An internal auditor is assessing the risks related to an organization’s mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal auditor be most concerned about?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?
An organization’s account for office supplies on hand had a balance of $9,000 at the end of year one. During year two, the organization recorded an expense for purchasing office supplies. At the end of year two, a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?
Which of the following application controls is the most dependent on the password owner?
Which of the following IT-related activities is most commonly performed by the second line of defense?
Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?
During which phase of the contracting process are contracts drafted for a proposed business activity?
Given the information below, which organization is in the weakest position to pay short-term debts?
Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000
Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000
Organization C: Current assets constitute $900,000; Current liabilities are $300,000
Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?
Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?
Which of the following physical access control is most likely to be based on ’’something you have" concept?
An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?
Which of the following statements. Is most accurate concerning the management and audit of a web server?
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
For employees, the primary value of implementing job enrichment is which of the following?
Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
Which of the following is an example of a physical control designed to prevent security breaches?
Which of the following best describes the type of control provided by a firewall?
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
According to IIA guidance, which of the following links computers and enables them to -communicate with each other?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?
At one organization, the specific terms of a contract require both the promisor and promisee to sign the contract in the presence of an independent witness. What is the primary role to the witness to these signatures?
A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services. Which of the following best describes the restaurants strategy?
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and
telecommunications, but does not have servers or infrastructure equipment?
When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?
A small chain of grocery stores made a reporting error and understated its ending inventory. What effect would this have on the income statement for the following year?
Which of the following scenarios indicates an effective use of financial leverage?
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
An analytical model determined that on Friday and Saturday nights the luxury brands stores should be open for extended hours and with a doubled number of employees
present; while on Mondays and Tuesdays costs can be minimized by reducing the number of employees to a minimum and opening only for evening hours Which of the
following best categorizes the analytical model applied?
An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;
- Risks specific to the organization itself.
- Risks specific to the service provider.
- Risks shared by both the organization and the service provider
Which of the following risks should the auditor classify as specific to the service provider?
Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?
Which of the following security controls would provide the most efficient and effective authentication for customers to access these online shopping account?
Which of the following measures the operating success of a company for a given period of time?
An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data.
What would be the most appropriate directive control in this area?
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?
When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?
Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?
Which of the following IT-related activities is most commonly performed by the second line of defense?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
Which of the following statements is true regarding the management-by-objectives (MBO) approach?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?
Which of the following differentiates a physical access control from a logical access control?
According to IIA guidance, which of the following are typical physical and environmental IT controls?
An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?
According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?
Which of the following is the most appropriate way to record each partner’s initial investment in a partnership?
Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?
Which of the following security controls would be appropriate to protect the exchange of information?
Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?
Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Which of the following characteristics applies to an organization that adopts a flat structure?
The budgeted cost of work performed is a metric best used to measure which project management activity?
An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?
Which of the following would be the best method to collect information about employees' job satisfaction?
Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?
While conducting' audit procedures at the organization's data center an internal auditor noticed the following:
- Backup media was located on data center shelves.
- Backup media was organized by date.
- Backup schedule was one week in duration.
The system administrator was able to present restore logs.
Which of the following is reasonable for the internal auditor to conclude?
An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?
When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?
Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?
During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an Analytics tool to identify the top five vendors that received the highest sum of payments. Which of the following analytics techniques did the auditor apply?
Which of the following attributes of data is the most significantly impacted by the internet of things?
In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?
An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?
The management of working capital is most crucial for which of the following aspects of business?
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
Which of the following is an indicator of liquidity that is more dependable than working capital?
CIA | IIA-CIA-Part3 Questions Answers | IIA-CIA-Part3 Test Prep | Business Knowledge for Internal Auditing Questions PDF | IIA-CIA-Part3 Online Exam | IIA-CIA-Part3 Practice Test | IIA-CIA-Part3 PDF | IIA-CIA-Part3 Test Questions | IIA-CIA-Part3 Study Material | IIA-CIA-Part3 Exam Preparation | IIA-CIA-Part3 Valid Dumps | IIA-CIA-Part3 Real Questions | CIA IIA-CIA-Part3 Exam Questions