

Buy Now
Questions 19

During the process of setting the annual audit plan, the chief audit executive receives a request from senior management to conduct an assurance engagement on the cybersecurity controls of the organization. Which of the following is a reason cybersecurity should be included in the annual internal audit plan?

Options:

A.

In order to maintain good relationships with senior management

B.

Cybersecurity is a new area for auditors to learn

C.

Cybersecurity has been identified as a high risk during the annual risk assessment

D.

The Global Internal Audit Standards require that all management-requested engagements be included in the annual internal audit plan

Buy Now
Questions 20

A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services. Which of the following best describes the restaurants strategy?

Options:

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Buy Now
Questions 21

To achieve conformance with the Global Internal Audit Standards, the chief audit executive must include which of the following activities in the quality assurance and improvement program (QAIP)?

Options:

A.

Require board oversight of the QAIP

B.

Assess Standards conformance for each individual assurance engagement

C.

Conduct a self-assessment at least once every five years

D.

Report the results of the QAIP to the board

Buy Now
Questions 22

Which of the following techniques would best detect an inventory fraud scheme?

Options:

A.

Analyze Invoice payments just under individual authorization limits.

B.

Analyze stratification of inventory adjustments by warehouse location.

C.

Analyze inventory invoice amounts and compare with approved contract amounts.

D.

Analyze differences discovered during duplicate payment testing

Buy Now
Questions 23

Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?

Options:

A.

Last-in-first-Out (LIFO}.

B.

Average cost.

C.

First-in-first-out (FIFO).

D.

Specific identification

Buy Now
Questions 24

An internal audit team performed an assurance engagement of the organization's IT security. The audit team found significant flaws in the design and implementation of the internal control framework. IT department managers often disagreed with the audit team on the significance of the findings, claiming that the controls in place partly mitigated the risks. Which of the following should be included when communicating the engagement results to senior management?

Options:

A.

All the correspondence exchanged between the audit team and IT department demonstrating the disagreement

B.

The audit team's findings and the IT department’s opinion

C.

Only the audit team's findings and the reasons they require immediate action from senior management

D.

Only the findings that were agreed upon between the audit team and the IT department

Buy Now
Questions 25

Which of the following would best contribute to the success of a guest auditor program that allows people from other areas of the organization to serve as subject matter experts?

Options:

A.

Selecting guest auditors whose work has recently been audited by the internal audit function

B.

Recommending the guest auditor to design the internal audit program and perform testing procedures

C.

Soliciting feedback from the guest auditor once the engagement is complete

D.

Enabling the guest auditor to interact with internal audit staff to identify mutually beneficial opportunities

Buy Now
Questions 26

The internal audit function of a manufacturing organization is conducting an advisory engagement. The engagement team identifies a gap in procedures: there is no documentation for the activities that take place when new site construction projects are completed. In practice, these activities include the transfer of assets from the development department to the production department. What is the most appropriate action for the engagement team?

Options:

A.

Circulate a risk and control questionnaire to identify construction process risks

B.

Facilitate design of a checklist that can be used during asset transfer

C.

Carry out a root cause analysis to identify the underlying reasons of the process gap

D.

Allocate additional resources to the production department to better handle the new assets

Buy Now
Questions 27

Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the

following would be a characteristic of the now highly centralized organization?

Options:

A.

Top management does little monitoring of the decisions made at lower levels.

B.

The decisions made at the lower levels of management are considered very important.

C.

Decisions made at lower levels in the organizational structure are few.

D.

Reliance is placed on top management decision making by few of the organization's departments.

Buy Now
Questions 28

An internal audit uncovered high-risk issues that needed to be addressed by the organization. During the exit conference, the audit team discussed the high-risk issues with the manager responsible for addressing them. How should the chief audit executive respond if the manager agrees to correct the issues identified during the audit?

Options:

A.

Include in the report that management has agreed to address the issue and set a date for follow-up

B.

Include an assignment in the annual internal audit plan to perform a follow-up audit

C.

Discuss the audit observation with senior management

D.

Solicit input from management and create the action plan

Buy Now
Questions 29

Which of the following is a sound network configuration practice to enhance information security?

Options:

A.

Change management practices to ensure operating system patch documentation is retained.

B.

User role requirements are documented in accordance with appropriate application-level control needs.

C.

Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.

D.

Interfaces reinforce segregation of duties between operations administration and database development.

Buy Now
Questions 30

Which of the following describes a third-party network that connects an organization specifically with its trading partners?

Options:

A.

Value-added network (VAN).

B.

Local area network (LAN).

C.

Metropolitan area network (MAN).

D.

Wide area network (WAN).

Buy Now
Questions 31

Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?

Options:

A.

IT database administrator.

B.

IT data center manager.

C.

IT help desk function.

D.

IT network administrator.

