Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CIA Exam Part Three: Business Knowledge for Internal Auditing Question and Answers

CIA Exam Part Three: Business Knowledge for Internal Auditing

Last Update May 18, 2024
Total Questions : 488

We are offering FREE IIA-CIA-Part3-3P IIA exam questions. All you do is to just go and sign up. Give your details, prepare IIA-CIA-Part3-3P free exam questions and then go for complete pool of CIA Exam Part Three: Business Knowledge for Internal Auditing test questions that will help you more.

IIA-CIA-Part3-3P pdf

IIA-CIA-Part3-3P PDF

$35  $99.99
IIA-CIA-Part3-3P Engine

IIA-CIA-Part3-3P Testing Engine

$42  $119.99
IIA-CIA-Part3-3P PDF + Engine

IIA-CIA-Part3-3P PDF + Testing Engine

$56  $159.99
Questions 1

According to IIA guidance, which of the following corporate social responsibility (CSR) evaluation activities may be performed by the internal audit activity?

1) Consult on CSR program design and implementation.

2) Serve as an advisor on CSR governance and risk management.

3) Review third parties for contractual compliance with CSR terms.

4) Identify and mitigate risks to help meet the CSR program objectives.

Options:

A.  

1, 2, and 3

B.  

1, 2, and 4

C.  

1, 3, and 4

D.  

2, 3, and 4

Discussion 0
Questions 2

An organization with an annual demand of 25.000 units correctly computes its economic order quantity to be 1,000 units Its safety stock is 300 units and the lead time is two days If there are 250 production days in a year what is the reorder point1?

Options:

A.  

200 units.

B.  

300 units.

C.  

500 units.

D.  

1,000 units.

Discussion 0
Questions 3

According to MA guidance, which of the following would indicate poor change management control?

1) Low change success rate

2) Occasional planned outages

3) Low number of emergency changes.

4) Instances of unauthorized changes

Options:

A.  

1 and 3

B.  

1 and 4

C.  

2 and 3

D.  

2 and 4

Discussion 0
Questions 4

Organization X owns a 38 percent equity stake in Organization Y. Which of the following statements is true regarding the financial treatment for this relationship?

Options:

A.  

Y should be listed as an investment asset on X's balance sheet

B.  

X must consolidate the financial statements for both organizations

C.  

Y should be reported as a footnote to X's financial statements

D.  

Y should not be reported by X as X does not have a controlling interest

Discussion 0
Questions 5

Which of the following is the best example of IT governance controls?

Options:

A.  

Controls that focus on segregation of duties, financial and change management

B.  

Personnel policies that define and enforce conditions for staff in sensitive IT areas

C.  

Standards that support IT policies by more specifically defining required actions

D.  

Controls that focus on data structures and the minimum level of documentation required

Discussion 0
Questions 6

Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?

Options:

A.  

The cash dividends received increase the investee investment account accordingly.

B.  

The investee must adjust the investment account by the ownership interest.

C.  

The investment account is adjusted downward by the percentage of ownership.

D.  

The investee must record the cash dividends as dividend revenue.

Discussion 0
Questions 7

Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?

Options:

A.  

A list of trustworthy good traffic and a list of unauthorized blocked traffic.

B.  

Monitoring for vulnerabilities based on industry intelligence

C.  

Comprehensive service level agreements with vendors.

D.  

Firewall and other network penmeter protection tools.

Discussion 0
Questions 8

Which of the following is improved by the use of smart devices?

Options:

A.  

Version control

B.  

Privacy

C.  

Portability

D.  

Secure authentication

Discussion 0
Questions 9

The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization.

Which of the following methods of compensation would be best to achieve this goal?

Options:

A.  

Commissions.

B.  

Stock options.

C.  

Gain-sharing bonuses.

D.  

Allowances.

Discussion 0
Questions 10

A bank uses customer departmentalization to categorize its departments. Which of the following groups best exemplifies this method of categorization?

Options:

A.  

Community institutional and agricultural banking.

B.  

Mortgages credit cards and savings

C.  

South southwest and east.

D.  

Teller manager and IT specialist

Discussion 0
Questions 11

At a manufacturing plant, how would using Internet of Things during the production process benefit the organization?

Options:

A.  

It would provide the ability to monitor in real-time.

B.  

It would assist in securing sensitive data.

C.  

It would help detect cyberattacks in a more timely fashion.

D.  

It would assist in ensuring that data integrity is maintained.

