Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

IIA-CIA-Part3-3P Sample Questions Answers

Questions 4

According to IIA guidance, which of the following corporate social responsibility (CSR) activities is appropriate for the internal audit activity to perform?

Options:

A.

Determine the optimal amount of resources for the organization to invest in CSR.

B.

Align CSR program objectives with the organization's strategic plan.

C.

Integrate CSR activities into the organization's decision-making process.

D.

Determine whether the organization has an appropriate policy governing its CSR activities.

Buy Now
Questions 5

All of the following are possible explanations for a significant unfavorable material efficiency variance except:

Options:

A.

Cutbacks in preventive maintenance.

B.

An inadequately trained and supervised labor force.

C.

A large number of rush orders.

D.

Production of more units than planned for in the master budget.

Buy Now
Questions 6

An internal auditor has been asked to conduct an investigation involving allegations of independent contractor fraud. Which of the following controls would be least effective in detecting any potential fraudulent activity?

Options:

A.

Exception report identifying payment anomalies.

B.

Documented policy and procedures.

C.

Periodic account reconciliation of contractor charges.

D.

Monthly management review of all contractor activity.

Buy Now
Questions 7

An organization produces two products, X and Y. The materials used for the production of both products are limited to 500 kilograms (kg) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows:

Product X

Product Y

Selling price per unit

$10

$13

Materials per unit (at $1/kg)

2 kg

6 kg

Monthly demand

100 units

120 units

In order to maximize profit, how much of product Y should the organization produce each month?

Options:

A.

50 units.

B.

60 units.

C.

100 units.

D.

120 units.

Buy Now
Questions 8

Which of the following is useful for forecasting the required level of inventory?

1) Statistical modeling.

2) Information about seasonal variations in demand.

3) Knowledge of the behavior of different business cycles.

4) Pricing models linked to seasonal demand.

Options:

A.

1 and 2 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, 3, and 4

Buy Now
Questions 9

A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software

that will remotely wipe data in case of theft or other incidents.

Which of the following should the organization ensure in exchange for the employees' consent?

Options:

A.

That those employees who do not consent to MDM software cannot have an email account.

B.

That personal data on the device cannot be accessed and deleted by system administrators.

C.

That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.

D.

That employee consent includes appropriate waivers regarding potential breaches to their privacy.

Buy Now
Questions 10

Which of the following statements is true regarding an organization's servers?

Options:

A.

Servers optimize data processing by sharing it with other computers on the information system

B.

Servers manage the interconnectivity of system hardware devices in the information system.

C.

Servers manage the data stored in databases residing on the information system.

D.

Servers enforce access controls between networks transmitting data on the information system

Buy Now
Questions 11

Which of the following security controls would provide the most efficient and effective authentication for customers to access their online shopping account?

Options:

A.

12-digit password feature.

B.

Security question feature.

C.

Voice recognition feature.

D.

Two-level sign-on feature.

Buy Now
Questions 12

When using cost-volume-profit analysts which of the following will increase operating income once the break-even point has been reached?

Options:

A.

Fixed costs per unit for each additional unit sold

B.

Variable costs per unit for each additional unit sold

C.

Contribution margin per unit for each additional unit sold

D.

Gross margin per unit for each additional unit sold

Buy Now
Questions 13

Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?

Options:

A.

Cost method

B.

Equity method

C.

Consolidation method

D.

Fair value method

Buy Now
Questions 14

A bank uses customer departmentalization to categorize its departments. Which of the following groups best exemplifies this method of categorization?

Options:

A.

Community institutional and agricultural banking.

B.

Mortgages credit cards and savings

C.

South southwest and east.

D.

Teller manager and IT specialist

Buy Now
Questions 15

Which of the following is most important for an internal auditor to check with regard to the database version?

Options:

A.

Verify whether the organization uses the most recent database software version

B.

Verify whether the database software version is supported by the vendor.

C.

Verify whether the database software version has been recently upgraded

D.

Verify whether access to database version information is appropriately restricted

Buy Now
Questions 16

Which of the following recognized competitive strategies focuses on gaining efficiencies?

Options:

A.

Focus

B.

Cost leadership

C.

Innovation

D.