Buy Now
Questions 32

Which of the following best explains the matching principle?

Options:

A.

Revenues should be recognized when earned.

B.

Revenue recognition is matched with cash.

C.

Expense recognition is tied to revenue recognition.

D.

Expenses are recognized at each accounting period.

Buy Now
Questions 33

An internal auditor uses a risk and control questionnaire as part of the preliminary survey for an audit of the organization's anti-bribery and corruption program. What is the primary purpose of using this approach?

Options:

A.

To compare records from one source to subsequently prepared records about the anti-bribery program

B.

To ascertain the existence of certain controls in the organization's anti-bribery program

C.

To obtain testimonial information about certain controls in the organization's anti-bribery program

D.

To validate control information through outside parties independent of the anti-bribery program

Buy Now
Questions 34

Which of the following best describes the chief audit executive's responsibility for assessing the organization's residual risk?

Options:

A.

Create an action plan to mitigate the risk

B.

Incorporate management acceptance of risk in the workpapers as internal audit evidence

C.

Report deviations immediately to the board

D.

Communicate the matter with senior management

Buy Now
Questions 35

Which of the following best describes the purpose of fixed manufacturing costs?

Options:

A.

To ensure availability of production facilities.

B.

To decrease direct expenses related to production.

C.

To incur stable costs despite operating capacity.

D.

To increase the total unit cost under absorption costing

Buy Now
Questions 36

An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?

Options:

A.

Conduct an inventory of access rights of all employees who have changed their position within the last year

B.

Remove unneeded access rights for uncovered instances and reprimand system administrators for carelessness

C.

Provide system administrators with job descriptions of employees and let them determine relevant access rights

D.

Require that access rights to IT systems be ordered by process owners based on user role descriptions

Buy Now
Questions 37

The internal auditor concluded there was a high likelihood that a significant wind farm development, worth $200 million, would be delayed from its approved schedule. As a result, electricity production would not start on time, leading to considerable financial penalties. Which of the following should be added to the observation to support its clarity and completeness?

Options:

A.

The effect of the observation

B.

The criteria of the observation

C.

The condition of the observation

D.

The cause of the observation

Buy Now
Questions 38

Employees of an organization noticed that an exterior surface of the office building was deteriorating. Upon investigation, it was found that the deterioration was caused by harsh cleaning chemicals used to remove excessive bird droppings, and that the birds were drawn to the building to feed from a spider infestation. Which of the following best represents a root cause-based recommendation for this situation?

Options:

A.

Repair the surface of the building

B.

Discontinue the use of the cleaning chemicals

C.

Scare the birds away by installing scarecrows

D.

Enhance cleaning of the building to displace spiders

Buy Now
Questions 39

Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?

Options:

A.

Warm site recovery plan.

B.

Hot site recovery plan.

C.

Cool site recovery plan.

D.

Cold site recovery plan.

Buy Now
Questions 40

After identifying and reporting a control deficiency, which of the following actions should an internal auditor perform next?

Options:

A.

Ensure full documentation of the control deficiency and close out the audit file

B.

Follow up on the remediation status with business management periodically

C.

Note this control area “audited” and mark it as out-of-scope for the following year

D.

Design a remediation plan and ensure operational management follows through

Buy Now
Questions 41

Which of the following is a necessary action for an internal audit function if senior management chooses not to take action to remediate the finding and accepts the risk?

Options:

A.

The chief audit executive (CAE) must discuss this disagreement with senior management and communicate this information to external stakeholders

B.

The CAE must include this disagreement in the final audit report and conclude the engagement

C.

The CAE must make a judgment regarding the prudence of that decision and report to the board if needed

D.

The CAE must establish a follow-up process to monitor the acceptable risk level as part of the engagement

Buy Now
Questions 42

During an internal audit engagement, numerous deficiencies in the organization's management of customer data were discovered, entailing the risk of breaching personal data protection legislation. An improvement plan was approved by senior management. Which of the following conditions observed during the periodic follow-up process best justifies the chief audit executive's decision to escalate the issue to the board?

Options:

A.

The organization's customer satisfaction index does not show any signs of improvement

B.

No budget or resources have been allocated to implement corrective measures

C.

The board has not been informed about the planned improvements approved by senior management

D.

Employees responsible for improvements are resisting any additional workload

Buy Now
Questions 43

Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?

Options:

A.

Assigning new roles and responsibilities for senior IT management.

B.

Growing use of bring your own devices for organizational matters.

C.

Expansion of operations into new markets with limited IT access.

D.

Hiring new personnel within the IT department for security purposes.

Buy Now
Questions 44

Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and

telecommunications, but does not have servers or infrastructure equipment?

Options:

A.

Frozen site

B.

Cold site

C.

Warm site

D.

Hot site

Buy Now
Questions 45

Which of the following is a key performance indicator of the efficiency of the internal audit function?

