Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Internal Audit Function Question and Answers

Internal Audit Function

Last Update Mar 1, 2026
Total Questions : 514

We are offering FREE IIA-CIA-Part3 IIA exam questions. All you do is to just go and sign up. Give your details, prepare IIA-CIA-Part3 free exam questions and then go for complete pool of Internal Audit Function test questions that will help you more.

IIA-CIA-Part3 pdf

IIA-CIA-Part3 PDF

$36.75  $104.99
IIA-CIA-Part3 Engine

IIA-CIA-Part3 Testing Engine

$43.75  $124.99
IIA-CIA-Part3 PDF + Engine

IIA-CIA-Part3 PDF + Testing Engine

$57.75  $164.99
Questions 1

Which of the following would be classified as IT general controls?

Options:

A.  

Error listings.

B.  

Distribution controls.

C.  

Transaction logging.

D.  

Systems development controls.

Discussion 0
Questions 2

Which of the following is true of matrix organizations?

Options:

A.  

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.

B.  

A combination of product and functional departments allows management to utilize personnel from various functions.

C.  

Authority, responsibility, and accountability of the units involved may vary based on the project's life or the organization's culture.

D.  

It is best suited for firms with scattered locations or for multi-line, large-scale firms.

Discussion 0
Questions 3

Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?

Options:

A.  

Managerial accounting uses double-entry accounting and cost data.

B.  

Managerial accounting uses general accepted accounting principles.

C.  

Managerial accounting involves decision making based on quantifiable economic events.

D.  

Managerial accounting involves decision making based on predetermined standards.

Discussion 0
Questions 4

Which of the following best describes the primary objective of cybersecurity?

Options:

A.  

To protect the effective performance of IT general and application controls.

B.  

To regulate users' behavior it the web and cloud environment.

C.  

To prevent unauthorized access to information assets.

D.  

To secure application of protocols and authorization routines.

Discussion 0
Questions 5

An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

Options:

A.  

Average cost method

B.  

First-in, first-out (FIFO) method

C.  

Specific identification method

D.  

Activity-based costing method

Discussion 0
Questions 6

Which of the following is a systems software control?

Options:

A.  

Restricting server room access to specific individuals.

B.  

Housing servers with sensitive software away from environmental hazards.

C.  

Ensuring that all user requirements are documented.

D.  

Performing intrusion testing on a regular basis.

Discussion 0
Questions 7

Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?

Options:

A.  

Prompt response and remediation policy

B.  

Inventory of information assets

C.  

Information access management

D.  

Standard security configurations

Discussion 0
Questions 8

According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?

Options:

A.  

Hot recovery plan

B.  

Warm recovery plan

C.  

Cold recovery plan

D.  

Absence of recovery plan

Discussion 0
Questions 9

Which of the following storage options would give the organization the best chance of recovering data?

Options:

A.  

Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.

B.  

Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.

C.  

Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.

D.  

Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.

Discussion 0
Questions 10

In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?

Options:

A.  

Vertical integration.

B.  

Unrelated diversification.

C.  

Differentiation

D.  

Focus

Discussion 0
Questions 11

Following an evaluation of an organization's IT controls, an internal auditor suggested improving the process where results are compared against the input. Which of the following IT controls would the Internal auditor recommend?

Options:

A.  

Output controls.

B.  

Input controls

C.  

Processing controls.

D.  

Integrity controls.

Discussion 0
Questions 12

A newly hired chief audit executive (CAE) reviews and will revise the existing internal audit strategy. What should the CAE initially refer to when revising the internal audit strategy?

Options:

A.  

Legal and regulatory requirements

B.  

Organization-wide risk assessment results

C.  

Key internal control activities

D.  

Organizational business objectives

Discussion 0
Questions 13

When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?

Options:

A.  

Whether every call that the service provider received was logged by the help desk.

B.  

Whether a unique identification number was assigned to each issue identified by the service provider

C.  

Whether the service provider used its own facilities to provide help desk services

D.  

Whether the provider's responses and resolutions were well defined according to the service-level agreement.

Discussion 0
Questions 14

An internal auditor uses a risk and control questionnaire as part of the preliminary survey for an audit of the organization's anti-bribery and corruption program. What is the primary purpose of using this approach?

Options:

A.  

To compare records from one source to subsequently prepared records about the anti-bribery program

B.  

To ascertain the existence of certain controls in the organization's anti-bribery program

C.  

To obtain testimonial information about certain controls in the organization's anti-bribery program

D.  

To validate control information through outside parties independent of the anti-bribery program

Discussion 0
Questions 15

Which of the following statements is true regarding user-developed applications (UDAs)?

Options:

A.  

UDAs are less flexible and more difficult to configure than traditional IT applications.

B.  

Updating UDAs may lead to various errors resulting from changes or corrections.

C.  

UDAs typically are subjected to application development and change management controls.

D.  

Using UDAs typically enhances the organization's ability to comply with regulatory factors.

Discussion 0
Questions 16

Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the

following would be a characteristic of the now highly centralized organization?

Options:

A.  

Top management does little monitoring of the decisions made at lower levels.

B.  

The decisions made at the lower levels of management are considered very important.

C.  

Decisions made at lower levels in the organizational structure are few.

D.  

Reliance is placed on top management decision making by few of the organization's departments.

Discussion 0
Questions 17

Which of the following biometric access controls uses the most unique human recognition characteristic?

Options:

A.  

Facial comparison using photo identification.

B.  

Signature comparison.

C.  

Voice comparison.

D.  

Retinal print comparison.

Discussion 0
Questions 18

Which of the following best describes a potential benefit of using data analyses?

Options:

A.  

It easily aligns with existing internal audit competencies to reduce expenses

B.  

It provides a more holistic view of the audited area.

C.  