Discussion 0
Questions 12

During an audit of the organization's annual financial statements, the internal auditor notes that the current cost of goods sold percentage is substantially higher than in prior years. Which of the following is the most likely explanation for this increase?

Options:

A.  

Cost of raw material inventory items is decreasing.

B.  

Process to manufacture goods is more efficient.

C.  

Labor productivity to produce goods is increasing.

D.  

Write-off of inventory is increasing.

Discussion 0
Questions 13

Which of the following performance measures includes both profits and investment base?

Options:

A.  

Residual income.

B.  

A flexible budget.

C.  

Variance analysis.

D.  

A contribution margin income statement by segment.

Discussion 0
Questions 14

An organization invests excess snort-term cash in trading securities. When of the following actions should an internal auditor take to test the valuation of those securities?

Options:

A.  

Use the equity method to recalculate the investment carrying value

B.  

Confirm the securities held by the broker

C.  

Perform a calculation of premium or discount amortization.

D.  

Compare the carrying value with current market quotations

Discussion 0
Questions 15

Which of the following control features consists of a set of authorization codes that distinguishes among actions such as reading, adding, and deleting records?

Options:

A.  

Internally encrypted passwords

B.  

System access privileges.

C.  

Logon passwords

D.  

Protocol controls.

Discussion 0
Questions 16

Which of the following is an example of a phishing attack?

Options:

A.  

An employee receives an email that appears to be from the organization's bank, though it is not. The employee replies to the email and sends the requested confidential information.

B.  

An organization's website has been hacked. The hacker added political content that is not consistent with the organization's views.

C.  

An organization's systems have been compromised by malicious software. The software locks the organization's operating system until d ransom is paid.

D.  

An organization's communication systems have been intercepted. A communication session is controlled by an unauthorized third party.

Discussion 0
Questions 17

An organization's headquarters is centrally located and the organization runs numerous computer applications in multiple sites. Which of the following would be the most appropriate approach for conducting an audit of the mainframe computer?

Options:

A.  

Conduct an individual audit of the mainframe general controls and separate application control audits of the individual applications in a phased manner

B.  

Conduct a single consolidated audit of both the mainframe general controls and the application controls for all of the applications that use the mainframe

C.  

Conduct individual audits of each application and include in each audit the general controls of the mainframe relevant to the individual application

D.  

Conduct a series of location-based audits that cover both the general and application IT controls an systems across the location

Discussion 0
Questions 18

Which of the following is a disadvantage of selecting a commercial software package rather than developing an application internally?

Options:

A.  

Lack of flexibility.

B.  

Incompatibility with client/server technology.

C.  

Employee resistance to change.

D.  

Inadequate technical support.

Discussion 0
Questions 19

Which of the following is a key characteristic of a zero-based budget?

Options:

A.  

A zero-based budget provides estimates of costs that would be incurred under different levels of activity.

B.  

A zero-based budget maintains focus on the budgeting process.

C.  

A zero-based budget is prepared each year and requires each item of expenditure to be justified.

D.  

A zero-based budget uses input from lower-level and middle-level managers to formulate budget plans.

Discussion 0
Questions 20

Preferred stock is less risky for investors than is common stock because:

Options:

A.  

Common stock pays dividends as a stated percentage of face value.

B.  

Common stock has priority over preferred stock with regard to earnings and assets.

C.  

Preferred dividends are usually cumulative.

D.  

Preferred stock with no conversion feature has a higher dividend yield than does convertible preferred stock.

Discussion 0
Questions 21

When an organization is choosing a new external auditor, which of the following is the most appropriate role for the chief audit executive to undertake?

Options:

A.  

Review and acquire the external audit service.

B.  

Assess the appraisal and actuarial services.

C.  

Determine the selection criteria.

D.  

Identify regulatory requirements to be considered.

Discussion 0
Questions 22

An organization is considering mirroring the customer data for one regional center at another center. A disadvantage of such an arrangement would be:

Options:

A.  

Lack of awareness of the state of processing.

B.  

Increased cost and complexity of network traffic.

C.  

Interference of the mirrored data with the original source data.

D.  

Confusion about where customer data are stored.

Discussion 0
Questions 23

Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?

Options:

A.  

Intranet.

B.  

Extranet.

C.  

Digital subscriber line.

D.  

Broadband.

Discussion 0
Questions 24

An internal auditor performed a review of IT outsourcing and found that the service provider was failing to meet the terms of the service level agreement. Which of the following approaches is most appropriate to address this concern?

Options:

A.  

The organization should review the skill requirements and ensure that the service provider is maintaining sufficient expertise and retaining skilled resources.