Options:

A.

The number of audits completed

B.

The number of significant audit observations

C.

The percentage of recommendations implemented

D.

The number of training hours per auditor

Buy Now
Questions 46

Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?

Options:

A.

The organization sells inventory to an overseas subsidiary at fair value.

B.

The local subsidiary purchases inventory at a discounted price.

C.

The organization sells inventory to an overseas subsidiary at the original cost.

D.

The local subsidiary purchases inventory at the depreciated cost.A

Buy Now
Questions 47

Which of the following statements is true regarding user-developed applications (UDAs)?

Options:

A.

UDAs are less flexible and more difficult to configure than traditional IT applications.

B.

Updating UDAs may lead to various errors resulting from changes or corrections.

C.

UDAs typically are subjected to application development and change management controls.

D.

Using UDAs typically enhances the organization's ability to comply with regulatory factors.

Buy Now
Questions 48

An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?

Options:

A.

To inform the classification of the data population.

B.

To determine the completeness and accuracy of the data.

C.

To identify whether the population contains outliers.

D.

To determine whether duplicates in the data inflate the range.

Buy Now
Questions 49

When should the results of internal quality assessments be communicated to senior management and the board?

Options:

A.

At least once every five years

B.

At least annually

C.

Periodically, at the discretion of the chief audit executive

D.

Only after the results have been validated by an external assessment

Buy Now
Questions 50

Which of the following data privacy concerns can be attributed specifically to blockchain technologies?

Options:

A.

Cybercriminals mainly resort to blockchain technologies to phish for private data

B.

Since blockchain transactions can be easily tampered with, the risk of private data leakage is high

C.

Data privacy regulations overregulate the usage of private data in blockchain transactions

D.

Immutability of blockchain technologies makes private data erasure a challenge

Buy Now
Questions 51

Which of the following would be most likely found in an internal audit procedures manual?

Options:

A.

A summary of the strategic plan of the area under review

B.

Appropriate response options for when findings are disputed by management

C.

An explanation of the resources needed for each engagement

D.

The extent of the auditor's authority to collect data from management

Buy Now
Questions 52

Which of the following is a benefit from the concept of Internet of Things?

Options:

A.

Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.

B.

Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.

C.

Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.

D.

Data mining and data collection from internet and social networks is easier, and the results are more comprehensive

Buy Now
Questions 53

According to 11A guidance on IT, which of the following are indicators of poor change management?

1. Inadequate control design.

2. Unplanned downtime.

3. Excessive troubleshooting .

4. Unavailability of critical services.

Options:

A.

2 and 3 only.

B.

1, 2, and 3 only

C.

1, 3, and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 54

According to IIA guidance, which of the following statements is true regarding communication of engagement results?

Options:

A.

Prior to releasing engagement results to parties outside of the organization, the audit committee must assess the potential risk to the organization, consult with senior management and/or legal counsel, and control dissemination by restricting the use of the results

B.

During an advisory engagement, if a significant governance issue is identified, it must be communicated to senior management and the board

C.

The engagement supervisor is responsible for communicating the final results to the chief audit executive and other parties who can ensure that the results are given due consideration

D.

The audit committee is responsible for reviewing and approving the final engagement communication before issuance and for deciding to whom and how it will be disseminated

Buy Now
Questions 55

An internal audit engagement team found that the risk register of the project under review did not include significant risks identified by the internal audit function. The project manager explained that risk register preparations are facilitated by risk managers and that each project’s risk review follows the same set of questions. Which of the following recommendations will likely add the greatest value to the project management process of the organization?

Options:

A.

Update the risk register of the project with the newly identified risks

B.

Train senior management on risk management principles

C.

Revise the methodology of the project risk identification process

D.

Reassign the responsibility of risk register completion to risk managers

Buy Now
Questions 56

An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?

Options:

A.

Normalize the data,

B.

Obtain the data

C.

Identify the risks.Analyze the data.

Buy Now
Questions 57

Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?

Options:

A.

Anti-malware software

B.

Authentication

C.

Spyware

D.

Rooting

Buy Now
Questions 58

Which of the following represents an example of a physical security control?

Options:

A.

Access rights are allocated according to the organization’s policy

B.

There is confirmation that data output is accurate and complete

C.

Servers are located in locked rooms to which access is restricted

D.

A record is maintained to track the process from data input to storage

Buy Now
Questions 59

Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?

Options:

A.

Authorization

B.

Architecture model

C.

Firewall

D.

Virtual private network

Buy Now
Questions 60

Which of the following security controls would be appropriate to protect the exchange of information?

Options:

A.

Firewalls.

B.

Activity logs.

C.

Antivirus software.

D.

File encryption.

Buy Now
Questions 61

During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?

Options:

A.

IT application-based controls

B.