Its outcomes can be easily interpreted into audit: conclusions.

D.  

Its application increases internal auditors' adherence to the Standards

Discussion 0
Questions 19

Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?

Options:

A.  

Deploys data visualization tool.

B.  

Adopt standardized data analysis software.

C.  

Define analytics objectives and establish outcomes.

D.  

Eliminate duplicate records.

Discussion 0
Questions 20

Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?

Options:

A.  

Key performance indicators.

B.  

Reports of software customization.

C.  

Change and patch management.

D.  

Master data management

Discussion 0
Questions 21

The finance department of an organization recently undertook an asset verification exercise. The internal audit function scheduled a review of the IT department’s operations, which includes verifying the existence of computers distributed and their assignment. Can the internal audit function consider relying on the asset verification work performed by the finance department?

Options:

A.  

Yes, in order to be efficient and make better use of internal audit resources

B.  

No, as the finance department is an internal department of the organization

C.  

Yes, but the finance manager would be responsible for supporting the conclusions of the work

D.  

No, the internal audit function should do its own verification and should not rely on the work of finance

Discussion 0
Questions 22

A small chain of grocery stores made a reporting error and understated its ending inventory. What effect would this have on the income statement for the following year?

Options:

A.  

Net income would be understated.

B.  

Net income would not be affected.

C.  

Net income would be overstated.

D.  

Net income would be negative.

Discussion 0
Questions 23

Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?

Options:

A.  

Risk tolerance.

B.  

Performance.

C.  

Threats and opportunities.

D.  

Governance.

Discussion 0
Questions 24

An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?

Options:

A.  

Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters

B.  

Orders, commands, and advice are sent to the subsidiaries from headquarters

C.  

People of local nationality are developed for the best positions within their own country

D.  

There is a significant amount of collaboration between headquarters and subsidiaries

Discussion 0
Questions 25

During an internal audit engagement, it was found that several vendors were on a government sanctions list and must no longer be traded with. Which of the following would most effectively mitigate the risk of noncompliance with sanctions lists that are updated regularly?

Options:

A.  

Agreements with sanctioned vendors discovered by internal audit will be placed on hold until further notice from the government

B.  

A new procedure of vendor onboarding will be implemented to ensure that all new vendors undergo screenings against the sanctions list

C.  

Controls will be embedded in the vendor management processes to ensure that new and existing vendors are compliant with changes to the sanctions list

D.  

The legal team will be asked to prepare counter arguments to dispute audit findings and potential inquiries from the governmental authority

Discussion 0
Questions 26

Which of the following attributes of data is the most significantly impacted by the internet of things?

Options:

A.  

Normalization

B.  

Velocity

C.  

Structuration

D.  

Veracity

Discussion 0
Questions 27

According to Maslow's hierarchy of needs theory, which of the following would likely have the most impact on retaining staff, if their lower-level needs are already met?

Options:

A.  

Social benefits.

B.  

Compensation.

C.  

Job safety.

D.  

Recognition

Discussion 0
Questions 28

A chief audit executive (CAE) is calculating the available internal audit resource hours while planning the annual internal audit plan. The CAE needs to calculate the total number of hours available for audits. Which of the following should be deducted in order to have time available only for engagements?

Options:

A.  

Time spent on coaching the internal audit function on new engagement procedures

B.  

Time spent on the preliminary risk assessment of the engagement

C.  

Time spent for the documentation of supporting files for the engagement

D.  

Time spent on reporting the results of the engagement

Discussion 0
Questions 29

Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

Options:

A.  

High-yield bonds

B.  

Commodity-backed bonds

C.  

Zero-coupon bonds

D.  

Junk bonds

Discussion 0
Questions 30

Senior management is trying to decide whether to use the direct write-off or allowance method for recording bad debt on accounts receivables. Which of the following would be the best argument for using the direct write-off method?

Options:

A.  

It is useful when losses are considered insignificant.

B.  

It provides a better alignment with revenue.

C.  

It is the preferred method according to The IIA.

D.  

It states receivables at net realizable value on the balance sheet.

Discussion 0
Questions 31

Which of the following statements distinguishes a router from a typical switch?

Options:

A.  

A router operates at layer two. while a switch operates at layer three of the open systems interconnection model.

B.  

A router transmits data through frames, while a switch sends data through packets.

C.  

A router connects networks, while a switch connects devices within a network.

D.  

A router uses a media access control address during the transmission of data, whie a switch uses an internet protocol address.

Discussion 0
Questions 32

Which of the following networks is suitable for an organization that has operations In multiple cities and countries?

Options:

A.  

Wide area network.

B.  

Local area network

C.  

Metropolitan area network.

D.  

Storage area network.

Discussion 0
Questions 33

Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?

Options:

A.  

Analysis of the full population of existing data.

B.  

Verification of the completeness and integrity of existing data.

C.  

Continuous monitoring on a repetitive basis.

D.  

Analysis of the databases of partners, such as suppliers.

Discussion 0
Questions 34

Upon completing a follow-up audit engagement, the chief audit executive (CAE) noted that management has not implemented any mitigation measures to address the high risks that were reported in the initial audit report. What initial step must the CAE take to address this situation?

Options:

A.  

Communicate the issue to senior management

B.  

Discuss the issue with members of management responsible for the risk area

C.  

Report the situation to the external auditors

D.  

Escalate the issue to the board

Discussion 0
Questions 35

When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?

Options:

A.  

Identification of achievable goals and timelines

B.  

Analysis of the competitive environment.

C.  

Plan for the procurement of resources

D.  

Plan for progress reporting and oversight.

Discussion 0
Questions 36

According to IIA guidance, which of the following statements is true regarding communication of engagement results?

Options:

A.  

