Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > IIA > CIA > IIA-CIA-Part3

IIA-CIA-Part3 Business Knowledge for Internal Auditing Question and Answers

Question # 4

An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?

A.

Lower costs.

B.

Slower decision making at the senior executive level.

C.

Limited creative freedom in lower-level managers.

D.

Senior-level executives more focused on short-term, routine decision making

Full Access
Question # 5

While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?

A.

Review the call center script used by customer service agents to interact with callers, and update the script if necessary.

B.

Be-emphasize the importance of call center employees completing a certain number of calls per hour.

C.

Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.

D.

Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily

Full Access
Question # 6

Which of the following characteristics applies to an organization that adopts a flat structure?

A.

The structure is dispersed geographically

B.

The hierarchy levels are more numerous.

C.

The span of control is wide

D.

The tower-level managers are encouraged to exercise creativity when solving problems

Full Access
Question # 7

Which of the following performance measures includes both profits and investment base?

A.

Residual income

B.

A flexible budget

C.

Variance analysis.

D.

A contribution margin income statement by segment.

Full Access
Question # 8

Which of the following can be viewed as a potential benefit of an enterprisewide resource planning system?

A.

Real-time processing of transactions and elimination of data redundancies.

B.

Fewer data processing errors and more efficient data exchange with trading partners.

C.

Exploitation of opportunities and mitigation of risks associated with e-business.

D.

Integration of business processes into multiple operating environments and databases.

Full Access
Question # 9

Which of the following techniques would best detect on inventory fraud scheme?

A.

Analyze invoice payments just under individual authorization limits.

B.

Analyze stratification of inventory adjustments by warehouse location.

C.

Analyze Inventory Invoice amounts and compare with approved contract amounts.

D.

Analyze differences discovered curing duplicate payment testing.

Full Access
Question # 10

According to IIA guidance, which of the following statements is true regarding analytical procedures?

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences, but cannot be used to identify the absence of differences

Full Access
Question # 11

Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?

A.

Greater cost-effectiveness

B.

Increased economies of scale

C.

Larger talent pool

D.

Strong internal controls

Full Access
Question # 12

Focus An organization has decided to have all employees work from home. Which of the following network types would securely enable this approach?

A.

A wireless local area network (WLAN ).

B.

A personal area network (PAN).

C.

A wide area network (WAN).

D.

A virtual private network (VPN)

Full Access
Question # 13

Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?

A.

Nondisclosure agreements between the firm and its employees.

B.

Logs of user activity within the information system.

C.

Two-factor authentication for access into the information system.

D.

limited access so information, based on employee duties

Full Access
Question # 14

Which of the following data security policies is most likely to be the result of a data privacy law?

A.

Access to personally identifiable information is limited to those who need It to perform their job.

B.

Confidential data must be backed up and recoverable within a 24-hour period.

C.

Updates to systems containing sensitive data must be approved before being moved to production.

D.

A record of employees with access to insider information must be maintained, and those employees may not trade company stock during blackout periods

Full Access
Question # 15

The budgeted cost of work performed is a metric best used to measure which project management activity?

A.

Resource planning.

B.

Cost estimating

C.

Cost budgeting.

D.

Cost control.

Full Access
Question # 16

Which of the following is an established systems development methodology?

A.

Waterfall.

B.

Projects in Controlled Environments (PRINCE2).

C.

Information Technology Infrastructure Library (ITIL).

D.

COBIT

Full Access
Question # 17

A third party who provides payroll services to the organization was asked to create audit or “read-only 1 functionalities in their systems. Which of the following statements is true regarding this request?

A.

This will support execution of the right-to-audit clause.

B.

This will enforce robust risk assessment practices

C.

This will address cybersecurity considerations and concerns.

D.

This will enhance the third party's ability to apply data analytics

Full Access
Question # 18

Which of the following statements is true regarding a project life cycle?

A.

Risk and uncertainty increase over the life of the project.