IT systems development controls

C.

Environmental controls

D.

IT governance controls

Buy Now
Questions 62

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

Options:

A.

The risk that users try to bypass controls and do not install required software updates

B.

The risk that smart devices can be lost or stolen due to their mobile nature

C.

The risk that an organization intrusively monitors personal information stored on smart devices

D.

The risk that proprietary information is not deleted from the device when an employee leaves

Buy Now
Questions 63

An organization has 1,000 units of a defective item in stock. Per unit, market price is $10; production cost is $4; and the defect selling price is $5. What is the carrying amount (inventory value) of defects at year-end?

Options:

A.

$0

B.

$4,000

C.

$5,000

D.

$10,000

Buy Now
Questions 64

Which of the following statements is true regarding the management-by-objectives (MBO) approach?

Options:

A.

Management by objectives is most helpful in organizations that have rapid changes

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks

C.

Management by objectives helps organizations to keep employees motivated

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals

Buy Now
Questions 65

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

Options:

A.

An extranet.

B.

A local area network (LAN).

C.

An intranet.

D.

The internet.

Buy Now
Questions 66

Which of the following risks is best addressed by encryption?

Options:

A.

Information integrity risk.

B.

Privacy risk.

C.

Access risk.

D.

Software risk.

Buy Now
Questions 67

Which of the following best explains why an organization would enter into a capital lease contract?

Options:

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization’s free cash flow from operations

C.

To improve the organization’s free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Buy Now
Questions 68

A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?

Options:

A.

Fixed and variable manufacturing costs are less than the special offer selling price

B.

The manufacturer can fulfill the order without expanding the capacities of the production facilities

C.

Costs related to accepting this offer can be absorbed through the sale of other products

D.

The manufacturer’s production facilities are currently operating at full capacity

Buy Now
Questions 69

IT governance begins with which of the following activities?

Options:

A.

Identification of risk-mitigating options.

B.

Definition of IT objectives.

C.

Identification of IT risk events.

D.

Definition of risk response policies.

Buy Now
Questions 70

Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?

Options:

A.

Voice recognition and token

B.

Password and fingerprint

C.

Fingerprint and voice recognition

D.

Password and token

Buy Now
Questions 71

According to IIA guidance, which of the following are typical physical and environmental IT controls?

Options:

A.

Locating servers in locked rooms with restricted admission.

B.

Applying encryption where confidentiality is a stated requirement.

C.

Allocating and controlling access rights according to the organization's stated policy.

D.

Ensuring a tightly controlled process for applying all changes and patches to software, systems, network components, and data.

Buy Now
Questions 72

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?

Options:

A.

Not installing anti-malware software.

B.

Updating operating software in a haphazard manner.

C.

Applying a weak password for access to a mobile device.

D.

Jailbreaking a locked smart device.

Buy Now
Questions 73

Given the information below, which organization is in the weakest position to pay short-term debts?

Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000

Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000

Organization C: Current assets constitute $900,000; Current liabilities are $300,000

Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000

Options:

A.

Organization A

B.

Organization B

C.

Organization C

D.

Organization D

Buy Now
Questions 74

An internal auditor was asked to review an equal equity partnership. In one sampled transaction, Partner A transferred equipment into the partnership with a self-declared value of $10,000, and Partner B contributed equipment with a self-declared value of $15,000. The capital accounts of each partner were subsequently credited with $12,500. Which of the following statements is true regarding this transaction?

Options:

A.

The capital accounts of the partners should be increased by the original cost of the contributed equipment.

B.

The capital accounts should be increased using a weighted average based on the current percentage of ownership.

C.

No action is necessary as the capital account of each partner was increased by the correct amount.

D.

The capital accounts of the partners should be increased by the fair market value of their contribution.

Buy Now
Questions 75

An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?

Options:

A.

Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters

B.

Orders, commands, and advice are sent to the subsidiaries from headquarters

C.

People of local nationality are developed for the best positions within their own country

D.

There is a significant amount of collaboration between headquarters and subsidiaries

Buy Now
Questions 76

Which of the following statements is true regarding the capital budgeting procedure known as the discounted payback period?

Options:

A.

It calculates the overall value of a project.

B.

It ignores the time value of money.

C.

It calculates the time a project takes to break even.

D.

It begins at time zero for the project.

Buy Now
Questions 77

The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?

Options:

A.

To ensure proper segregation of duties

B.

To create a master repository of user passwords

C.

To enable monitoring for systems efficiencies

D.

To enable tracking of privileges granted to users over time

Buy Now
Questions 78

Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.

Requested backup tapes were not returned from the offsite vendor in a timely manner

B.

Returned backup tapes from the offsite vendor contained empty spaces

C.

Critical systems have been backed up more frequently than required

D.