Prior to releasing engagement results to parties outside of the organization, the audit committee must assess the potential risk to the organization, consult with senior management and/or legal counsel, and control dissemination by restricting the use of the results

B.  

During an advisory engagement, if a significant governance issue is identified, it must be communicated to senior management and the board

C.  

The engagement supervisor is responsible for communicating the final results to the chief audit executive and other parties who can ensure that the results are given due consideration

D.  

The audit committee is responsible for reviewing and approving the final engagement communication before issuance and for deciding to whom and how it will be disseminated

Discussion 0
Questions 37

How can the chief audit executive best provide the internal audit function with the resources needed to fulfill the annual audit plan?

Options:

A.  

Improve skills by strengthening staff competencies

B.  

Map the audit risk assessment to the organization's strategic plan

C.  

Collaborate with other risk management functions in the organization

D.  

Refine its audit processes according to the Global Internal Audit Standards

Discussion 0
Questions 38

Which of the following contract concepts is typically given in exchange for the execution of a promise?

Options:

A.  

Lawfulness.

B.  

Consideration.

C.  

Agreement.

D.  

Discharge

Discussion 0
Questions 39

What is the primary purpose of an integrity control?

Options:

A.  

To ensure data processing is complete, accurate, and authorized

B.  

To ensure data being processed remains consistent and intact

C.  

To monitor the effectiveness of other controls

D.  

To ensure the output aligns with the intended result

Discussion 0
Questions 40

An organization's technician was granted a role that enables him to prioritize projects throughout the organization. Which type of authority will the technician most likely be exercising?

Options:

A.  

Legitimate authority

B.  

Coercive authority.

C.  

Referent authority.

D.  

Expert authority.

Discussion 0
Questions 41

Which of the following would be the best method to collect information about employees' job satisfaction?

Options:

A.  

Online surveys sent randomly to employees.

B.  

Direct onsite observations of employees.

C.  

Town hall meetings with employees.

D.  

Face-to-face interviews with employees.

Discussion 0
Questions 42

Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?

Options:

A.  

Anti-malware software

B.  

Authentication

C.  

Spyware

D.  

Rooting

Discussion 0
Questions 43

With regard to project management, which of the following statements about project crashing Is true?

Options:

A.  

It leads to an increase in risk and often results in rework.

B.  

It is an optimization technique where activities are performed in parallel rather than sequentially.

C.  

It involves a revaluation of project requirements and/or scope.

D.  

It is a compression technique in which resources are added so the project.

Discussion 0
Questions 44

According to 11A guidance on IT, which of the following are indicators of poor change management?

1. Inadequate control design.

2. Unplanned downtime.

3. Excessive troubleshooting .

4. Unavailability of critical services.

Options:

A.  

2 and 3 only.

B.  

1, 2, and 3 only

C.  

1, 3, and 4 only

D.  

2, 3, and 4 only

Discussion 0
Questions 45

Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?

Options:

A.  

Theory of constraints.

B.  

Just-in-time method.

C.  

Activity-based costing.

D.  

Break-even analysis

Discussion 0
Questions 46

An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?

Options:

A.  

To verify that the application meets stated user requirements.

B.  

To verify that standalone programs match code specifications.

C.  

To verify that the application would work appropriately for the intended number of users.

D.  

To verify that all software and hardware components work together as intended.

Discussion 0
Questions 47

Which of the following capital budgeting techniques considers the tune value of money?

Options:

A.  

Annual rate of return.

B.  

Incremental analysis.

C.  

Discounted cash flow.

D.  

Cash payback

Discussion 0
Questions 48

How can the concept of relevant cost help management with behavioral analyses?

Options:

A.  

It explains the assumption mat both costs and revenues are linear through the relevant range

B.  

It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.

C.  

It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions

D.  

It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action

Discussion 0
Questions 49

Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?

Options:

A.  

Board of directors.

B.  

Senior management.

C.  

Chief financial officer.

D.  

Accounting personnel.

Discussion 0
Questions 50

For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?

Options:

A.  

An incorrect program fix was implemented just prior to the database backup.

B.  

The organization is preparing to train all employees on the new self-service benefits system.

C.  

There was a data center failure that requires restoring the system at the backup site.

D.  

There is a need to access prior year-end training reports for all employees in the human resources database

Discussion 0
Questions 51

Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?

Options:

A.  

Only preventive measures.

B.  

Alternative and reactive measures.

C.  

Preventive and alternative measures.

D.  

Preventive and reactive measures.

Discussion 0
Questions 52

Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

Options:

A.  

First-in. first-out method (FIFO).

B.  

Last-in, first-out method (LIFO).

C.  

Specific identification method.

D.  

Average-cost method

Discussion 0
Questions 53

Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?

Options:

A.  

It calculates the overall value of a project.

B.  

It ignores the time value of money.

C.  

It calculates the time a project takes to break even.

D.  

It begins at time zero for the project.

Discussion 0
Questions 54

An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?

Options:

A.  

A star

B.  

A cash cow

C.  

A question mark

D.  

A dog

Discussion 0
Questions 55

Which of the following would be most likely found in an internal audit procedures manual?

Options:

A.  

A summary of the strategic plan of the area under review

B.  

Appropriate response options for when findings are disputed by management

C.  

An explanation of the resources needed for each engagement

D.  

The extent of the auditor's authority to collect data from management

Discussion 0
Questions 56

Which of the following is the most appropriate way to record each partner’s initial investment in a partnership?

Options:

A.  

At the value agreed upon by the partners

B.  

At book value

C.  

At fair value

D.  

At the original cost

Discussion 0
Questions 57

During the process of setting the annual audit plan, the chief audit executive receives a request from senior management to conduct an assurance engagement on the cybersecurity controls of the organization. Which of the following is a reason cybersecurity should be included in the annual internal audit plan?