B.

Costs and staffing levels are typically high as the project draws to a close.

C.

Costs related to making changes increase as the project approaches completion.

D.

The project life cycle corresponds with the life cycle of the product produced by or modified by the project.

Full Access
Question # 19

A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?

A.

Less than 12 percent.

B.

12 percent.

C.

Between 12.01 percent and 12.50 percent.

D.

More than 12 50 percent.

Full Access
Question # 20

Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?

A.

Train all employees on bring-your-own-device (BYOD) policies.

B.

Understand what procedures are in place for locking lost devices

C.

Obtain a list of all smart devices in use

D.

Test encryption of all smart devices

Full Access
Question # 21

An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?

A.

$0

B.

$4,000

C.

$5,000

D.

$10,000

Full Access
Question # 22

The chief audit executive (CAE) has been asked to evaluate the chief technology officer's proposal to outsource several key functions in the organization's IT department. Which of the following would be the most appropriate action for the CAE to determine whether the proposal aligns with the organization's strategy?

A.

Understand strategic context and evaluate whether supporting information is reliable and complete.

B.

Ascertain whether governance and approval processes are transparent, documented, and completed.

C.

Perform a due diligence review or asses management's review of provider operations.

D.

Identify key performance measures and data sources.

Full Access
Question # 23

An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?

A.

The organizational chart shows only formal relationships.

B.

The organizational chart shows only the line of authority.

C.

The organizational chart shows only the senior management positions.

D.

The organizational chart is irrelevant when testing the control environment.

Full Access
Question # 24

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?

A.

Firewall.

B.

Encryption.

C.

Antivirus.

D.

Biometrics.

Full Access
Question # 25

Which of the following statements is true regarding activity-based costing (ABC)?

A.

An ABC costing system is similar to conventional costing systems in how it treats the allocation of manufacturing overhead.

B.

An ABC costing system uses a single unit-level basis to allocate overhead costs to products.

C.

An ABC costing system may be used with either a job order or a process cost accounting system.

D.

The primary disadvantage of an ABC costing system is less accurate product costing.

Full Access
Question # 26

Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?

A.

Measure product performance against an established standard.

B.

Develop standard methods for performing established activities.

C.

Require the grouping of activities under a single manager.

D.

Assign each employee a reasonable workload.

Full Access
Question # 27

Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

A.

High-yield bonds

B.

Commodity-backed bonds

C.

Zero coupon bonds

D.

Junk bonds

Full Access
Question # 28

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

A.

Rooting.

B.

Eavesdropping.

C.

Man in the middle.

D.

Session hijacking.

Full Access
Question # 29

During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?

A.

The maximum tolerable downtime after the occurrence of an incident.

B.

The maximum tolerable data loss after the occurrence of an incident.

C.

The maximum tolerable risk related to the occurrence of an incident

D.

The minimum recovery resources needed after the occurrence of an incident

Full Access
Question # 30

Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?

A.

A warm recovery plan.

B.

A cold recovery plan.

C.

A hot recovery plan.

D.

A manual work processes plan

Full Access
Question # 31

Which of the following application controls is the most dependent on the password owner?

A.

Password selection

B.

Password aging

C.

Password lockout

D.

Password rotation

Full Access
Question # 32

Which of the following best describes the type of control provided by a firewall?

A.

Corrective

B.

Detective

C.

Preventive

D.

Discretionary

Full Access
Question # 33

A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?

A.

Fixed maintenance costs.

B.

Variable maintenance costs.

C.

Mixed maintenance costs.

D.

Indirect maintenance costs.

Full Access
Question # 34

During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?

A.

Intrinsic reward.

B.

Job enrichment

C.

Extrinsic reward.

D.

The hierarchy of needs.

Full Access
Question # 35

A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?

A.

Compare to the annual cost of capital

B.

Compare to the annual interest data.

C.

Compare to the required rate of return.

D.