Critical system backup tapes are taken off site less frequently than required

Buy Now
Questions 79

Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?

Options:

A.

Predictive analytics

B.

Prescriptive analytics

C.

Descriptive analytics

D.

Diagnostic analytics

Buy Now
Questions 80

According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?

Options:

A.

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations

B.

Drafting a strong contract that requires regular vendor control reports and a right-to-audit clause

C.

Applying administrative privileges to ensure right-to-access controls are appropriate

D.

Creating a standing cybersecurity committee to identify and manage risks related to data security

Buy Now
Questions 81

Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?

Options:

A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Buy Now
Questions 82

Which of the following is a typical activity performed by the help desk?

Options:

A.

Monitoring the network

B.

Troubleshooting

C.

Backing up data

D.

Assigning authorizations to a user, a role, or profile

Buy Now
Questions 83

Which of the following responsibilities would ordinarily fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support

B.

Management of infrastructure services, including network management

C.

Physical hosting of mainframes and distributed servers

D.

End-to-end security architecture design

Buy Now
Questions 84

Which of the following statements is true regarding cost-volume-profit analysis?

Options:

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted

B.

Breakeven is the amount of units sold to cover variable costs

C.

Breakeven occurs when the contribution margin covers fixed costs

D.

Following breakeven, net operating income will increase by the excess of fixed costs less the variable costs per unit sold

Buy Now
Questions 85

Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?

Options:

A.

Risk tolerance.

B.

Performance.

C.

Threats and opportunities.

D.

Governance.

Buy Now
Questions 86

An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recovery solution?

Options:

A.

Data is synchronized in real time.

B.

Recovery time is expected to be less than one week.

C.

Servers are not available and need to be procured.

D.

Recovery resources and data restore processes have been defined.

Buy Now
Questions 87

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange (EDI)?

Options:

A.

A just-in-time purchasing environment

B.

A large volume of custom purchases

C.

A variable volume sensitive to material cost

D.

A currently inefficient purchasing process

Buy Now
Questions 88

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

Favorable labor efficiency variance

Adverse labor rate variance

Adverse labor efficiency variance

Favorable labor rate variance

Options:

A.

1 and 2.

B.

1 and 4.

C.

3 and 4.

D.

2 and 3.

Buy Now
Questions 89

Which of the following statements is true regarding data backup?

Options:

A.

System backups should always be performed in real-time.

B.

Backups should be stored in a secured location onsite for easy access.

C.

The tape rotation schedule affects how long data is retained.

D.

Backup media should be restored only in case of a hardware or software failure.

Buy Now
Questions 90

Which of the following statements is most accurate concerning the management and audit of a web server?

Options:

A.

The file transfer protocol (FTP) should always be enabled

B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts

C.

The number of ports and protocols allowed to access the web server should be maximized

D.

Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP

Buy Now
Questions 91

A newly appointed chief audit executive (CAE) reviews current reporting practices. The CAE notices that exit meetings tend to be unproductive. When internal auditors present summaries of observations, engagement clients consistently complain that they do not understand where the observations come from. Which of the following could improve this situation?

Options:

A.

Send summaries of observations in advance of exit meetings and ask engagement clients to review them ahead of time

B.

Establish the purpose of exit meetings as for presentation of observations only and request that all disagreements are submitted in writing afterwards

C.

Read the entire draft internal audit report together with the clients at the exit meeting to eliminate any disputes

D.

Discontinue exit meetings, as they have proved to be ineffective and unproductive

Buy Now
Questions 92

When using data analytics during a review of the procurement process, what is the first step in the analysis process?

Options:

A.

Identify data anomalies and outliers

B.

Define questions to be answered

C.

Identify data sources available

D.

Determine the scope of the data extract

Buy Now
Questions 93

Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?

Options:

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room

B.

Review the password length, frequency of change, and list of users for the workstation’s login process

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity

Buy Now
Questions 94

According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?

Options:

A.

Hot recovery plan

B.

Warm recovery plan

C.

Cold plan

D.

Absence of recovery plan

Buy Now
Questions 95

Which of the following is used during all three stages of project management?

Options:

A.

Earned Value Management (EVM).

B.

Organizational procedures.

C.

Performance measurement.

D.

Project Management Information System (PMIS).

Buy Now
Questions 96

An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?

Options:

A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.

B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process.

C.

Institute detection and authentication controls for all devices used for network connectivity and data storage.

D.

Use management software scan and then prompt parch reminders when devices connect to the network

Buy Now
Questions 97

Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?

Options:

A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Buy Now
Questions 98

Which of the following statements is true regarding cost-volume-profit analysis?

Options:

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.

B.

Breakeven point is the amount of units sold to cover variable costs.

C.

Breakeven occurs when the contribution margin covers fixed costs.

D.

Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.

Buy Now
Questions 99

How do data analysis technologies affect internal audit testing?