Options:

A.  

In order to maintain good relationships with senior management

B.  

Cybersecurity is a new area for auditors to learn

C.  

Cybersecurity has been identified as a high risk during the annual risk assessment

D.  

The Global Internal Audit Standards require that all management-requested engagements be included in the annual internal audit plan

Discussion 0
Questions 58

An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?

Options:

A.  

A balanced scorecard.

B.  

A quality audit

C.  

Earned value analysis.

D.  

Trend analysis

Discussion 0
Questions 59

Which of the following security controls would be me most effective in preventing security breaches?

Options:

A.  

Approval of identity request

B.  

Access logging.

C.  

Monitoring privileged accounts

D.  

Audit of access rights

Discussion 0
Questions 60

Which of the following is the starting point for a chief audit executive to prioritize engagements to be included in the internal audit plan?

Options:

A.  

A risk management maturity model

B.  

A risk matrix

C.  

An annual assurance map

D.  

An internal control framework

Discussion 0
Questions 61

Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?

Options:

A.  

Greater cost-effectiveness

B.  

Increased economies of scale

C.  

Larger talent pool

D.  

Strong internal controls

Discussion 0
Questions 62

Which of the following best describes a man-in-the-middle cyber-attack?

Options:

A.  

The perpetrator is able to delete data on the network without physical access to the device.

B.  

The perpetrator is able to exploit network activities for unapproved purposes.

C.  

The perpetrator is able to take over control of data communication in transit and replace traffic.

D.  

The perpetrator is able to disable default security controls and introduce additional vulnerabilities

Discussion 0
Questions 63

Which of the following capital budgeting techniques considers the expected total net cash flows from investment?

Options:

A.  

Cash payback

B.  

Annual rate of return

C.  

Incremental analysis

D.  

Net present value

Discussion 0
Questions 64

Which of the following measures the operating success of a company for a given period of time?

Options:

A.  

Liquidity ratios.

B.  

Profitability ratios.

C.  

Solvency ratios.

D.  

Current ratios.

Discussion 0
Questions 65

The board and senior management agree to outsource the internal audit function. Which of the following is true regarding the company’s quality assurance and improvement program (QAIP)?

Options:

A.  

The organization is responsible for maintaining an effective QAIP

B.  

The organization is responsible for the internal assessment of the QAIP

C.  

The service provider is responsible for the external assessment of the QAIP every three years

D.  

The QAIP should be postponed until the organization insources or cosources the internal audit function

Discussion 0
Questions 66

Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?

Options:

A.  

Authorization

B.  

Architecture model

C.  

Firewall

D.  

Virtual private network

Discussion 0
Questions 67

Which of the following statements Is true regarding the use of centralized authority to govern an organization?

Options:

A.  

Fraud committed through collusion is more likely when authority is centralized.

B.  

Centralized managerial authority typically enhances certainty and consistency within an organization.

C.  

When authority is centralized, the alignment of activities to achieve business goals typically is decreased.

D.  

Using separation of duties to mitigate collusion is reduced only when authority is centralized.

Discussion 0
Questions 68

A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?

Options:

A.  

Readiness assessment.

B.  

Project risk assessment.

C.  

Post-implementation review.

D.  

Key phase review.

Discussion 0
Questions 69

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?

Options:

A.  

Firewall.

B.  

Encryption.

C.  

Antivirus.

D.  

Biometrics.

Discussion 0
Questions 70

According to IIA guidance, whose input must be considered when developing the annual internal audit plan?

Options:

A.  

Operational management

B.  

External auditors

C.  

The CEO

D.  

Internal assurance providers

Discussion 0
Questions 71

Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?

Options:

A.  

Remote wipe.

B.  

Software encryption.

C.  

Device encryption.

D.  

Authentication.

Discussion 0
Questions 72

An organization was forced to stop production unexpectedly, as raw materials could not be delivered due to a military conflict in the region. Which of the following plans have most likely failed to support the organization?

Options:

A.  

Just-in-time delivery plans.

B.  

Backup plans.

C.  

Contingency plans.

D.  

Standing plans.

Discussion 0
Questions 73

Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.  

Requested backup tapes were not returned from the offsite vendor In a timely manner.

B.  

Returned backup tapes from the offsite vendor contained empty spaces.

C.  

Critical systems have boon backed up more frequently than required.

D.  

Critical system backup tapes are taken off site less frequently than required

Discussion 0
Questions 74

To achieve conformance with the Global Internal Audit Standards, the chief audit executive must include which of the following activities in the quality assurance and improvement program (QAIP)?

Options:

A.  

Require board oversight of the QAIP

B.  

Assess Standards conformance for each individual assurance engagement

C.  

Conduct a self-assessment at least once every five years

D.  

Report the results of the QAIP to the board

Discussion 0
Questions 75

Which of the following is required in effective IT change management?

Options:

A.  

The sole responsibility for change management is assigned to an experienced and competent IT team

B.  

Change management follows a consistent process and is done in a controlled environment.

C.  

Internal audit participates in the implementation of change management throughout the organisation.

D.  

All changes to systems must be approved by the highest level of authority within an organization.

Discussion 0
Questions 76

Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?

Options:

A.  

A flat structure results in lower operating and support costs than a hierarchical structure.

B.  

A flat structure results in a stable and very collaborative environment.

C.  

A flat structure enables field auditors to report to and learn from senior auditors.

D.  

A flat structure is more dynamic and offers more opportunities for advancement than a hierarchical structure.

Discussion 0
Questions 77

During the second half of the audit year, the chief audit executive (CAE) identified significant negative variances to the approved audit budget required to complete the internal audit plan. Which of the following actions should the CAE take?

Options:

A.  