B.  

The organization should proactively monitor the performance of the service provider, escalate concerns, and use penalty clauses in the contract where necessary.

C.  

The organization should ensure that there is a clear management communication strategy and path for evaluating and reporting on all outsourced services concerns.

D.  

The organization should work with the service provider to review the current agreement and

expectations relating to objectives, processes, and overall performance.

Discussion 0
Questions 25

International marketing activities often begin with:

Options:

A.  

Standardization.

B.  

Global marketing.

C.  

Limited exporting.

D.  

Domestic marketing.

Discussion 0
Questions 26

The economic order quantity can be calculated using the following formula:

Which of the following describes how the optimal order size will change if the annual demand increases by 36 percent?

Options:

A.  

Decrease by about 17 percent.

B.  

Decrease by about 7 percent.

C.  

Increase by about 7 percent.

D.  

Increase by about 17 percent.

Discussion 0
Questions 27

Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?

Options:

A.  

Both the key used to encrypt the data and the key used to decrypt the data are made public.

B.  

The key used to encrypt the data is kept private but the key used to decrypt the data is made public.

C.  

The key used to encrypt the data is made public but the key used to decrypt the data is kept private.

D.  

Both the key used to encrypt the data and the key used to decrypt the data are made private.

Discussion 0
Questions 28

Which of the following statements best describes the frameworks set forth by the International Standards Organization?

Options:

A.  

Globally accepted standards for industries and processes.

B.  

Bridging the gaps among control requirements, technical issues, and business risks.

C.  

Practical guidance and benchmarks for all organizations that use information systems.

D.  

Frameworks and guidance on enterprise risk management, internal control, and fraud deterrence.

Discussion 0
Questions 29

According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?

Options:

A.  

Project portfolio.

B.  

Project development.

C.  

Project governance.

D.  

Project management methodologies.

Discussion 0
Questions 30

A remote location contains a data center with hardware available to support critical production systems as required in the recovery plan IT personnel periodically test and update systems at the data center. This is an example of which of the following recovery solutions?

Options:

A.  

Cold recovery plan

B.  

Critical recovery plan

C.  

Warm recovery plan

D.  

Tested recovery plan

Discussion 0
Questions 31

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

Options:

A.  

The risk that users try to bypass controls and do not install required software updates.

B.  

The risk that smart devices can be lost or stolen due to their mobile nature.

C.  

The risk that an organization intrusively monitors personal information stored on smart devices.

D.  

The risk that proprietary information is not deleted from the device when an employee leaves.

Discussion 0
Questions 32

An internal auditor is investigating a potential fraudulent activity. What is the first test the auditor should perform on the transaction data under scrutiny?

Options:

A.  

Digital analysis for statistically unlikely occurrences that may indicate system tampering.

B.  

Verification of the completeness and integrity of the obtained data.

C.  

Detailed review of the data contents to strategize the best analytical techniques.

D.  

Calculation of statistical parameters to identify outliers requiring further scrutiny.

Discussion 0
Questions 33

Which of the following performance measures disincentivizes engaging in earnings management?

Options:

A.  

Linking performance to profitability measures such as return on investment.

B.  

Linking performance to the stock price.

C.  

Linking performance to quotas such as units produced.

D.  

Linking performance to nonfinancial measures such as customer satisfaction and employees training.

Discussion 0
Questions 34

While reviewing the contracts for a large city, the internal auditor learns that the organization contracted to perform trash collection is paid based on the number of bins emptied each week as a result, the city has minimal control over payments Which of the following actions should the auditor recommend to give the city greater control over payments?

Options:

A.  

Change the contract so payment is based on the distances traveled by the contractor during collection.

B.  

Renegotiate a lump-sum contract when the contract is up for renewal

C.  

Assign a city employee to verify the number of bins emptied each day

D.  

Require that the contractor provide supervisory review of the number of bins emptied each day

Discussion 0
Questions 35

An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.

Which of the following would be considered the most significant cyber threat to the organization?

Options:

A.  

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.  

Hackers breaching the organization's network to access research and development reports.

C.  

A denial-of-service attack that prevents access to the organization's website.

D.  

A hacker accessing the financial information of the company.

Discussion 0
Questions 36

An organization's board of directors is particularly focused on positioning the organization as a leader in the industry and beating the competition.

Which of the following strategies offers the greatest alignment with the board's focus?

Options:

A.  

Divesting product lines expected to have negative profitability.

B.  

Increasing the diversity of strategic business units.

C.  

Increasing investment in research and development for a new product.