Options:

A.

They improve the effectiveness of spot check testing techniques.

B.

They allow greater insight into high risk areas.

C.

They reduce the overall scope of the audit engagement,

D.

They increase the internal auditor's objectivity.

Buy Now
Questions 100

According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?

Options:

A.

Esteem by colleagues.

B.

Self-fulfillment

C.

Series of belonging in the organization

D.

Job security

Buy Now
Questions 101

According to IIA guidance, which of the following statements is true regarding analytical procedures?

Options:

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences, but cannot be used to identify the absence of differences

Buy Now
Questions 102

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?

Options:

A.

Not installing anti-malware software

B.

Updating operating software in a haphazard manner,

C.

Applying a weak password for access to a mobile device.

D.

JoIIbreaking a locked smart device

Buy Now
Questions 103

An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.

Which of the following terms would the investor most likely label this investment in her portfolio?

Options:

A.

A star

B.

A cash cow

C.

A question mark

D.

A dog

Buy Now
Questions 104

An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?

Options:

A.

$0

B.

$4,000

C.

$5,000

D.

$10,000

Buy Now
Questions 105

A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?

Options:

A.

Cost of sales and net income are understated.

B.

Cost of sales and net income are overstated.

C.

Cost of sales is understated and not income is overstated.

D.

Cost of sales is overstated and net Income is understated.

Buy Now
Questions 106

Which of the following is the best example of IT governance controls?

Options:

A.

Controls that focus on segregation of duties, financial, and change management,

B.

Personnel policies that define and enforce conditions for staff in sensitive IT areas.

C.

Standards that support IT policies by more specifically defining required actions

D.

Controls that focus on data structures and the minimum level of documentation required

Buy Now
Questions 107

Which of the following statements. Is most accurate concerning the management and audit of a web server?

Options:

A.

The file transfer protocol (FTP) should always be enabled.

B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.

C.

The number of ports and protocols allowed to access the web server should be maximized.

D.

Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.

Buy Now
Questions 108

Which of the following IT-related activities is most commonly performed by the second line of defense?

Options:

A.

Block unauthorized traffic.

B.

Encrypt data.

C.

Review disaster recovery test results.

D.

Provide independent assessment of IT security.

Buy Now
Questions 109

According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

Options:

A.

The business continuity management charter.

B.

The business continuity risk assessment plan.

C.

The business Impact analysis plan

D.

The business case for business continuity planning

Buy Now
Questions 110

Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?

Options:

A.

Authorization

B.

Architecture model

C.

Firewall

D.

Virtual private network

Buy Now
Questions 111

Which of the following would most likely be found in an organization that uses a decentralized organizational structure?

Options:

A.

There is a higher reliance on organizational culture.

B.

There are clear expectations set for employees.

C.

There are electronic monitoring techniques employed

D.

There is a defined code far employee behavior.

Buy Now
Questions 112

An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety

IIA-CIA-Part3 Question 112

The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

Options:

A.

Average cost method

B.

First-in, first-out (FIFO) method

C.

Specific identification method

D.

Activity-based costing method

Buy Now
Questions 113

Which of the following is an example of a physical control?

Options:

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization's critical data

Buy Now
Questions 114

An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?

Options:

A.

It is particularly helpful to management when the organization is facing rapid change.

B.

It is a more successful approach when adopted by mechanistic organizations.

C.

It is mere successful when goal setting is performed not only by management, but by all team members, including lower-level staff.

D.

It is particularly successful in environments that are prone to having poor employer-employee relations.

Buy Now
Questions 115

A one-time password would most likely be generated in which of the following situations?

Options:

A.

When an employee accesses an online digital certificate

B.

When an employee's biometrics have been accepted.

C.

When an employee creates a unique digital signature,

D.

When an employee uses a key fob to produce a token.

Buy Now
Questions 116

The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

1. Favorable labor efficiency variance.

2. Adverse labor rate variance.

3. Adverse labor efficiency variance.

4. Favorable labor rate variance.

Options:

A.

1 and 2

B.

1 and 4

C.

3 and A

D.

2 and 3

Buy Now
Questions 117

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

Options:

A.

An extranet

B.

A local area network

C.

An Intranet

D.

The internet

Buy Now
Questions 118

Which of the following physical access control is most likely to be based on ’’something you have" concept?

Options:

A.

A retina characteristics reader

B.

A P3M code reader

C.

A card-key scanner

D.

A fingerprint scanner

Buy Now
Questions 119

Which of the following responsibilities would ordinary fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support.

B.

Management of infrastructure services, including network management.

C.

Physical hosting of mainframes and distributed servers

D.

End-to -end security architecture design.

Buy Now
Questions 120

Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?

Options:

A.

At the value agreed upon by the partners.

B.

At book value.

C.