Revise the internal audit plan to reduce coverage of new strategic critical areas so that the approved budget can be met

B.  

Reduce the scope of the remainder of the engagements in the internal audit plan to reduce overall costs

C.  

Communicate to senior management and the board the risk of not being able to complete the audit plan

D.  

Continue to complete the plan regardless of the budget variances, as the audit function is invaluable to sound corporate governance

Discussion 0
Questions 78

During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?

Options:

A.  

Intrinsic reward.

B.  

Job enrichment

C.  

Extrinsic reward.

D.  

The hierarchy of needs.

Discussion 0
Questions 79

What is the first step an internal audit function should take to define its organizational structure, deliverables, communication protocols, and resourcing model?

Options:

A.  

Recommend improvements to the organization’s governance policies, processes, and structures

B.  

Define a hiring plan to address competency gaps needed to execute the audit plan

C.  

Construct periodic self-assessments, ongoing monitoring, and external assessments to measure quality

D.  

Assess the needs and expectations of the board, senior management, and external auditors

Discussion 0
Questions 80

Which of the following statements is true regarding the management-by-objectives method?

Options:

A.  

Management by objectives is most helpful in organizations that have rapid changes.

B.  

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.  

Management by objectives helps organizations to keep employees motivated.

D.  

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.

Discussion 0
Questions 81

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?

Options:

A.  

The auditor eliminated duplicate information

B.  

The auditor organized data to minimize useless information

C.  

The auditor made data usable for a specific purpose by ensuring that anomalies were identified and addressed

D.  

The auditor ensured data fields were consistent and that data could be used for a specific purpose

Discussion 0
Questions 82

Which of the following risks is best addressed by encryption?

Options:

A.  

Information integrity risk.

B.  

Privacy risk.

C.  

Access risk.

D.  

Software risk.

Discussion 0
Questions 83

Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?

Options:

A.  

Gain sharing

B.  

Commission

C.  

Profit sharing

D.  

Pension

Discussion 0
Questions 84

The chief audit executive (CAE) identified an unacceptable risk and believes that the risk is not being mitigated to an acceptable level. Which of the following is the CAE's next step in this situation?

Options:

A.  

Escalate the concern to senior management

B.  

Send a letter to responsible management and provide a deadline to accept the risk

C.  

Escalate the concern to the board

D.  

Discuss the issue with the members of responsible management

Discussion 0
Questions 85

An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?

Options:

A.  

Face or finger recognition equipment,

B.  

Radio-frequency identification chips to authenticate employees with cards.

C.  

A requirement to clock in and clock out with a unique personal identification number.

D.  

A combination of a smart card and a password to clock in and clock out.

Discussion 0
Questions 86

An internal audit function has commenced its annual follow-up activity. An internal auditor has been assigned to verify whether the recommendations from an audit engagement completed three months ago were implemented by the business unit. The auditor had not participated in that audit engagement. What should the auditor do first?

Options:

A.  

Conduct interviews with senior management of the business unit

B.  

Request information from the business unit regarding the corrective actions taken

C.  

Review the previous audit findings and management's response

D.  

Conduct a walkthrough of the business unit

Discussion 0
Questions 87

Which of the following communication characteristics is achieved when the internal audit function avoids redundancies and excludes information that is unnecessary, insignificant, or unrelated to the engagement?

Options:

A.  

Constructive communications

B.  

Complete communications

C.  

Concise communications

D.  

Clear communications

Discussion 0
Questions 88

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?

Options:

A.  

A just-in-time purchasing environment

B.  

A Large volume of custom purchases

C.  

A variable volume sensitive to material cost

D.  

A currently inefficient purchasing process

Discussion 0
Questions 89

Given the information below, which organization is in the weakest position to pay short-term debts?

Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000

Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000

Organization C: Current assets constitute $900,000; Current liabilities are $300,000

Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000

Options:

A.  

Organization A

B.  

Organization B

C.  

Organization C

D.  

Organization D

Discussion 0
Questions 90

Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?

Options:

A.  

Nondisclosure agreements between the firm and its employees.

B.  

Logs of user activity within the information system.

C.  

Two-factor authentication for access into the information system.

D.  

limited access so information, based on employee duties

Discussion 0
Questions 91

Which of the following is true of matrix organizations?

Options:

A.  

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.

B.  

A combination of product and functional departments allows management to utilize personnel from various Junctions.

C.  

Authority, responsibility and accountability of the units Involved may vary based on the project's life, or the organization's culture

D.  

It is best suited for firms with scattered locations or for multi-line, Large-scale firms.

Discussion 0
Questions 92

Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?

Options:

A.  

Lower shareholder control

B.  

lower indebtedness

C.  

Higher company earnings per share.

D.  

Higher overall company earnings

Discussion 0
Questions 93

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

Options:

A.  

The risk that users try to bypass controls and do not install required software updates

B.  

The risk that smart devices can be lost or stolen due to their mobile nature

C.  

The risk that an organization intrusively monitors personal information stored on smart devices

D.  

The risk that proprietary information is not deleted from the device when an employee leaves

Discussion 0
Questions 94

Which of the following is an effective preventive control for data center security?

Options:

A.  

Motion detectors.

B.  

Key card access to the facility.

C.  

Security cameras.

D.  

Monitoring access to data center workstations

Discussion 0
Questions 95

Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?

Options:

A.  

Periodic assessments

B.  

Ongoing monitoring

C.  

Full external assessments

D.  

Self-Assessment with Independent Validation (SAIV)

Discussion 0
Questions 96

Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?

Options:

A.  

UDAs arid traditional JT applications typically follow a similar development life cycle

B.  

A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.

C.  

Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.

D.  

IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.

Discussion 0
Questions 97

According to IIA guidance, which of the following are typical physical and environmental IT controls?

Options:

A.  