D.  

Relocating the organization's manufacturing to another country.

Discussion 0
Questions 37

When using data analytics during a review of the procurement process what is the first step in the analysis process?

Options:

A.  

Identity data anomalies and outliers

B.  

Define questions to be answered

C.  

identify data sources available

D.  

Determine the scope of the data extract

Discussion 0
Questions 38

Which of the following principles is shared by both hierarchical and open organizational structures?

1) A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions

2) A supervisor's span of control should not exceed seven subordinates

3) Responsibility should be accompanied by adequate authority

4) Employees at all levels should be empowered to make decisions.

Options:

A.  

1 and 3 only.

B.  

1 and 4 only.

C.  

2 and 3 only

D.  

3 and 4 only.

Discussion 0
Questions 39

During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?

Options:

A.  

Initiation phase.

B.  

Bidding phase.

C.  

Development phase.

D.  

Negotiation phase

Discussion 0
Questions 40

Which of the following actions would senior management need to consider as pan of new IT guidelines regarding the organization's cybersecurity policies?

Options:

A.  

Assigning new roles and responsibilities for senior IT management.

B.  

Growing use of bring your own devices tor organizational matters

C.  

Expansion of operations into new markets with united IT access

D.  

Hiring new personnel within the IT department tor security purposes

Discussion 0
Questions 41

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational

capability in the event of a disaster.

Which of the following best describes this approach to disaster recovery planning?

Options:

A.  

Cold recovery plan.

B.  

Outsourced recovery plan.

C.  

Storage area network recovery plan.

D.  

Hot recovery plan.

Discussion 0
Questions 42

Which of the following is an example of a physical control?

Options:

A.  

Providing fire detection and suppression equipment

B.  

Establishing a physical security policy and promoting it throughout the organization

C.  

Performing business continuity and disaster recovery planning

D.  

Keeping an offsite backup of the organization's critical data

Discussion 0
Questions 43

Which of the following best describes the primary objective of cybersecurity?

Options:

A.  

To protect the effective performance of IT general and application controls.

B.  

To regulate users' behavior in the web and cloud environment.

C.  

To prevent unauthorized access to information assets.

D.  

To secure application of protocols and authorization routines.

Discussion 0
Questions 44

An organization recently documented its procedures for recovering systems and data after a disaster How are these documented procedures most likely to be used during a disaster simulation exercise?

Options:

Discussion 0
Questions 45

A large hospital has an existing contract with a vendor in another country to provide software support and maintenance of the hospital's patient records information system. From the hospital management's perspective, which of the following controls would be most effective to address privacy risks related to this outsourcing arrangement?

Options:

A.  

Conduct periodic reviews of the privacy policy to ensure that the existing policy meets current

legislation requirements in both regions.

B.  

Include a "right to audit" clause in the contract and impose detailed security obligations on the

outsourced vendor

C.  

Implement mandatory privacy training for management to help with identifying privacy risks when outsourcing services

D.  

Develop an incident monitoring and response plan to track breaches from internal and external sources

Discussion 0
Questions 46

A manager who is authorized to make purchases up to a certain dollar amount approves the set-up of a fictitious vendor and subsequently initiates purchase orders.

Which of the following controls would best address this risk?

Options:

A.  

Establish separate vendor creation and approval teams.

B.  

Develop and distribute a code of conduct that prohibits conflicts of interest.

C.  

Perform a regular review of the vendor master file.

D.  

Require submission of a conflict-of-interest declaration.

Discussion 0
Questions 47

Which of the following is an example of a physical security control that should be in place at an organization's data center?

Options:

A.  

Backup servers in the data center are stored in an environmentally controlled location

B.  

All users have a unique ID and password to access data

C.  

Swipe cards are used to access the data center

D.  

Firewalls and antivirus protection are in place to prevent unauthorized access to data.

Discussion 0
Questions 48

Which of the following cost of capital methods identifies the time period required to recover the cost of the capital investment from the annual inflow produced?

Options:

A.  

Cash payback technique.

B.  

Annual rate of return technique.

C.  

Internal rate of return method.

D.  

Net present value method.

Discussion 0
Questions 49

A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager.

Which of the following organizational structures does this situation represent?

Options:

A.  

Functional departmentalization.

B.  

Product departmentalization.

C.  

Matrix organization.

D.  

Divisional organization.

Discussion 0
Questions 50

Which of the following statements regarding organizational governance is not correct?

Options:

A.  

An effective internal audit function is one of the four cornerstones of good governance.

B.  

