Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Business Knowledge for Internal Auditing Question and Answers

Business Knowledge for Internal Auditing

Last Update Sep 22, 2025
Total Questions : 516

We are offering FREE IIA-CIA-Part3 IIA exam questions. All you do is to just go and sign up. Give your details, prepare IIA-CIA-Part3 free exam questions and then go for complete pool of Business Knowledge for Internal Auditing test questions that will help you more.

IIA-CIA-Part3 pdf

IIA-CIA-Part3 PDF

$42  $104.99
IIA-CIA-Part3 Engine

IIA-CIA-Part3 Testing Engine

$50  $124.99
IIA-CIA-Part3 PDF + Engine

IIA-CIA-Part3 PDF + Testing Engine

$66  $164.99
Questions 1

Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?

Options:

A.  

Lower shareholder control

B.  

lower indebtedness

C.  

Higher company earnings per share.

D.  

Higher overall company earnings

Discussion 0
Questions 2

Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?

Options:

A.  

Measure product performance against an established standard.

B.  

Develop standard methods for performing established activities.

C.  

Require the grouping of activities under a single manager.

D.  

Assign each employee a reasonable workload.

Discussion 0
Questions 3

Which of the following is required in effective IT change management?

Options:

A.  

The sole responsibility for change management is assigned to an experienced and competent IT team

B.  

Change management follows a consistent process and is done in a controlled environment.

C.  

Internal audit participates in the implementation of change management throughout the organisation.

D.  

All changes to systems must be approved by the highest level of authority within an organization.

Discussion 0
Questions 4

A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?

Options:

A.  

The company's code of ethics.

B.  

The third-party management risk register.

C.  

The signed service-level agreement.

D.  

The subcontractors' annual satisfaction survey.

Discussion 0
Questions 5

An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?

Options:

A.  

At fair value with changes reported in the shareholders' equity section.

B.  

At fair value with changes reported in net income.

C.  

At amortized cost in the income statement.

D.  

As current assets in the balance sheet

Discussion 0
Questions 6

Which of the following application controls is the most dependent on the password owner?

Options:

A.  

Password selection.

B.  

Password aging.

C.  

Password lockout.

D.  

Password rotation.

Discussion 0
Questions 7

An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

Options:

A.  

Average cost method

B.  

First-in, first-out (FIFO) method

C.  

Specific identification method

D.  

Activity-based costing method

Discussion 0
Questions 8

Which of the following is an example of a key systems development control typically found in the in-house development of an application system?

Options:

A.  

Logical access controls monitor application usage and generate audit trails.

B.  

The development process is designed to prevent, detect, and correct errors that may occur.

C.  

A record is maintained to track the process of data from input, to output, to storage.

D.  

Business users' requirements are documented, and their achievement is monitored.

Discussion 0
Questions 9

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

Favorable labor efficiency variance

Adverse labor rate variance

Adverse labor efficiency variance

Favorable labor rate variance

Options:

A.  

1 and 2.

B.  

1 and 4.

C.  

3 and 4.

D.  

2 and 3.

Discussion 0
Questions 10

An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recovery solution?

Options:

A.  

Data is synchronized in real time.

B.  

Recovery time is expected to be less than one week.

C.  

Servers are not available and need to be procured.

D.  

Recovery resources and data restore processes have been defined.

Discussion 0
Questions 11

Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?

Options:

A.  

Anti-malware software

B.  

Authentication

C.  

Spyware

D.  

Rooting

Discussion 0
Questions 12

Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?

Options:

A.  

There is a greater need for organizations to rely on users to comply with policies and procedures.

B.  

With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.

C.  

Incident response times are less critical in the BYOD environment compared to a traditional environment.

D.  

There is greater sharing of operational risk in a BYOD environment.

Discussion 0
Questions 13

Which of the following statements is true regarding the capital budgeting procedure known as the discounted payback period?

Options:

A.  

It calculates the overall value of a project.

B.  

It ignores the time value of money.

C.  

It calculates the time a project takes to break even.

D.  

It begins at time zero for the project.

Discussion 0
Questions 14

A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?

Options:

A.  

Cost of sales and net income are understated

B.  

Cost of sales and net income are overstated

C.  

Cost of sales is understated and net income is overstated

D.  

Cost of sales is overstated and net income is understated

Discussion 0
Questions 15

Which of the following security controls would be appropriate to protect the exchange of information?

Options:

A.  

Firewalls.

B.  

Activity logs.

C.  

Antivirus software.

D.  

File encryption.

Discussion 0
Questions 16

Which of the following is a limitation of the remote wipe for a smart device?

Options:

A.  

Encrypted data cannot be locked to prevent further access

B.  

Default settings cannot be restored on the device.

C.  

All data, cannot be completely removed from the device

D.  

Mobile device management software is required for successful remote wipe

Discussion 0
Questions 17

According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?

Options:

A.  

Initiation.

B.  

Planning.

C.  

Execution.

D.  

Monitoring.

Discussion 0
Questions 18

How can the concept of relevant cost help management with behavioral analyses?

Options:

A.  

It explains the assumption mat both costs and revenues are linear through the relevant range

B.  

It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.

C.  

It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions

D.  

It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action

Discussion 0
Questions 19

In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?

Options:

A.  

Vertical integration.

B.  

Unrelated diversification.

C.  

Differentiation

D.  

Focus

Discussion 0
Questions 20

A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?

Options:

A.  

Less than 12 percent.

B.  

12 percent.

C.  