Locating servers in locked rooms with restricted admission.

B.  

Applying encryption where confidentiality is a stated requirement.

C.  

Allocating and controlling access rights according to the organization's stated policy.

D.  

Ensuring a tightly controlled process for applying all changes and patches to software, systems, network components, and data.

Discussion 0
Questions 98

The internal auditor concluded there was a high likelihood that a significant wind farm development, worth $200 million, would be delayed from its approved schedule. As a result, electricity production would not start on time, leading to considerable financial penalties. Which of the following should be added to the observation to support its clarity and completeness?

Options:

A.  

The effect of the observation

B.  

The criteria of the observation

C.  

The condition of the observation

D.  

The cause of the observation

Discussion 0
Questions 99

Which of the following describes a third-party network that connects an organization specifically with its trading partners?

Options:

A.  

Value-added network (VAN).

B.  

Local area network (LAN).

C.  

Metropolitan area network (MAN).

D.  

Wide area network (WAN).

Discussion 0
Questions 100

Which of the following is an example of a phishing attack?

Options:

A.  

An organization’s website becomes flooded with malicious traffic on the first day of the online shopping season, causing the website to crash and preventing customers from purchasing deals online

B.  

The employees of a retail organization responded to emails with a link to malware that enabled a hacker to access the point-of-sale system and obtain customers’ credit card information

C.  

An organization’s employees clicked on a link that allowed a worm to infiltrate and encrypt the organization’s operating system, rendering it unusable. A group of hackers is demanding payment to unlock the encryption

D.  

A group of online activists hacked into the private email and confidential records of the local police department and released the information online to expose the corrupt practices of the department

Discussion 0
Questions 101

Which of the following is a characteristic of big data?

Options:

A.  

Big data is being generated slowly due to volume.

B.  

Big data must be relevant for the purposes of organizations.

C.  

Big data comes from a single type of formal.

D.  

Big data is always changing

Discussion 0
Questions 102

Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?

Options:

A.  

Volume.

B.  

Velocity.

C.  

Variety.

D.  

Veracity.

Discussion 0
Questions 103

An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?

Options:

A.  

The organization's operating expenses are increasing.

B.  

The organization has adopted just-in-time inventory.

C.  

The organization is experiencing Inventory theft

D.  

The organization's inventory is overstated.

Discussion 0
Questions 104

An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?

Options:

A.  

Duplicate testing.

B.  

Joining data sources.

C.  

Gap analysis.

D.  

Classification

Discussion 0
Questions 105

An organization selected a differentiation strategy to compete at the business level. Which of the following structures best fits this strategic choice?

Options:

A.  

Functional structure.

B.  

Divisional structure.

C.  

Mechanistic structure.

D.  

Functional structure with cross-functional teams.

Discussion 0
Questions 106

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?

Options:

A.  

Phishing.

B.  

Ransomware.

C.  

Hacking.

D.  

Makvare

Discussion 0
Questions 107

Which of the following documents would provide an internal auditor with information on the length of time to maintain documents after the completion of an engagement?

Options:

A.  

Internal audit charter

B.  

Annual internal audit plan

C.  

Internal audit policies

D.  

Quality assurance and improvement program

Discussion 0
Questions 108

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?

Options:

A.  

The auditor eliminated duplicate information.

B.  

The auditor organized data to minimize useless information.

C.  

The auditor made data usable for a specific purpose by ensuring that anomalies were Identified and corrected.

D.  

The auditor ensured data fields were consistent and that data could be used for a specific purpose.

Discussion 0
Questions 109

Which of the following techniques would best detect an inventory fraud scheme?

Options:

A.  

Analyze Invoice payments just under individual authorization limits.

B.  

Analyze stratification of inventory adjustments by warehouse location.

C.  

Analyze inventory invoice amounts and compare with approved contract amounts.

D.  

Analyze differences discovered during duplicate payment testing

Discussion 0
Questions 110

Which of the following is a characteristic of big data?

Options:

A.  

Big data is often structured.

B.  

Big data analytic results often need to be visualized.

C.  

Big data is often generated slowly and is highly variable.

D.  

Big data comes from internal sources kept in data warehouses.

Discussion 0
Questions 111

An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?

Options:

A.  

Conduct an inventory of access rights of all employees who have changed their position within the last year

B.  

Remove unneeded access rights for uncovered instances and reprimand system administrators for carelessness

C.  

Provide system administrators with job descriptions of employees and let them determine relevant access rights

D.  

Require that access rights to IT systems be ordered by process owners based on user role descriptions

Discussion 0
Questions 112

Which of the following statements is true regarding change management?

Options:

A.  

The degree of risk associated with a proposed change determines whether the change request requires authorization

B.  

Program changes generally are developed and tested in the production environment.

C.  

Changes are only required by software programs

D.  

To protect the production environment, changes must be managed in a repeatable, defined, and predictable manner

Discussion 0
Questions 113

According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?

Options:

A.  

Install and update anti-virus software.

B.  

Implement data encryption techniques.

C.  

Set data availability by user need.

D.  

Upgrade firewall configuration

Discussion 0
Questions 114

A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?

Options:

A.  

Reviewing the customer's wire activity to determine whether the request is typical.

B.  

Calling the customer at the phone number on record to validate the request.

C.  

Replying to the customer via email to validate the sender and request.

D.  

Reviewing the customer record to verify whether the customer has authorized wire requests from that email address.

Discussion 0
Questions 115

The engagement supervisor prepares the final engagement communication for dissemination. Since the chief audit executive (CAE) is on leave, the supervisor is delegated to disseminate the final engagement communication to all relevant parties. Who should be accountable for the final engagement communication?

Options:

A.  

Engagement supervisor

B.  

Chief audit executive

C.  

The board

D.  