Those performing governance activities are accountable to the customer.

C.  

Accountability is one of the key elements of organizational governance.

D.  

Governance principles and the need for an internal audit function are applicable to governmental and not-for-profit activities.

Discussion 0
Questions 51

A brand manager in a consumer food products organization suspected that several days of the point-of-sale data on the spreadsheet from one grocery chain were missing. The best approach for detecting missing rows in spreadsheet data would be to:

Options:

A.  

Sort on product identification code and identify missing product identification codes.

B.  

Review store identification code and identify missing product identification codes.

C.  

Compare product identification codes for consecutive periods.

D.  

Compare product identification codes by store for consecutive periods.

Discussion 0
Questions 52

Which of the following is a characteristic of an emerging industry?

Options:

A.  

Established strategy of players.

B.  

Low number of new firms.

C.  

High unit costs.

D.  

Technical expertise.

Discussion 0
Questions 53

In terms of international business strategy, which of the following is true regarding a multi-domestic strategy?

Options:

A.  

It uses the same products in all countries.

B.  

It centralizes control with little decision-making authority given to the local level.

C.  

It is an effective strategy when large differences exist between countries.

D.  

It provides cost advantages, improves coordinated activities, and speeds product development.

Discussion 0
Questions 54

Where complex problems need to be addressed, which of the following communication networks would be most appropriate?

Options:

A.  

Chain.

B.  

All-channel.

C.  

Circle.

D.  

Wheel.

Discussion 0
Questions 55

Which of the following is a role of the board of directors in the governance process?

Options:

A.  

Conduct periodic assessments of the organization's governance systems.

B.  

Obtain assurance concerning the effectiveness of the organization's governance systems.

C.  

Implement an effective system of internal controls to support the organization's governance systems.

D.  

Review and approve operational goals and objectives.

Discussion 0
Questions 56

A company's financial balance sheet is presented below:

The company has net working capital of:

Options:

A.  

$160

B.  

$210

C.  

$350

D.  

$490

Discussion 0
Questions 57

Which of the following statements is correct regarding corporate compensation systems and related bonuses?

1) A bonus system should be considered part of the control environment of an organization and should be considered in formulating a report on internal control.

2) Compensation systems are not part of an organization's control system and should not be reported as such.

3) An audit of an organization's compensation system should be performed independently of an audit of the control system over other functions that impact corporate bonuses.

Options:

A.  

1 only

B.  

2 only

C.  

3 only

D.  

2 and 3 only

Discussion 0
Questions 58

Which of the following describes the result if an organization records merchandise as a purchase, but fails to include it in the closing inventory count?

Options:

A.  

The cost of goods sold for the period will be understated.

B.  

The cost of goods sold for the period will be overstated.

C.  

The net income for the period will be understated.

D.  

There will be no effect on the cost of goods sold or the net income for the period.

Discussion 0
Questions 59

Which of the following price adjustment strategies encourages prompt payment?

Options:

A.  

Cash discounts.

B.  

Quantity discounts.

C.  

Functional discounts.

D.  

Seasonal discounts.

Discussion 0
Questions 60

A retail organization is considering acquiring a composite textile company. The retailer's due diligence team determined the value of the textile company to be $50 million. The financial experts forecasted net present value of future cash flows to be $60 million. Experts at the textile company determined their company's market value to be $55 million if purchased by another entity. However, the textile company could earn more than $70 million from the retail organization due to synergies. Therefore, the textile company is motivated to make the negotiation successful. Which of the following approaches is most likely to result in a successful negotiation?

Options:

A.  

Develop a bargaining zone that lies between $50 million and $70 million and create sets of outcomes between $50 million and $70 million.

B.  

Adopt an added-value negotiating strategy, develop a bargaining zone between $50 million and $70 million, and create sets of outcomes between $50 million and $70 million.

C.  

Involve a mediator as a neutral party who can work with the textile company's management to determine a bargaining zone.

D.  

Develop a bargaining zone that lies between $55 million and $60 million and create sets of outcomes between $55 million and $60 million.

Discussion 0
Questions 61

Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?

Options:

A.  

Each party's negotiator presents a menu of options to the other party.

B.  

Each party adopts one initial position from which to start.

C.  

Each negotiator minimizes the information provided to the other party.

D.  

Each negotiator starts with an offer, which is optimal from the negotiator's perspective.

Discussion 0
Questions 62

Which of the following statements is true regarding the relationship between an individual’s average tax rate and marginal tax rate?

Options:

A.  