Between 12.01 percent and 12.50 percent.

D.  

More than 12 50 percent.

Discussion 0
Questions 21

At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?

Options:

A.  

Project plan development.

B.  

Project plan execution

C.  

Integrated change control.

D.  

Project quality planning

Discussion 0
Questions 22

An organization contracted a third-party service provider to plan, design, and build a new facility. Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?

Options:

A.  

Cost-plus contract.

B.  

Turnkey contract.

C.  

Service contract.

D.  

Solutions contract.

Discussion 0
Questions 23

During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an Analytics tool to identify the top five vendors that received the highest sum of payments. Which of the following analytics techniques did the auditor apply?

Options:

A.  

Process analysis

B.  

Process mining

C.  

Data analysis.

D.  

Data mining

Discussion 0
Questions 24

Which of the following capital budgeting techniques considers the expected total net cash flows from investment?

Options:

A.  

Cash payback

B.  

Annual rate of return

C.  

Incremental analysis

D.  

Net present value

Discussion 0
Questions 25

What is the primary purpose of data and systems backup?

Options:

A.  

To restore all data and systems immediately after the occurrence of an incident.

B.  

To set the maximum allowable downtime to restore systems and data after the occurrence of an incident.

C.  

To set the point in time to which systems and data must be recovered after the occurrence of an incident.

D.  

To restore data and systems to a previous point in time after the occurrence of an incident

Discussion 0
Questions 26

Which of the following types of budgets will best provide the basis for evaluating the organization's performance?

Options:

A.  

Cash budget.

B.  

Budgeted balance sheet.

C.  

Selling and administrative expense budget.

D.  

Budgeted income statement.

Discussion 0
Questions 27

The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?

Options:

A.  

Commissions.

B.  

Stock options

C.  

Gain-sharing bonuses.

D.  

Allowances

Discussion 0
Questions 28

An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?

Options:

A.  

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.  

Hackers breaching the organization's network to access research and development reports

C.  

A denial-of-service attack that prevents access to the organization's website.

D.  

A hacker accessing she financial information of the company

Discussion 0
Questions 29

Which of the following application controls, implemented by management, monitors data being processed to ensure the data remains consistent and accurate?

Options:

A.  

Management trail controls

B.  

Output controls.

C.  

Integrity controls

D.  

input controls

Discussion 0
Questions 30

An organization suffered significant damage to its local: file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor. Which of the following approaches has been used by the organization?

Options:

A.  

Application management

B.  

Data center management

C.  

Managed security services

D.  

Systems integration

Discussion 0
Questions 31

According to IIA guidance on IT, which of the following best describes a logical access control?

Options:

A.  

Require complex passwords to be established and changed quarterly

B.  

Require swipe cards to control entry into secure data centers.

C.  

Monitor access to the data center with closed circuit camera surveillance.

D.  

Maintain current role definitions to ensure appropriate segregation of duties

Discussion 0
Questions 32

Which of the following backup methodologies would be most efficient in backing up a database in the production environment?

Options:

A.  

Disk mirroring of the data being stored on the database.

B.  

A differential backup that is performed on a weekly basis.

C.  

An array of independent disks used to back up the database.

D.  

An incremental backup of the database on a daily basis.

Discussion 0
Questions 33

Which of the following performance measures disincentives engaging in earnings management?

Options:

A.  

Linking performance to profitability measures such as return on investment.

B.  

Linking performance to the stock price.

C.  

Linking performance to quotas such as units produced.

D.  

Linking performance to nonfinancial measures such as customer satisfaction and employees training

Discussion 0
Questions 34

Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?

Options:

A.  

Whether customers are asked to renew their consent for their data processing at least quarterly.

B.  

Whether private data is processed in accordance with the purpose for which the consent was obtained?

C.  

Whether the organization has established explicit and entitywide policies on data transfer to third parties.

D.  

Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.

Discussion 0
Questions 35

An organization produces products X and Y. The materials used for the production of both products are limited to 500 Kilograms

(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows in order to maximize profit, how much of product Y should the organization produce each month?

$10 $13

2 kg

70 units

6 kg

120 units

Options:

A.  

50 units

B.  

60 units

C.  

70 units

D.  

1:20 units

Discussion 0
Questions 36

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?

Options:

A.  

Phishing.

B.  

Ransomware.

C.  

Hacking.

D.  

Makvare

Discussion 0
Questions 37

Which of the following security controls would be me most effective in preventing security breaches?

Options:

A.  

Approval of identity request

B.  

Access logging.

C.  

Monitoring privileged accounts

D.  

Audit of access rights

Discussion 0
Questions 38

An organization with a stable rating, as assessed by International rating agencies, has issued a bond not backed by assets or collateral. Payments of the interests and the principal to bondholders are guaranteed by the organization. Which type of bond did the organization issue?

Options:

A.  

A sinking fund bond.

B.  

A secured bond.

C.  

A junk bond.

D.  

A debenture bond

Discussion 0
Questions 39

Which of the following is a characteristic of big data?

Options:

A.  

Big data is often structured.

B.  

Big data analytic results often need to be visualized.

C.  

Big data is often generated slowly and is highly variable.

D.  

Big data comes from internal sources kept in data warehouses.

Discussion 0
Questions 40

Which of the following best describes the use of predictive analytics?

Options:

A.  

A supplier of electrical parts analyzed an instances where different types of spare parts were out of stock prior to scheduled deliveries of those parts.

B.  

A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.

C.  