At fair value

D.

At the original cost.

Buy Now
Questions 121

Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?

Options:

A.

Verify completeness and accuracy.

B.

Verify existence and accuracy.

C.

Verify completeness and integrity.

D.

Verify existence and completeness.

Buy Now
Questions 122

Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?

Options:

A.

Risk tolerance

B.

Performance

C.

Threats and opportunities

D.

Governance

Buy Now
Questions 123

During which phase of the contracting process ere contracts drafted for a proposed business activity?

Options:

A.

Initiation phase.

B.

Bidding phase

C.

Development phase

D.

Management phase

Buy Now
Questions 124

Which of the following should be included in a data privacy poky?

1. Stipulations for deleting certain data after a specified period of time.

2. Guidance on acceptable methods for collecting personal data.

3. A requirement to retain personal data indefinitely to ensure a complete audit trail,

4. A description of what constitutes appropriate use of personal data.

Options:

A.

1 and 2 only

B.

2 and 3 only

C.

1, 2 and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 125

Which of the following is a likely result of outsourcing?

Options:

A.

Increased dependence on suppliers.

B.

Increased importance of market strategy.

C.

Decreased sensitivity to government regulation

D.

Decreased focus on costs

Buy Now
Questions 126

Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?

Options:

A.

Predictive analytics.

B.

Prescriptive analytics.

C.

Descriptive analytics.

D.

Diagnostic analytics.

Buy Now
Questions 127

Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?

Options:

A.

Anti-malware software

B.

Authentication

C.

Spyware

D.

Rooting

Buy Now
Questions 128

Which of the following best explains why an organization would enter into a capital lease contract?

Options:

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization's free cash flow from operations

C.

To Improve the organization's free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Buy Now
Questions 129

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

Options:

A.

Session hijacking.

B.

Jailbreaking

C.

Eavesdropping,

D.

Authentication.

Buy Now
Questions 130

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:

A.

Direct, product costs.

B.

Indirect product costs.

C.

Direct period costs,

D.

Indirect period costs

Buy Now
Questions 131

An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?

Options:

A.

The auditor is normalizing data in preparation for analyzing it.

B.

The auditor is analyzing the data in preparation for communicating the results,

C.

The auditor is cleaning the data in preparation for determining which processes may be involves .

D.

The auditor is reviewing trio data prior to defining the question

Buy Now
Questions 132

An organization's account for office supplies on hand had a balance of $9,000 at the end of year one. During year two. The organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11 ,500 in office supplies on hand. Based on this Information, what would he recorded in the adjusting entry an the end of year two?

Options:

A.

A debit to office supplies on hand for S2.500

B.

A debit to office supplies on hand for $11.500

C.

A debit to office supplies on hand for $20,500

D.

A debit to office supplies on hand for $42,500

Buy Now
Questions 133

Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?

Options:

A.

Nondisclosure agreements between the firm and its employees.

B.

Logs of user activity within the information system.

C.

Two-factor authentication for access into the information system.

D.

limited access so information, based on employee duties

Buy Now
Questions 134

An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?

Options:

A.

Data is synchronized in real time

B.

Recovery time is expected to be less than one week

C.

Servers are not available and need to be procured

D.

Recovery resources end data restore processes have not been defined.

Buy Now
Questions 135

Which of the following is an indicator of liquidity that is more dependable than working capital?

Options:

A.

Acid-test (quick) ratio

B.

Average collection period

C.

Current ratio.

D.

Inventory turnover.

Buy Now
Questions 136

Which of the following security controls would be me most effective in preventing security breaches?

Options:

A.

Approval of identity request

B.

Access logging.

C.

Monitoring privileged accounts

D.

Audit of access rights

Buy Now
Questions 137

Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?

Options:

A.

Articulation of the data

B.

Availability of the data.

C.

Measurability of the data

D.

Relevance of the data.

Buy Now
Questions 138

The chief audit executive (CAE) has been asked to evaluate the chief technology officer's proposal to outsource several key functions in the organization's IT department. Which of the following would be the most appropriate action for the CAE to determine whether the proposal aligns with the organization's strategy?

Options:

A.

Understand strategic context and evaluate whether supporting information is reliable and complete.

B.

Ascertain whether governance and approval processes are transparent, documented, and completed.

C.

Perform a due diligence review or asses management's review of provider operations.

D.

Identify key performance measures and data sources.

Buy Now
Questions 139

According to IIA guidance on IT, which of the following best describes a logical access control?

Options:

A.

Require complex passwords to be established and changed quarterly

B.

Require swipe cards to control entry into secure data centers.

C.

Monitor access to the data center with closed circuit camera surveillance.

D.

Maintain current role definitions to ensure appropriate segregation of duties

Buy Now
Questions 140

Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?

Options:

A.

Perform gap testing.

B.

