Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Which of the following statements. Is most accurate concerning the management and audit of a web server?
Which of the following IT-related activities is most commonly performed by the second line of defense?
Which of the following scenarios indicates an effective use of financial leverage?
Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.
Which of the following is the most likely control weakness demonstrated by the seller?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?
Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
Which of the following is classified as a product cost using the variable costing method?
1. Direct labor costs.
2. Insurance on a factory.
3. Manufacturing supplies.
4. Packaging and shipping costa.
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety
The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
A one-time password would most likely be generated in which of the following situations?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
Which of the following business practices promotes a culture of high performance?
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
An organization suffered significant damage to its local: file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor. Which of the following approaches has been used by the organization?
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
An internal audit activity is piloting a data analytics model, which aims to identify anomalies in payments to vendors and potential fraud indicators. Which of the following would be the most appropriate criteria for assessing the success of the piloted model?
Which of the following best describes a potential benefit of using data analyses?
According to IIA guidance, which of the following is an IT project success factor?
An organization contracted a third-party service provider to plan, design, and build a new facility. Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?
The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?
While conducting' audit procedures at the organization's data center an internal auditor noticed the following:
- Backup media was located on data center shelves.
- Backup media was organized by date.
- Backup schedule was one week in duration.
The system administrator was able to present restore logs.
Which of the following is reasonable for the internal auditor to conclude?
Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?
An organization's board of directors is particularly focused on positioning, the organization as a leader in the industry and beating the competition. Which of the following strategies offers the greatest alignment with the board's focus?
A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software that will remotely wipe data in case of theft or other incidents. Which of the following should the organization ensure in exchange for the employees' consent?
According to The IIA's Three Lines Model, which of the following IT security activities is commonly shared by all three lines?
During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
A organization finalized a contract in which a vendor is expected to design, procure, and construct a power substation for $3,000,000. In this scenario, the organization agreed to which of the following types of contracts?
Which of the following is an example of a physical control designed to prevent security breaches?
Which of the following physical security controls is able to serve as both a detective and preventive control?
An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?
Which of the following statements Is true regarding the use of centralized authority to govern an organization?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
The management of working capital is most crucial for which of the following aspects of business?
Which of the following Issues would be a major concern for internal auditors when using a free software to analyze a third-party vendor's big data?
When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?
According to I1A guidance on IT. which of the following activities regarding information security Is most likely to be the responsibility of line management as opposed to executive management, internal auditors, or the board?
Which of the following sites would an Internet service provider most likely use to restore operations after its servers were damaged by a natural disaster?
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
Which of the following statements distinguishes a router from a typical switch?
An internal auditor discusses user-defined default passwords with the database administrator. Such passwords will be reset as soon as the user logs in for the first time, but the initial value of the password is set as "123456." Which of the following are the auditor and the database administrator most likely discussing in this situation?
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?
The chief audit executive (CAE) has been asked to evaluate the chief technology officer's proposal to outsource several key functions in the organization's IT department. Which of the following would be the most appropriate action for the CAE to determine whether the proposal aligns with the organization's strategy?
Which of the following physical access controls often functions as both a preventive and detective control?
In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?
A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?
An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?
Which of the following best describes the chief audit executive's responsibility for assessing the organization's residual risk?
A chief audit executive (CAE) joined an organization in the middle of the financial year. A risk-based annual audit plan has been approved by the board and is already underway. However, after discussions with key stakeholders, the CAE realizes that some significant key risk areas have not been covered in the original audit plan. How should the CAE respond?
Which of the following should the chief audit executive agree upon with the board before starting an external assessment of the internal audit function?
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?
An internal auditor was asked to review an equal equity partnership. In one sampled transaction, Partner A transferred equipment into the partnership with a self-declared value of $10,000, and Partner B contributed equipment with a self-declared value of $15,000. The capital accounts of each partner were subsequently credited with $12,500. Which of the following statements is true regarding this transaction?
Which of the following principles is shared by both hierarchical and open organizational structures?
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A supervisor's span of control should not exceed seven subordinates.
Responsibility should be accompanied by adequate authority.
Employees at all levels should be empowered to make decisions.
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?
Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?
Which of the following physical access controls is most likely to be based on the "something you have" concept?
Which of the following differentiates a physical access control from a logical access control?
According to IIA guidance, which of the following are typical physical and environmental IT controls?
According to Maslow’s hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
Which of the following security controls would be appropriate to protect the exchange of information?
According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?