A supplier of electrical parts analyzed all instances of a part being, out of stock poor to its scheduled delivery date and discovered that increases in sales of that part consistently correlated with stormy weather.

D.  

A supplier of electrical parts analyzed sales and stock information and modelled different scenarios for making decisions on stock reordering and delivery

Discussion 0
Questions 41

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?

Options:

A.  

Firewall.

B.  

Encryption.

C.  

Antivirus.

D.  

Biometrics.

Discussion 0
Questions 42

A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?

Options:

A.  

Fixed maintenance costs.

B.  

Variable maintenance costs.

C.  

Mixed maintenance costs.

D.  

Indirect maintenance costs.

Discussion 0
Questions 43

Which of these instances accurately describes the responsibilities for big data governance?

Options:

A.  

Management must ensure information storage systems are appropriately defined and processes to update critical data elements are clear.

B.  

External auditors must ensure that analytical models are periodically monitored and maintained.

C.  

The board must implement controls around data quality dimensions to ensure that they are effective.

D.  

Internal auditors must ensure the quality and security of data, with a heightened focus on the riskiest data elements.

Discussion 0
Questions 44

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?

Options:

A.  

Monitoring network traffic.

B.  

Using whitelists and blacklists to manage network traffic.

C.  

Restricting access and blocking unauthorized access to the network

D.  

Educating employees throughout the company to recognize phishing attacks.

Discussion 0
Questions 45

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?

Options:

A.  

Boundary defense

B.  

Malware defense.

C.  

Penetration tests

D.  

Wireless access controls

Discussion 0
Questions 46

Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?

Options:

A.  

The term describes budgets that exclude fixed costs.

B.  

Flexible budgets exclude outcome projections, which are hard to determine, and instead rely on the most recent actual outcomes.

C.  

The term is a red flag for weak budgetary control activities.

D.  

Flexible budgets project data for different levels of activity.

Discussion 0
Questions 47

Which of the following statements is true regarding activity-based costing (ABC)?

Options:

A.  

An ABC costing system is similar to conventional costing systems in how it treats the allocation of manufacturing overhead.

B.  

An ABC costing system uses a single unit-level basis to allocate overhead costs to products.

C.  

An ABC costing system may be used with either a job order or a process cost accounting system.

D.  

The primary disadvantage of an ABC costing system is less accurate product costing.

Discussion 0
Questions 48

The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

1. Favorable labor efficiency variance.

2. Adverse labor rate variance.

3. Adverse labor efficiency variance.

4. Favorable labor rate variance.

Options:

A.  

1 and 2

B.  

1 and 4

C.  

3 and A

D.  

2 and 3

Discussion 0
Questions 49

According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?

Options:

A.  

Esteem by colleagues.

B.  

Self-fulfillment

C.  

Series of belonging in the organization

D.  

Job security

Discussion 0
Questions 50

A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?

Options:

A.  

Cost of sales and net income are understated.

B.  

Cost of sales and net income are overstated.

C.  

Cost of sales is understated and not income is overstated.

D.  

Cost of sales is overstated and net Income is understated.

Discussion 0
Questions 51

Which of the following is a disadvantage in a centralized organizational structure?

Options:

A.  

Communication conflicts

B.  

Slower decision making.

C.  

Loss of economies of scale

D.  

Vulnerabilities in sharing knowledge

Discussion 0
Questions 52

Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?

Options:

A.  

At the value agreed upon by the partners.

B.  

At book value.

C.  

At fair value

D.  

At the original cost.

Discussion 0
Questions 53

According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?

Options:

A.  

Hot recovery plan

B.  

Warm recovery plan

C.  

Cold recovery plan

D.  

Absence of recovery plan

Discussion 0
Questions 54

A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?

Options:

A.  

Compare to the annual cost of capital

B.  

Compare to the annual interest data.

C.  

Compare to the required rate of return.

D.  

Compare to the net present value.

Discussion 0
Questions 55

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:

A.  

Direct, product costs.

B.  

Indirect product costs.

C.  

Direct period costs,

D.  

Indirect period costs

Discussion 0
Questions 56

Which of the following statements is true regarding cost-volume-profit analysis?

Options:

A.  

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.

B.  

Breakeven point is the amount of units sold to cover variable costs.

C.  

Breakeven occurs when the contribution margin covers fixed costs.

D.  

Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.

Discussion 0
Questions 57

A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?

Options:

A.  

Lack of coordination among different business units

B.  

Operational decisions are inconsistent with organizational goals

C.  

Suboptimal decision making

D.  

Duplication of business activities

Discussion 0
Questions 58

An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?

Options:

A.  

The auditor is normalizing data in preparation for analyzing it.

B.  

The auditor is analyzing the data in preparation for communicating the results,

C.  

The auditor is cleaning the data in preparation for determining which processes may be involves .

D.  

The auditor is reviewing trio data prior to defining the question

Discussion 0
Questions 59

Which of the following statements is true regarding data backup?

Options:

A.  

System backups should always be performed real time.

B.  

Backups should be stored in a secured location onsite for easy access.

C.  

The tape rotation schedule affects how long data is retained

D.  

Backup media should be restored only m case of a hardware or software failure

Discussion 0
Questions 60

Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?

Options:

A.  

Greater cost-effectiveness

B.  

Increased economies of scale

C.  

Larger talent pool

D.  

Strong internal controls

Discussion 0
Questions 61

According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?

Options:

A.  

Project portfolio.

B.  

Project development

C.  