Join different data sources.

C.

Perform duplicate testing.

D.

Calculate statistical parameters.

Buy Now
Questions 141

Which of the following can be viewed as a potential benefit of an enterprisewide resource planning system?

Options:

A.

Real-time processing of transactions and elimination of data redundancies.

B.

Fewer data processing errors and more efficient data exchange with trading partners.

C.

Exploitation of opportunities and mitigation of risks associated with e-business.

D.

Integration of business processes into multiple operating environments and databases.

Buy Now
Questions 142

Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?

Options:

A.

Cash payback technique

B.

Annual rate of return technique.

C.

Internal rate of return method.

D.

Net present value method.

Buy Now
Questions 143

According to IIA guidance, which of the following statements is true regarding penetration testing?

Options:

A.

Testing should not be announced to anyone within the organization to solicit a real-life response.

B.

Testing should take place during heavy operational time periods to test system resilience.

C.

Testing should be wide in scope and primarily address detective management controls for identifying potential attacks.

D.

Testing should address the preventive controls and management's response.

Buy Now
Questions 144

Which of the following would be the strongest control to prevent unauthorized wireless network access?

Options:

A.

Allowing access to the organization's network only through a virtual private network.

B.

Logging devices that access the network, including the date. time, and identity of the user.

C.

Tracking all mobile device physical locations and banning access from non-designated areas.

D.

Permitting only authorized IT personnel to have administrative control of mobile devices.

Buy Now
Questions 145

An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?

Options:

A.

Cost of sales increased relative to sales.

B.

Total sales increased relative to expenses.

C.

The organization had a higher dividend payout rate in year two.

D.

The government increased the corporate tax rate

Buy Now
Questions 146

Which of the following is considered a physical security control?

Options:

A.

Transaction logs are maintained to capture a history of system processing.

B.

System security settings require the use of strong passwords and access controls.

C.

Failed system login attempts are recorded and analyzed to identify potential security incidents.

D.

System servers are secured by locking mechanisms with access granted to specific individuals.

Buy Now
Questions 147

How can the concept of relevant cost help management with behavioral analyses?

Options:

A.

It explains the assumption mat both costs and revenues are linear through the relevant range

B.

It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.

C.

It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions

D.

It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action

Buy Now
Questions 148

An organization produces products X and Y. The materials used for the production of both products are limited to 500 Kilograms

IIA-CIA-Part3 Question 148

(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows in order to maximize profit, how much of product Y should the organization produce each month?

$10 $13

2 kg

70 units

6 kg

120 units

Options:

A.

50 units

B.

60 units

C.

70 units

D.

1:20 units

Buy Now
Questions 149

Which of the following statements is true regarding a project life cycle?

Options:

A.

Risk and uncertainty increase over the life of the project.

B.

Costs and staffing levels are typically high as the project draws to a close.

C.

Costs related to making changes increase as the project approaches completion.

D.

The project life cycle corresponds with the life cycle of the product produced by or modified by the project.

Buy Now
Questions 150

An organization contracted a third-party service provider to plan, design, and build a new facility. Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?

Options:

A.

Cost-plus contract.

B.

Turnkey contract.

C.

Service contract.

D.

Solutions contract.

Buy Now
Questions 151

Which of the following best describes the type of control provided by a firewall?

Options:

A.

Corrective

B.

Detective

C.

Preventive

D.

Discretionary

Buy Now
Questions 152

Which of the following statements is true regarding activity-based costing (ABC)?

Options:

A.

An ABC costing system is similar to conventional costing systems in how it treats the allocation of manufacturing overhead.

B.

An ABC costing system uses a single unit-level basis to allocate overhead costs to products.

C.

An ABC costing system may be used with either a job order or a process cost accounting system.

D.

The primary disadvantage of an ABC costing system is less accurate product costing.

Buy Now
Questions 153

In accounting, which of the following statements is true regarding the terms debit and credit?

Options:

A.

Debit indicates the right side of an account and credit the left side

B.

Debit means an increase in an account and credit means a decrease.

C.

Credit indicates the right side of an account and debit the left side.

D.

Credit means an increase in an account and debit means a decrease

Buy Now
Questions 154

Which of the following items best describes the strategy of outsourcing?

Options:

A.

Contracting the work to Foreign Service providers to obtain lower costs

B.

Contracting functions or knowledge-related work with an external service provider.

C.

Contract -ng operation of some business functions with an internal service provider

D.

Contracting a specific external service provider to work with an internal service provider

Buy Now
Exam Code: IIA-CIA-Part3
Exam Name: Business Knowledge for Internal Auditing
Last Update: Sep 16, 2025
Questions: 516

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now IIA-CIA-Part3 testing engine

PDF (Q&A)

$49.8  $124.49
buy now IIA-CIA-Part3 pdf