In a regressive personal tax system, an individual's marginal tax rate is normally greater than his average tax rate.

B.  

In a regressive personal tax system, an individual's marginal tax rate is normally equal to his average tax rate.

C.  

In a progressive personal tax system, an individual's marginal tax rate is normally equal to his average tax rate.

D.  

In a progressive personal tax system, an individual's marginal tax rate is normally greater than his average tax rate.

Discussion 0
Questions 63

Which of the following control techniques would minimize the risk of interception during transmission in an electronic data interchange system?

1) Encryption.

2) Traffic padding.

3) Edit checks.

4) Structured data format.

Options:

A.  

1 and 2 only

B.  

2 and 3 only

C.  

3 and 4 only

D.  

1, 2, and 3 only

Discussion 0
Questions 64

Which of the following conditions could lead an organization to enter into a new business through internal development rather than through acquisition?

Options:

A.  

It is expected that there will be slow retaliation from incumbents.

B.  

The acquiring organization has information that the selling organization is weak.

C.  

The number of bidders to acquire the organization for sale is low.

D.  

The condition of the economy is poor.

Discussion 0
Questions 65

Which of the following statements about matrix organizations is false?

Options:

A.  

In a matrix organization, conflict between functional and product managers may arise.

B.  

In a matrix organization, staff under dual command is more likely to suffer stress at work.

C.  

Matrix organizations offer the advantage of greater flexibility.

D.  

Matrix organizations minimize costs and simplify communication.

Discussion 0
Questions 66

In mergers and acquisitions, which of the following is an example of a horizontal combination?

Options:

A.  

Dairy manufacturing company taking over a large dairy farm.

B.  

A movie producer acquires movie theaters.

C.  

A petroleum processing company acquires an agro-processing firm.

D.  

A baker taking over a competitor.

Discussion 0
Questions 67

If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the auditor should do which of the following?

Options:

A.  

Conform with all other parts of The IIA's Standards and provide appropriate disclosures.

B.  

Conform with all other parts of The IIA's Standards; there is no need to provide appropriate disclosures.

C.  

Continue the engagement without conforming with the other parts of The IIA's Standards.

D.  

Withdraw from the engagement.

Discussion 0
Questions 68

A global business organization is selecting managers to post to various international (expatriate) assignments.

In the screening process, which of the following traits would be required to make a manager a successful expatriate?

1) Superior technical competence.

2) Willingness to attempt to communicate in a foreign language.

3) Ability to empathize with other people.

Options:

A.  

1 and 2 only

B.  

1 and 3 only

C.  

2 and 3 only

D.  

1, 2, and 3

Discussion 0
Questions 69

An organization is considering the outsourcing of its business processes related to payroll and information technology functions. Which of the following is the most significant area of concern for management regarding this proposed agreement?

Options:

A.  

Ensuring that payments to the vendor are appropriate and timely for the services delivered.

B.  

Ensuring that the vendor has complete management control of the outsourced process.

C.  

Ensuring that there are means of monitoring the efficiency of the outsourced process.

D.  

Ensuring that there are means of monitoring the effectiveness of the outsourced process.

Discussion 0
Questions 70

Which of the following statements accurately describes one of the characteristics that distinguishes a multinational company from a domestic company?

Options:

A.  

A multinational company has stockholders in other countries.

B.  

A multinational company exports its products to other countries.

C.  

A multinational company operates outside of its country of origin.

D.  

A multinational company uses raw materials and components from more than one country.

Discussion 0
Questions 71

Which of the following steps should an internal auditor take during an audit of an organization's business continuity plans?

1) Evaluate the business continuity plans for adequacy and currency.

2) Prepare a business impact analysis regarding the loss of critical business.

3) Identify key personnel who will be required to implement the plans.

4) Identify and prioritize the resources required to support critical business processes.

Options:

A.  

1 only

B.  

2 and 4 only

C.  

1, 3, and 4 only

D.  

1, 2, 3, and 4

Discussion 0
Questions 72

The most important reason to use risk assessment in audit planning is to:

Options:

A.  

Identify redundant controls.

B.  

Improve budgeting accuracy.

C.  

Enhance assurance provided to management.

D.  

Assist in developing audit programs.

Discussion 0
Questions 73

Which of the following is false with regard to Internet connection firewalls?

Options:

A.  

Firewalls can protect against computer viruses.

B.  

Firewalls monitor attacks from the Internet.

C.  

Firewalls provide network administrators tools to retaliate against hackers.

D.  

Firewalls may be software-based or hardware-based.

Discussion 0