Project governance.

D.  

Project management methodologies

Discussion 0
Questions 62

Which of the following principles s shared by both hierarchies and open organizational structures?

1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.

2. A supervisor's span of control should not exceed seven subordinates.

3. Responsibility should be accompanied by adequate authority.

4. Employees at all levels should be empowered to make decisions.

Options:

A.  

1 and 3 only

B.  

1 and 4 only

C.  

2 and 3 only

D.  

3 and 4 only

Discussion 0
Questions 63

Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?

Options:

A.  

Nondisclosure agreements between the firm and its employees.

B.  

Logs of user activity within the information system.

C.  

Two-factor authentication for access into the information system.

D.  

limited access so information, based on employee duties

Discussion 0
Questions 64

Which of the following is a likely result of outsourcing?

Options:

A.  

Increased dependence on suppliers.

B.  

Increased importance of market strategy.

C.  

Decreased sensitivity to government regulation

D.  

Decreased focus on costs

Discussion 0
Questions 65

When determining the level of physical controls required for a workstation, which of the following factors should be considered?

Options:

A.  

Ease of use.

B.  

Value to the business.

C.  

Intrusion prevention.

D.  

Ergonomic model.

Discussion 0
Questions 66

During a routine bank branch audit, the internal audit function observed that the sole security guard at the branch only worked part time. The chief audit executive (CAE) believed that this increased the risk of loss of property and life in the event of a robbery. The branch security manager informed the CAE that a full-time guard was not needed because the branch was in close proximity to a police station. Still, the CAE found this to be an unacceptable risk due to the recent increase in robberies in that area. Which of the following is the most appropriate next step for the CAE to take?

Options:

A.  

Immediately report the issue to the board to ensure timely corrective actions are taken to resolve the risk

B.  

Continue discussions with the security manager until he is persuaded and agrees to increase branch security

C.  

Document the security manager’s decision to accept the risk in the audit workpapers

D.  

Escalate the issue to the bank’s chief security officer to determine acceptability of the risk

Discussion 0
Questions 67

Which approach should a chief audit executive take when preparing the internal audit plan?

Options:

A.  

Organize the auditable units within the organization into an audit universe to facilitate risk assessment

B.  

Select auditable units within the organization based on monetary values

C.  

Evaluate auditable units based on senior management's information about risks

D.  

Eliminate auditable units not mandated to be audited by laws and regulations applicable to the organization

Discussion 0
Questions 68

In a final audit report, internal auditors drafted the following management action plan with a due date of the last day of the calendar year:

"Plan: A bank reconciliation template has been updated to address issues with formulas incorrectly calculating variances."

Which critical element of the action plan is missing?

Options:

A.  

The responsible personnel

B.  

The status of the action plan

C.  

A referral to the policy or procedure

D.  

The level of risk

Discussion 0
Questions 69

Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?

Options:

A.  

Greater cost-effectiveness

B.  

Increased economies of scale

C.  

Larger talent pool

D.  

Strong internal controls

Discussion 0
Questions 70

Which of the following are the most common characteristics of big data?

Options:

A.  

Visibility, validity, vulnerability

B.  

Velocity, variety, volume

C.  

Complexity, completeness, constancy

D.  

Continuity, control, convenience

Discussion 0
Questions 71

Which of the following statements is most accurate concerning the management and audit of a web server?

Options:

A.  

The file transfer protocol (FTP) should always be enabled

B.  

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts

C.  

The number of ports and protocols allowed to access the web server should be maximized

D.  

Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP

Discussion 0
Questions 72

Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?

Options:

A.  

Board of directors.

B.  

Senior management.

C.  

Chief financial officer.

D.  

Accounting personnel.

Discussion 0
Questions 73

Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?

Options:

A.  

Gain sharing

B.  

Commission

C.  

Profit sharing

D.  

Pension

Discussion 0
Questions 74

What is the primary purpose of an integrity control?

Options:

A.  

To ensure data processing is complete, accurate, and authorized

B.  

To ensure data being processed remains consistent and intact

C.  

To monitor the effectiveness of other controls

D.  

To ensure the output aligns with the intended result

Discussion 0
Questions 75

Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?

Options:

A.  

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room

B.  

Review the password length, frequency of change, and list of users for the workstation’s login process

C.  

Review the list of people who attempted to access the workstation and failed, as well as error messages

D.  

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity

Discussion 0
Questions 76

Which of the following is classified as a product cost using the variable costing method?

Direct labor costs.

Insurance on a factory.

Manufacturing supplies.

Packaging and shipping costs.

Options:

A.  

1 and 2

B.  

1 and 3

C.  

2 and 4

D.  

3 and 4

Discussion 0
Questions 77

Which of the following physical access controls is most likely to be based on the "something you have" concept?

Options:

A.  

A retina characteristics reader.

B.  

A PIN code reader.

C.  

A card-key scanner.

D.  

A fingerprint scanner.

Discussion 0
Questions 78

Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?

Options:

A.  

Higher cash flow and treasury balances.

B.  

Higher inventory balances.

C.  

Higher accounts receivable.

D.  

Higher accounts payable.

Discussion 0
Questions 79

Which of the following is true of matrix organizations?

Options:

A.  

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.

B.  

A combination of product and functional departments allows management to utilize personnel from various functions.

C.  

Authority, responsibility, and accountability of the units involved may vary based on the project's life or the organization's culture.

D.  

It is best suited for firms with scattered locations or for multi-line, large-scale firms.