The internal audit team

Discussion 0
Questions 116

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

Options:

A.  

Higher cash flow and treasury balances.

B.  

Higher inventory balances

C.  

Higher accounts receivable.

D.  

Higher accounts payable

Discussion 0
Questions 117

An organization's board of directors is particularly focused on positioning, the organization as a leader in the industry and beating the competition. Which of the following strategies offers the greatest alignment with the board's focus?

Options:

A.  

Divesting product lines expected to have negative profitability.

B.  

Increasing the diversity of strategic business units.

C.  

Increasing investment in research and development for a new product.

D.  

Relocating the organization's manufacturing to another country.

Discussion 0
Questions 118

An internal audit team performed an assurance engagement of the organization's IT security. The audit team found significant flaws in the design and implementation of the internal control framework. IT department managers often disagreed with the audit team on the significance of the findings, claiming that the controls in place partly mitigated the risks. Which of the following should be included when communicating the engagement results to senior management?

Options:

A.  

All the correspondence exchanged between the audit team and IT department demonstrating the disagreement

B.  

The audit team's findings and the IT department’s opinion

C.  

Only the audit team's findings and the reasons they require immediate action from senior management

D.  

Only the findings that were agreed upon between the audit team and the IT department

Discussion 0
Questions 119

Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?

Options:

A.  

Predictive analytics.

B.  

Prescriptive analytics.

C.  

Descriptive analytics.

D.  

Diagnostic analytics.

Discussion 0
Questions 120

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

Options:

A.  

An extranet

B.  

A local area network

C.  

An Intranet

D.  

The internet

Discussion 0
Questions 121

Which of the following is an example of an application control?

Options:

A.  

Automated password change requirements.

B.  

System data backup process.

C.  

User testing of system changes.

D.  

Formatted data fields.

Discussion 0
Questions 122

An internal auditor discovered that the organization was not in full compliance with a regulatory labeling requirement for one of its products. The responsible manager indicated that the current product labeling has been in use for several years without any problems. If discovered, this regulatory breach could result in significant fines for the organization. What should be the chief audit executive's next course of action?

Options:

A.  

Discuss the matter with the CEO and other senior management

B.  

Recommend that disciplinary action be taken against the manager for exposing the company to such risk

C.  

Communicate to the board the current situation, including the risk exposure to the company

D.  

Take on the initiative of implementing corrective actions to mitigate the identified risks

Discussion 0
Questions 123

IT governance begins with which of the following activities?

Options:

A.  

Identification of risk-mitigating options.

B.  

Definition of IT objectives.

C.  

Identification of IT risk events.

D.  

Definition of risk response policies.

Discussion 0
Questions 124

How should a chief audit executive learn about emerging risk areas in an organization?

Options:

A.  

Build and maintain a collaborative network with management

B.  

Build an organization-wide risk management process

C.  

Review the organization's procedures for conducting an annual risk assessment

D.  

Review the organization's procedures for establishing its risk appetite

Discussion 0
Questions 125

Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?

Options:

A.  

Scope change requests are reviewed and approved by a manager with a proper level of authority.

B.  

Cost overruns are reviewed and approved by a control committee led by the project manager.

C.  

There is a formal quality assurance process to review scope change requests before they are implemented

D.  

There is a formal process to monitor the status of the project and compare it to the cost baseline

Discussion 0
Questions 126

Which observations should the chief audit executive include in the executive summary of the final engagement communication?

Options:

A.  

All observations

B.  

Only observations with an action plan

C.  

Only significant observations

D.  

Only observations agreed with management

Discussion 0
Questions 127

Internal audit observed an increase in defects of newly installed spare parts. An investigation revealed that vendors delivered spare parts of worse quality than required by contract. Which of the following recommendations would most helpfully mitigate this risk?

Options:

A.  

Add higher level managers to invoice approval process

B.  

Request quality-related confirmations from vendors

C.  

Conduct random inspections and testing of deliveries

D.  

Improve technical specifications of procurement documents

Discussion 0
Questions 128

An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?

Options:

A.  

The organizational chart shows only formal relationships.

B.  

The organizational chart shows only the line of authority.

C.  

The organizational chart shows only the senior management positions.

D.  

The organizational chart is irrelevant when testing the control environment.

Discussion 0
Questions 129

An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?

Options:

A.  

Regular review of logs.

B.  

Two-level authentication.

C.  

Photos on smart cards.

D.  

Restriction of access hours.

Discussion 0
Questions 130

Which of the following security controls would be appropriate to protect the exchange of information?

Options:

A.  

Firewalls.

B.  

Activity logs.

C.  

Antivirus software.

D.  

File encryption.

Discussion 0
Questions 131

Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?

Options:

A.  

Job complicating

B.  

Job rotation

C.  

Job enrichment

D.  

Job enlargement

Discussion 0
Questions 132

While performing an audit of a car tire manufacturing plant, an internal auditor noticed a significant decrease in the number of tires produced from the previous operating

period. To determine whether worker inefficiency caused the decrease, what additional information should the auditor request?

Options:

A.  

Total tire production labor hours for the operating period.

B.  

Total tire production costs for the operating period.

C.  

Plant production employee headcount average for the operating period.

D.  

The production machinery utilization rates.

Discussion 0
Questions 133

Which of the following is a benefit from the concept of Internet of Things?

Options:

A.  

Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.

B.  

Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.

C.  

Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.

D.  

Data mining and data collection from internet and social networks is easier, and the results are more comprehensive

Discussion 0
Questions 134

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

Favorable labor efficiency variance

Adverse labor rate variance

Adverse labor efficiency variance

Favorable labor rate variance

Options:

A.  

1 and 2.

B.  

1 and 4.

C.  

3 and 4.

D.  

2 and 3.