During which phase of the contracting process are contracts drafted for a proposed business activity?
Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?
Which of the following responsibilities would ordinarily fall under the help desk function of an organization?
An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Which of the following application controls is the most dependent on the password owner?
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
Which of the following statements is true regarding the management-by-objectives (MBO) approach?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?
An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?
Which of the following situations best applies to an organization that uses a project, rather than a process, to accomplish its business activities?
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
Which of the following best explains why an organization would enter into a capital lease contract?
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
To achieve conformance with the Global Internal Audit Standards, the chief audit executive must include which of the following activities in the quality assurance and improvement program (QAIP)?
Which of the following is most appropriate for the chief audit executive to keep in mind when establishing policies and procedures to guide the internal audit function?
Under which of the following circumstances can the internal audit function rely most confidently on the work performed by external auditors?
During an internal audit engagement, numerous deficiencies in the organization's management of customer data were discovered, entailing the risk of breaching personal data protection legislation. An improvement plan was approved by senior management. Which of the following conditions observed during the periodic follow-up process best justifies the chief audit executive's decision to escalate the issue to the board?
Which of the following is an effective preventive control for data center security?
Which of the following is a characteristic of using a hierarchical control structure?
In a final audit report, internal auditors drafted the following management action plan with a due date of the last day of the calendar year:
"Plan: A bank reconciliation template has been updated to address issues with formulas incorrectly calculating variances."
Which critical element of the action plan is missing?
An organization that relies heavily on IT wants to contain the impact of potential business disruption to a period of approximately four to seven days. Which of the following
business recovery strategies would most efficiently meet this organization's needs?
A new chief audit executive (CAE) reviews long overdue audit recommendations, which have been repeatedly reported to senior management but have not been implemented, and is unsure which issues should be escalated to the board. Which of the following would serve as the best guide in this scenario?
When auditing the account receivables for the first time, an internal auditor noted that the finance team had not—over many accounting periods—reviewed the accounts receivables for debts that could no longer be collected. How should the auditor proceed?
An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?
An internal audit team performed an assurance engagement of the organization's IT security. The audit team found significant flaws in the design and implementation of the internal control framework. IT department managers often disagreed with the audit team on the significance of the findings, claiming that the controls in place partly mitigated the risks. Which of the following should be included when communicating the engagement results to senior management?
Which of the following would most likely serve as a foundation for individual operational goats?
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Which observations should the chief audit executive include in the executive summary of the final engagement communication?
The internal audit function for a large organization has commenced this year’s scheduled accounts payable audit. The annual external audit for the organization is currently being planned. Can the external auditors place reliance on the work performed by the internal audit function?
Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?
How should internal auditors respond when the manager of an area under review disagrees with a finding?
Upon completing a follow-up audit engagement, the chief audit executive (CAE) noted that management has not implemented any mitigation measures to address the high risks that were reported in the initial audit report. What initial step must the CAE take to address this situation?
When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?
When determining the level of physical controls required for a workstation, which of the following factors should be considered?
A company records income from an investment in common stock when it does which of the following?
An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?
Employees of an organization noticed that an exterior surface of the office building was deteriorating. Upon investigation, it was found that the deterioration was caused by harsh cleaning chemicals used to remove excessive bird droppings, and that the birds were drawn to the building to feed from a spider infestation. Which of the following best represents a root cause-based recommendation for this situation?
Which statement is true regarding the development of a risk-based internal audit plan?
Which of the following storage options would give the organization the best chance of recovering data?
Which of the following capital budgeting techniques considers the tune value of money?
An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?
During the second half of the audit year, the chief audit executive (CAE) identified significant negative variances to the approved audit budget required to complete the internal audit plan. Which of the following actions should the CAE take?
An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data.
What would be the most appropriate directive control in this area?
Which of the following functions of a quality assurance and improvement program (QAIP) must be performed by personnel independent of the internal audit function?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
CIA | IIA-CIA-Part3 Questions Answers | IIA-CIA-Part3 Test Prep | Business Knowledge for Internal Auditing Questions PDF | IIA-CIA-Part3 Online Exam | IIA-CIA-Part3 Practice Test | IIA-CIA-Part3 PDF | IIA-CIA-Part3 Test Questions | IIA-CIA-Part3 Study Material | IIA-CIA-Part3 Exam Preparation | IIA-CIA-Part3 Valid Dumps | IIA-CIA-Part3 Real Questions | CIA IIA-CIA-Part3 Exam Questions