Discussion 0
Questions 80

An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?

Options:

A.  

A star

B.  

A cash cow

C.  

A question mark

D.  

A dog

Discussion 0
Questions 81

Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?

Options:

A.  

Tampering

B.  

Hacking

C.  

Phishing

D.  

Piracy

Discussion 0
Questions 82

A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?

Options:

A.  

Lack of coordination among different business units

B.  

Operational decisions are inconsistent with organizational goals

C.  

Suboptimal decision-making

D.  

Duplication of business activities

Discussion 0
Questions 83

Which of the following is improved by the use of smart devices?

Options:

A.  

Version control

B.  

Privacy

C.  

Portability

D.  

Secure authentication

Discussion 0
Questions 84

According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?

Options:

A.  

Report identifying data that is outside of system parameters.

B.  

Report identifying general ledger transactions by time and individual.

C.  

Report comparing processing results with original input.

D.  

Report confirming that the general ledger data was processed without error.

Discussion 0
Questions 85

Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?

Options:

A.  

Theory of constraints.

B.  

Just-in-time method.

C.  

Activity-based costing.

D.  

Break-even analysis

Discussion 0
Questions 86

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?

Options:

A.  

The auditor eliminated duplicate information

B.  

The auditor organized data to minimize useless information

C.  

The auditor made data usable for a specific purpose by ensuring that anomalies were identified and addressed

D.  

The auditor ensured data fields were consistent and that data could be used for a specific purpose

Discussion 0
Questions 87

When using data analytics during a review of the procurement process, what is the first step in the analysis process?

Options:

A.  

Identify data anomalies and outliers

B.  

Define questions to be answered

C.  

Identify data sources available

D.  

Determine the scope of the data extract

Discussion 0
Questions 88

According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?

Options:

A.  

Salary and status.

B.  

Responsibility and advancement.

C.  

Work conditions and security.

D.  

Peer relationships and personal life.

Discussion 0
Questions 89

According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?

Options:

A.  

Individual workstation computer controls are not as important as companywide server controls

B.  

Particular attention should be paid to housing workstations away from environmental hazards

C.  

Cybersecurity issues can be controlled at an enterprise level, making workstation-level controls redundant

D.  

With security risks near an all-time high, workstations should not be connected to the company network

Discussion 0
Questions 90

Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?

Options:

A.  

Risk tolerance.

B.  

Performance.

C.  

Threats and opportunities.

D.  

Governance.

Discussion 0
Questions 91

A new manager received computations of the internal rate of return regarding his project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?

Options:

A.  

Compare to the annual cost of capital.

B.  

Compare to the annual interest rate.

C.  

Compare to the required rate of return.

D.  

Compare to the net present value.

Discussion 0
Questions 92

During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?

Options:

A.  

IT application-based controls

B.  

IT systems development controls

C.  

Environmental controls

D.  

IT governance controls

Discussion 0
Questions 93

According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?

Options:

A.  

Formulas and static data are locked or protected.

B.  

The spreadsheet is stored on a network server that is backed up daily.

C.  

The purpose and use of the spreadsheet are documented.

D.  

Check-in and check-out software is used to control versions.

Discussion 0
Questions 94

During which phase of the contracting process are contracts drafted for a proposed business activity?

Options:

A.  

Initiation phase.

B.  

Bidding phase.

C.  

Development phase.

D.  

Management phase.

Discussion 0
Questions 95

Which of the following is an example of a phishing attack?

Options:

A.  

An organization’s website becomes flooded with malicious traffic on the first day of the online shopping season, causing the website to crash and preventing customers from purchasing deals online

B.  

The employees of a retail organization responded to emails with a link to malware that enabled a hacker to access the point-of-sale system and obtain customers’ credit card information

C.  

An organization’s employees clicked on a link that allowed a worm to infiltrate and encrypt the organization’s operating system, rendering it unusable. A group of hackers is demanding payment to unlock the encryption

D.  

A group of online activists hacked into the private email and confidential records of the local police department and released the information online to expose the corrupt practices of the department

Discussion 0
Questions 96

Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?

Options:

A.  

Voice recognition and token

B.  

Password and fingerprint

C.  

Fingerprint and voice recognition

D.  

Password and token

Discussion 0
Questions 97

Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

Options:

A.  

High-yield bonds

B.  

Commodity-backed bonds

C.  

Zero-coupon bonds

D.  

Junk bonds

Discussion 0
Questions 98

According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?

Options:

A.  

Hot recovery plan

B.  

Warm recovery plan

C.  

Cold plan

D.  

Absence of recovery plan

Discussion 0
Questions 99

At one organization, the specific terms of a contract require both the promisor end promise to sign the contract in the presence of an independent witness.

What is the primary role to the witness to these signatures?

Options:

A.  

A witness verifies the quantities of the copies signed.

B.  

A witness verifies that the contract was signed with the free consent of the promisor and promise.

C.  

A witness ensures the completeness of the contract between the promisor and promise.

D.  

A witness validates that the signatures on the contract were signed by tire promisor and promise.

Discussion 0
Questions 100

Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.  

Requested backup tapes were not returned from the offsite vendor In a timely manner.

B.  

Returned backup tapes from the offsite vendor contained empty spaces.

C.  

Critical systems have boon backed up more frequently than required.

D.  

Critical system backup tapes are taken off site less frequently than required

Discussion 0
Questions 101

An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety

The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

Options:

A.  

Average cost method

B.  

First-in, first-out (FIFO) method

C.  