Discussion 0
Questions 135

According to IIA guidance, which of the following statements is true regarding the chief audit executive's (CAE’s) responsibility for following up on management action plans?

Options:

A.  

Follow-up activities must be performed on an ongoing basis, such as quarterly, rather than being scheduled as specific assignments in the internal audit plan

B.  

The primary purpose of the CAE’s follow-up activities is to verify whether the audit issues raised in the audit report are valid

C.  

The CAE may plan follow-up activities on a selective basis, depending on risk significance, to verify whether management action plans were completed

D.  

Where management believes certain action plans are no longer necessary, the CAE must resolve the matter with the board and if the matter remains unresolved, communicate to senior management

Discussion 0
Questions 136

Which of the following characteristics applies to an organization that adopts a flat structure?

Options:

A.  

The structure is dispersed geographically

B.  

The hierarchy levels are more numerous.

C.  

The span of control is wide

D.  

The tower-level managers are encouraged to exercise creativity when solving problems

Discussion 0
Questions 137

An organization suffered significant damage to its local: file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor. Which of the following approaches has been used by the organization?

Options:

A.  

Application management

B.  

Data center management

C.  

Managed security services

D.  

Systems integration

Discussion 0
Questions 138

According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?

Options:

A.  

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations.

B.  

Drafting a strong contract that requires regular vendor control reports end a right-to-audit clause.

C.  

Applying administrative privileges to ensure right to access controls are appropriate.

D.  

Creating a standing cyber-security committee to identify and manage risks related to data security

Discussion 0
Questions 139

Which of the following security controls would provide the most efficient and effective authentication for customers to access these online shopping account?

Options:

A.  

12-digit password feature.

B.  

Security question feature.

C.  

Voice recognition feature.

D.  

Two-level sign-on feature

Discussion 0
Questions 140

The chief audit executive hired a consultant to update the internal audit function’s methodologies. Which of the following would best ensure that the internal audit function will adhere to the updated methodologies?

Options:

A.  

Placing the updated methodologies in an easily accessible location for reference

B.  

Requiring a signed acknowledgment that each auditor will comply with the updated methodologies

C.  

Preparing a recorded training that reviews the updated methodologies

D.  

Sharing a one-page summary of the updated methodologies during an internal audit function meeting

Discussion 0
Questions 141

Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze,

improve, and control. Which of the following best describes this approach?

Options:

A.  

Six Sigma,

B.  

Quality circle.

C.  

Value chain analysis.

D.  

Theory of constraints.

Discussion 0
Questions 142

Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?

Options:

A.  

Predictive analytics

B.  

Prescriptive analytics

C.  

Descriptive analytics

D.  

Diagnostic analytics

Discussion 0
Questions 143

Which of the following statements is true regarding data backup?

Options:

A.  

System backups should always be performed in real-time.

B.  

Backups should be stored in a secured location onsite for easy access.

C.  

The tape rotation schedule affects how long data is retained.

D.  

Backup media should be restored only in case of a hardware or software failure.

Discussion 0
Questions 144

Which of the following is the best example of IT governance controls?

Options:

A.  

Controls that focus on segregation of duties, financial, and change management,

B.  

Personnel policies that define and enforce conditions for staff in sensitive IT areas.

C.  

Standards that support IT policies by more specifically defining required actions

D.  

Controls that focus on data structures and the minimum level of documentation required

Discussion 0
Questions 145

Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?

Options:

A.  

Decentralized

B.  

Centralized

C.  

Departmentalized

D.  

Tall structure

Discussion 0
Questions 146

Which of the following business practices promotes a culture of high performance?

Options:

A.  

Reiterating the importance of compliance with established policies and procedures.

B.  

Celebrating employees' individual excellence.

C.  

Periodically rotating operational managers.

D.  

Avoiding status differences among employees.

Discussion 0
Questions 147

Which of the following is improved by the use of smart devices?

Options:

A.  

Version control

B.  

Privacy

C.  

Portability

D.  

Secure authentication

Discussion 0
Questions 148

Which of the following lists best describes the classification of manufacturing costs?

Options:

A.  

Direct materials, indirect materials, raw materials.

B.  

Overhead costs, direct labor, direct materials.

C.  

Direct materials, direct labor, depreciation on factory buildings.

D.  

Raw materials, factory employees' wages, production selling expenses.

Discussion 0
Questions 149

A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?

Options:

A.  

Lack of coordination among different business units

B.  

Operational decisions are inconsistent with organizational goals

C.  

Suboptimal decision making

D.  

Duplication of business activities

Discussion 0
Questions 150

Management is pondering the following question:

"How does our organization compete?"

This question pertains to which of the following levels of strategy?

Options:

A.  

Functional-level strategy

B.  

Corporate-level strategy.

C.  

Business-level strategy,

D.  

DepartmentsHevet strategy

Discussion 0
Questions 151

The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?

Options:

A.  

To ensure proper segregation of duties

B.  

To create a master repository of user passwords

C.  

To enable monitoring for systems efficiencies

D.  

To enable tracking of privileges granted to users over time

Discussion 0
Questions 152

An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?

Options:

A.  

The auditor is normalizing data in preparation for analyzing it.

B.  

The auditor is analyzing the data in preparation for communicating the results.

C.  

The auditor is cleaning the data in preparation for determining which processes may be involved.

D.  

The auditor is reviewing the data prior to defining the question.

Discussion 0
Questions 153

Which of the following performance measures includes both profits and investment base?

Options:

A.  

Residual income

B.  

A flexible budget

C.  

Variance analysis.

D.  

A contribution margin income statement by segment.

Discussion 0
Questions 154

An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?

Options:

A.  

26 days.

B.  

90 days,

C.  

100 days.

D.  

110 days

Discussion 0