Compare to the net present value.

Full Access
Question # 36

When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?

A.

Identification of achievable goals and timelines

B.

Analysis of the competitive environment.

C.

Plan for the procurement of resources

D.

Plan for progress reporting and oversight.

Full Access
Question # 37

According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?

A.

HTTP sites provide sufficient security to protect customers' credit card information.

B.

Web servers store credit cardholders' information submitted for payment.

C.

Database servers send cardholders’ information for authorization in clear text.

D.

Payment gatewaysauthorizecredit cardonlinepayments.

Full Access
Question # 38

An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?

A.

Customers can access and update personal information when needed.

B.

The organization retains customers' personal information indefinitely.

C.

Customers reserve the right to reject sharing personal information with third parties.

D.

The organization performs regular maintenance on customers' personal information.

Full Access
Question # 39

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

A.

Direct, product costs.

B.

Indirect product costs.

C.

Direct period costs,

D.

Indirect period costs

Full Access
Question # 40

Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the

following would be a characteristic of the now highly centralized organization?

A.

Top management does little monitoring of the decisions made at lower levels.

B.

The decisions made at the lower levels of management are considered very important.

C.

Decisions made at lower levels in the organizational structure are few.

D.

Reliance is placed on top management decision making by few of the organization's departments.

Full Access
Question # 41

Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?

A.

UDAs arid traditional JT applications typically follow a similar development life cycle

B.

A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.

C.

Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.

D.

IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.

Full Access
Question # 42

An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?

A.

Required documentation of process for discontinuing use of the devices

B.

Required removal of personal pictures and contacts.

C.

Required documentation of expiration of contract with service provider.

D.

Required sign-off on conflict of interest statement.

Full Access
Question # 43

At one organization, the specific terms of a contract require both the promisor and promisee to sign the contract in the presence of an independent witness. What is the primary role to the witness to these signatures?

A.

A witness verifies the quantities of the copies signed.

B.

A witness verifies that the contract was signed with the free consent of the promisor and promisee.

C.

A witness ensures the completeness of the contract between the promisor and promisee.

D.

A witness validates that the signatures on the contract were signed by the promisor and promisee.

Full Access
Question # 44

Which of the following would most likely serve as a foundation for individual operational goats?

A.

Individual skills and capabilities.

B.

Alignment with organizational strategy.

C.

Financial and human resources of the unit.

D.

Targets of key performance indicators

Full Access
Question # 45

Which of the following situations best illustrates a "false positive" in the performance of a spam filter?

A.

The spam filter removed Incoming communication that included certain keywords and domains.

B.

The spam filter deleted commercial ads automatically, as they were recognized as unwanted.

C.

The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.

D.

The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.

Full Access
Question # 46

Which of the following describes a mechanistic organizational structure?

A.

Primary direction of communication tends to be lateral.

B.

Definition of assigned tasks tends to be broad and general.

C.

Type of knowledge required tends to be broad and professional.

D.

Reliance on self-control tends to be low.

Full Access
Question # 47

Which of the following best describes owner's equity?

A.

Assets minus liabilities.

B.

Total assets.

C.

Total liabilities.

D.

Owners contribution plus drawings.

Full Access
Question # 48

Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

A.

First-in. first-out method (FIFO).

B.

Last-in, first-out method (LIFO).

C.

Specific identification method.

D.

Average-cost method

Full Access
Question # 49

Which of the following would be classified as IT general controls?

A.

Error listings.

B.

Distribution controls.

C.

Transaction logging.

D.

Systems development controls.

Full Access
Question # 50

An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?

A.

Use of a central processing unit

B.

Use of a database management system

C.

Use of a local area network

D.

Use of electronic data Interchange

Full Access
Question # 51

Which of the following networks is suitable for an organization that has operations In multiple cities and countries?

A.

Wide area network.

B.

Local area network

C.

Metropolitan area network.

D.

Storage area network.

Full Access