Specific identification method

D.  

Activity-based costing method

Discussion 0
Questions 102

Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?

Options:

A.  

Predictive analytics.

B.  

Prescriptive analytics.

C.  

Descriptive analytics.

D.  

Diagnostic analytics.

Discussion 0
Questions 103

An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?

Options:

A.  

26 days.

B.  

90 days,

C.  

100 days.

D.  

110 days

Discussion 0
Questions 104

An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?

Options:

A.  

Decrease the transfer price

B.  

Increase the transfer price

C.  

Charge at the arm's length price

D.  

Charge at the optimal transfer price

Discussion 0
Questions 105

Which of the following techniques would best detect on inventory fraud scheme?

Options:

A.  

Analyze invoice payments just under individual authorization limits.

B.  

Analyze stratification of inventory adjustments by warehouse location.

C.  

Analyze Inventory Invoice amounts and compare with approved contract amounts.

D.  

Analyze differences discovered curing duplicate payment testing.

Discussion 0
Questions 106

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

Options:

A.  

Higher cash flow and treasury balances.

B.  

Higher inventory balances

C.  

Higher accounts receivable.

D.  

Higher accounts payable

Discussion 0
Questions 107

Which of the following is a systems software control?

Options:

A.  

Restricting server room access to specific individuals

B.  

Housing servers with sensitive software away from environmental hazards

C.  

Ensuring that all user requirements are documented

D.  

Performing of intrusion testing on a regular basis

Discussion 0
Questions 108

Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?

Options:

A.  

Clothing company designs, makes, and sells a new item.

B.  

A commercial construction company is hired to build a warehouse.

C.  

A city department sets up a new firefighter training program.

D.  

A manufacturing organization acquires component parts from a contracted vendor

Discussion 0
Questions 109

An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal

Auditor be most concerned about?

Options:

A.  

Compliance.

B.  

Privacy

C.  

Strategic

D.  

Physical security

Discussion 0
Questions 110

Which of the following should be included in a data privacy poky?

1. Stipulations for deleting certain data after a specified period of time.

2. Guidance on acceptable methods for collecting personal data.

3. A requirement to retain personal data indefinitely to ensure a complete audit trail,

4. A description of what constitutes appropriate use of personal data.

Options:

A.  

1 and 2 only

B.  

2 and 3 only

C.  

1, 2 and 4 only

D.  

2, 3, and 4 only

Discussion 0
Questions 111

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

Options:

A.  

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.  

Review the password length, frequency of change, and list of users for the workstation's login process.

C.  

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.  

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity

Discussion 0
Questions 112

Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?

Options:

A.  

Risk tolerance

B.  

Performance

C.  

Threats and opportunities

D.  

Governance

Discussion 0
Questions 113

A one-time password would most likely be generated in which of the following situations?

Options:

A.  

When an employee accesses an online digital certificate

B.  

When an employee's biometrics have been accepted.

C.  

When an employee creates a unique digital signature,

D.  

When an employee uses a key fob to produce a token.

Discussion 0
Questions 114

What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?

Options:

A.  

Export strategy.

B.  

Transnational strategy

C.  

Multi-domestic strategy

D.  

Globalization strategy

Discussion 0
Questions 115

Which of the following responsibilities would ordinary fall under the help desk function of an organization?

Options:

A.  

Maintenance service items such as production support.

B.  

Management of infrastructure services, including network management.

C.  

Physical hosting of mainframes and distributed servers

D.  

End-to -end security architecture design.

Discussion 0
Questions 116

Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?

Options:

A.  

Job complicating

B.  

Job rotation

C.  

Job enrichment

D.  

Job enlargement

Discussion 0
Questions 117

Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?

Options:

A.  

Anti-malware software

B.  

Authentication

C.  

Spyware

D.  

Rooting

Discussion 0
Questions 118

While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?

Options:

A.  

Review the call center script used by customer service agents to interact with callers, and update the script if necessary.

B.  

Be-emphasize the importance of call center employees completing a certain number of calls per hour.

C.  

Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.

D.  

Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily

Discussion 0
Questions 119

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?

Options:

A.  

The auditor eliminated duplicate information.

B.  

The auditor organized data to minimize useless information.

C.  

The auditor made data usable for a specific purpose by ensuring that anomalies were Identified and corrected.

D.  

The auditor ensured data fields were consistent and that data could be used for a specific purpose.

Discussion 0
Questions 120

How do data analysis technologies affect internal audit testing?

Options:

A.  

They improve the effectiveness of spot check testing techniques.

B.  

They allow greater insight into high risk areas.

C.  

They reduce the overall scope of the audit engagement,

D.  

They increase the internal auditor's objectivity.

Discussion 0
Questions 121

Which of the following security controls focuses most on prevention of unauthorized access to the power plant?

Options:

A.  

An offboarding procedure is initiated monthly to determine redundant physical access rights.

B.  

Logs generated by smart locks are automatically scanned to identify anomalies in access patterns.

C.  

Requests for additional access rights are sent for approval and validation by direct supervisors.

D.  

Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours

Discussion 0
Questions 122

Which of the following is a necessary action for an internal audit function if senior management chooses not to take action to remediate the finding and accepts the risk?

Options:

A.  

The chief audit executive (CAE) must discuss this disagreement with senior management and communicate this information to external stakeholders

B.  

The CAE must include this disagreement in the final audit report and conclude the engagement

C.  

The CAE must make a judgment regarding the prudence of that decision and report to the board if needed

D.  

