Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?
Which of the following would be the strongest control to prevent unauthorized wireless network access?
During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?
Which of the following is most important for an internal auditor to check with regard to the database version?
Which of the following statements is true regarding cost-volume-profit analysis?
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?
An organization's account for office supplies on hand had a balance of $9,000 at the end of year one. During year two. The organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11 ,500 in office supplies on hand. Based on this Information, what would he recorded in the adjusting entry an the end of year two?
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
According to IIA guidance, which of the following statements is true regarding penetration testing?
An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?
Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
Which of the following backup methodologies would be most efficient in backing up a database in the production environment?
Which of the following statements is true regarding the management-by-objectives method?
Which of the following is an example of a contingent liability that a company should record?
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
According to The IIA's Three Lines Model, which of the following IT security activities is commonly shared by all three lines?
After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.
Which of the following is the most likely control weakness demonstrated by the seller?
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
A one-time password would most likely be generated in which of the following situations?
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?
Which of the following is true regarding the use of remote wipe for smart devices?
Which of the following best explains why an organization would enter into a capital lease contract?
Which of the following biometric access controls uses the most unique human recognition characteristic?
Which of the following authentication device credentials is the most difficult to revoke when an employee s access rights need to be removed?
Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?
Which of the following physical access control is most likely to be based on ’’something you have" concept?
At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?
The management of working capital is most crucial for which of the following aspects of business?
An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?
Which of the following statements is true regarding activity-based costing (ABC)?
An organization contracted a third-party service provider to plan, design, and build a new facility. Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?
When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?
Which of the following capital budgeting techniques considers the expected total net cash flows from investment?
CIA | IIA-CIA-Part3 Questions Answers | IIA-CIA-Part3 Test Prep | Business Knowledge for Internal Auditing Questions PDF | IIA-CIA-Part3 Online Exam | IIA-CIA-Part3 Practice Test | IIA-CIA-Part3 PDF | IIA-CIA-Part3 Test Questions | IIA-CIA-Part3 Study Material | IIA-CIA-Part3 Exam Preparation | IIA-CIA-Part3 Valid Dumps | IIA-CIA-Part3 Real Questions | CIA IIA-CIA-Part3 Exam Questions