The CAE must establish a follow-up process to monitor the acceptable risk level as part of the engagement

Discussion 0
Questions 123

A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?

Options:

A.  

Incremental processing costs, incremental revenue, and variable manufacturing expenses.

B.  

Joint costs, incremental processing costs, and variable manufacturing expenses.

C.  

Incremental revenue, joint costs, and incremental processing costs.

D.  

Variable manufacturing expenses, incremental revenue, and joint costs

Discussion 0
Questions 124

Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and

telecommunications, but does not have servers or infrastructure equipment?

Options:

A.  

Frozen site

B.  

Cold site

C.  

Warm site

D.  

Hot site

Discussion 0
Questions 125

In light of increasing emission taxes in the European Union, a car manufacturer introduced a new middle-class hybrid vehicle specifically for the European market only. Which of the following competitive strategies has the manufacturer used?

Options:

A.  

Reactive strategy.

B.  

Cost leadership strategy.

C.  

Differentiation strategy.

D.  

Focus strategy

Discussion 0
Questions 126

Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the

following would be a characteristic of the now highly centralized organization?

Options:

A.  

Top management does little monitoring of the decisions made at lower levels.

B.  

The decisions made at the lower levels of management are considered very important.

C.  

Decisions made at lower levels in the organizational structure are few.

D.  

Reliance is placed on top management decision making by few of the organization's departments.

Discussion 0
Questions 127

After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.

Which of the following is the most likely control weakness demonstrated by the seller?

Options:

A.  

Excessive collecting of information

B.  

Application of social engineering

C.  

Retention of incomplete information.

D.  

Undue disclosure of information

Discussion 0
Questions 128

Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze,

improve, and control. Which of the following best describes this approach?

Options:

A.  

Six Sigma,

B.  

Quality circle.

C.  

Value chain analysis.

D.  

Theory of constraints.

Discussion 0
Questions 129

Management decides to accept the risk on a significant audit observation related to the organization's exposure to fraud risk. The chief audit executive considers the finding to have a high residual risk. Which of the following steps should be performed last?

Options:

A.  

Gather risk appetite data

B.  

Inform the internal legal counsel

C.  

Inform the board

D.  

Consult with the organization's regulators

Discussion 0
Questions 130

According to IIA guidance, whose input must be considered when developing the annual internal audit plan?

Options:

A.  

Operational management

B.  

External auditors

C.  

The CEO

D.  

Internal assurance providers

Discussion 0
Questions 131

Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?

Options:

A.  

Draft separate audit reports for business and IT management.

B.  

Conned IT audit findings to business issues.

C.  

Include technical details to support IT issues.

D.  

Include an opinion on financial reporting accuracy and completeness.

Discussion 0
Questions 132

Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?

Options:

A.  

Only preventive measures.

B.  

Alternative and reactive measures.

C.  

Preventive and alternative measures.

D.  

Preventive and reactive measures.

Discussion 0
Questions 133

An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?

Options:

A.  

A balanced scorecard.

B.  

A quality audit

C.  

Earned value analysis.

D.  

Trend analysis

Discussion 0
Questions 134

Which of the following statements about assurance maps is true?

Options:

A.  

They help identify gaps and duplications in an organization’s assurance coverage

B.  

They allow the board to coordinate activities of internal and external assurance providers

C.  

They help identify which assurance provider is responsible for performing each audit listed in the annual internal audit plan

D.  

They allow internal auditors to map competencies and specialty areas of the assurance providers in an organization

Discussion 0
Questions 135

When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?

Options:

A.  

Whether every call that the service provider received was logged by the help desk.

B.  

Whether a unique identification number was assigned to each issue identified by the service provider

C.  

Whether the service provider used its own facilities to provide help desk services

D.  

Whether the provider's responses and resolutions were well defined according to the service-level agreement.

Discussion 0
Questions 136

Which of the following would be most likely found in an internal audit procedures manual?

Options:

A.  

A summary of the strategic plan of the area under review

B.  

Appropriate response options for when findings are disputed by management

C.  

An explanation of the resources needed for each engagement

D.  

The extent of the auditor's authority to collect data from management

Discussion 0
Questions 137

How can the chief audit executive best provide the internal audit function with the resources needed to fulfill the annual audit plan?

Options:

A.  

Improve skills by strengthening staff competencies

B.  

Map the audit risk assessment to the organization's strategic plan

C.  

Collaborate with other risk management functions in the organization

D.  

Refine its audit processes according to the Global Internal Audit Standards

Discussion 0
Questions 138

Several organizations have developed a strategy to open co-owned shopping malls. What would be the primary purpose of this strategy?

Options:

A.  

To exploit core competence.

B.  

To increase market synergy.

C.  

To deliver enhanced value.

D.  

To reduce costs.

Discussion 0
Questions 139

Which of the following is a characteristic of using a hierarchical control structure?

Options:

A.  

Less use of policies and procedures.

B.  

Less organizational commitment by employees.

C.  

Less emphasis on extrinsic rewards.

D.  

Less employee’s turnover.

Discussion 0
Questions 140

According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?

Options:

A.  

A revenue calculation spreadsheet supported with price and volume reports from the production department.

B.  

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions.

C.  

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantities.

D.  

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances

Discussion 0
Questions 141

Which of the following attributes of data are cybersecurity controls primarily designed to protect?

Options:

A.  

Veracity, velocity, and variety.

B.  

Integrity, availability, and confidentiality.

C.  

Accessibility, accuracy, and effectiveness.

D.  

Authorization, logical access, and physical access.

Discussion 0
Questions 142

During an internal audit engagement, numerous deficiencies in the organization's management of customer data were discovered, entailing the risk of breaching personal data protection legislation. An improvement plan was approved by senior management. Which of the following conditions observed during the periodic follow-up process best justifies the chief audit executive's decision to escalate the issue to the board?

Options:

A.  

The organization's customer satisfaction index does not show any signs of improvement

B.  

No budget or resources have been allocated to implement corrective measures

C.  

The board has not been informed about the planned improvements approved by senior management

D.  

Employees responsible for improvements are resisting any additional workload

Discussion 0
Questions 143

Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?

Options:

A.  

Deploys data visualization tool.

B.  

Adopt standardized data analysis software.

C.  

Define analytics objectives and establish outcomes.

D.  

Eliminate duplicate records.

Discussion 0
Questions 144

A significant project is nearing its development stage end, and line management intends to apply for a final investment decision from senior management at an upcoming meeting. The internal audit function is at the fieldwork stage of an assurance engagement related to this project and discovers that tenders conducted for the project were not carried out transparently by line management. The audit report will not be ready by the upcoming senior management meeting. Which of the following actions is the most appropriate next step for the chief audit executive?

Options:

A.  

Escalate the issue to the chief risk officer

B.  

Raise the issue with senior management

C.  

Continue with the assurance engagement as planned

D.  

Place the assurance engagement on hold due to inappropriate timing

Discussion 0
Questions 145

Through meetings with management, an organization's chief audit executive (CAE) learns of a risk that exceeds the established risk tolerance. What would be an appropriate next action for the CAE to take?

Options:

A.  

Design and recommend an appropriate response to the risk

B.  

Discuss the risk and the implications of the risk with management responsible for the risk area

C.  

Schedule an audit of the risk area to assess the risk likelihood and impact

D.  

Prepare a memo to report the risk to the board

Discussion 0
Questions 146

The finance department of an organization recently undertook an asset verification exercise. The internal audit function scheduled a review of the IT department’s operations, which includes verifying the existence of computers distributed and their assignment. Can the internal audit function consider relying on the asset verification work performed by the finance department?

Options:

A.  

Yes, in order to be efficient and make better use of internal audit resources

B.  

No, as the finance department is an internal department of the organization

C.  

Yes, but the finance manager would be responsible for supporting the conclusions of the work

D.  

No, the internal audit function should do its own verification and should not rely on the work of finance

Discussion 0
Questions 147

According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?

Options:

A.  

HTTP sites provide sufficient security to protect customers' credit card information.

B.  

Web servers store credit cardholders' information submitted for payment.

C.  

Database servers send cardholders’ information for authorization in clear text.

D.  

Payment gatewaysauthorizecredit cardonlinepayments.

Discussion 0
Questions 148

During an audit of the payroll system, the internal auditor identifies and documents the following condition:

"Once a user is logged into the system, the user has access to all functionality within the system."

What is the most likely root cause for tins issue?

Options:

A.  

The authentication process relies on a simple password only, which is a weak method of authorization.

B.  

The system authorization of the user does not correctly reflect the access rights intended.

C.  

There was no periodic review to validate access rights.

D.  

The application owner apparently did not approve the access request during the provisioning process.

Discussion 0
Questions 149

An internal auditor uses a risk and control questionnaire as part of the preliminary survey for an audit of the organization's anti-bribery and corruption program. What is the primary purpose of using this approach?

Options:

A.  

To compare records from one source to subsequently prepared records about the anti-bribery program

B.  

To ascertain the existence of certain controls in the organization's anti-bribery program

C.  

To obtain testimonial information about certain controls in the organization's anti-bribery program

D.  

To validate control information through outside parties independent of the anti-bribery program

Discussion 0
Questions 150

A newly hired chief audit executive (CAE) reviews and will revise the existing internal audit strategy. What should the CAE initially refer to when revising the internal audit strategy?

Options:

A.  

Legal and regulatory requirements

B.  

Organization-wide risk assessment results

C.  

Key internal control activities

D.  

Organizational business objectives

Discussion 0
Questions 151

Which of the following is a benefit from the concept of Internet of Things?

Options:

A.  

Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.

B.  

Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.

C.  

Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.

D.  

Data mining and data collection from internet and social networks is easier, and the results are more comprehensive

Discussion 0
Questions 152

Which of the following communication characteristics is achieved when the internal audit function avoids redundancies and excludes information that is unnecessary, insignificant, or unrelated to the engagement?

Options:

A.  

Constructive communications

B.  

Complete communications

C.  

Concise communications

D.  

Clear communications

Discussion 0
Questions 153

Which of the following best describes owner's equity?

Options:

A.  

Assets minus liabilities.

B.  

Total assets.

C.  

Total liabilities.

D.  

Owners contribution plus drawings.

Discussion 0
Questions 154

When auditing the account receivables for the first time, an internal auditor noted that the finance team had not—over many accounting periods—reviewed the accounts receivables for debts that could no longer be collected. How should the auditor proceed?

Options:

A.  

Escalate the finding to the board, due to the significance of the risk

B.  

Recommend that management review the receivables for debts that can no longer be collected and remove them from the cash flow statement

C.  

Recommend that management review the receivables for debts that can no longer be collected and write them off

D.  

Document the finding and conclude that no immediate action is warranted, as bad debt allowances are merely estimates

Discussion 0