Differentiation

Buy Now
Questions 17

Which of the following application controls verifies the accuracy of transaction results in a system?

Options:

A.

Input controls

B.

Output controls

C.

Processing controls

D.

Integrity controls

Buy Now
Questions 18

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

Options:

A.

The risk that users try to bypass controls and do not install required software updates.

B.

The risk that smart devices can be lost or stolen due to their mobile nature.

C.

The risk that an organization intrusively monitors personal information stored on smart devices.

D.

The risk that proprietary information is not deleted from the device when an employee leaves.

Buy Now
Questions 19

Which of the following would most likely be found in an organization that uses a decentralized organizational structured?

Options:

A.

There is a higher reliance on organizational culture

B.

There are clear expectations set for employees

C.

There are electronic monitoring techniques employed

D.

There is a defined code for employee behavior

Buy Now
Questions 20

Which of me following application controls is the most dependent on the password owner?

Options:

A.

Password selection

B.

Password aging

C.

Password lockout

D.

Password rotation

Buy Now
Questions 21

When attempting to devise creative solutions to problems, team members initially should do which of the following?

Options:

A.

Suspend assumptions and negative feedback

B.

Weight suggestions based on the speaker's level of authority.

C.

Discuss the details of all options presented

D.

Provide documentation to support their positions

Buy Now
Questions 22

Which of the following is a security feature that involves the use of hardware and software to fitter or prevent specific information from moving between the outside network and the outside network?

Options:

A.

Authorization

B.

Architecture model

C.

Firewall

D.

Virtual private network

Buy Now
Questions 23

Which of the following application controls checks the integrity of data entered into a business application?

Options:

A.

Input controls.

B.

Output controls

C.

Processing controls

D.

Integrity controls

Buy Now
Questions 24

Which of the following describes a typical desktop workstation used by most employees in their daily work?

Options:

A.

Workstation contains software that prevents unauthorized transmission of information into and out of the organization's network.

B.

Workstation contains software that controls information flow between the organization's network and the Internet.

C.

Workstation contains software that enables the processing of transactions and is not shared among users of the organization's network.

D.

Workstation contains software that manages user's access and processing of stored data on the organization's network.

Buy Now
Questions 25

In an organization where enterprise risk management practices are mature, which of the following is a core internal audit role?

Options:

A.

Giving assurance that risks are evaluated correctly.

B.

Developing the risk management strategy for the board's approval.

C.

Facilitating the identification and evaluation of risks.

D.

Coaching management in responding to risk.

Buy Now
Questions 26

Which of the following is a disadvantage of selecting a commercial software package rather than developing an application internally?

Options:

A.

Lack of flexibility.

B.

Incompatibility with client/server technology.

C.

Employee resistance to change.

D.

Inadequate technical support.

Buy Now
Questions 27

Which of the following conditions could lead an organization to enter into a new business through internal development rather than through acquisition?

Options:

A.

It is expected that there will be slow retaliation from incumbents.

B.

The acquiring organization has information that the selling organization is weak.

C.

The number of bidders to acquire the organization for sale is low.

D.

The condition of the economy is poor.

Buy Now
Questions 28

During the last year, an organization had an opening inventory of $300,000, purchases of $980,000, sales of $1,850,000, and a gross margin of 40 percent. What is the closing inventory if the periodic inventory system is used?

Options:

A.

$170,000

B.

$280,000

C.

$300,000

D.

$540,000

Buy Now
Questions 29

The percentage of sales method, rather than the percentage of receivables method, would be used to estimate uncollectible accounts if an organization seeks to:

Options:

A.

Use an aging schedule to more closely estimate uncollectible accounts.

B.

Eliminate the need for an allowance for doubtful accounts.

C.

Emphasize the accuracy of the net realizable value of the receivables on the balance sheet.

D.

Use a method that approximates the matching principle.

Buy Now
Questions 30

A global business organization is selecting managers to post to various international (expatriate) assignments.

In the screening process, which of the following traits would be required to make a manager a successful expatriate?

1) Superior technical competence.

2) Willingness to attempt to communicate in a foreign language.

3) Ability to empathize with other people.

Options:

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 3 only

D.

1, 2, and 3

Buy Now
Questions 31

According to Porter, which of the following is associated with fragmented industries?

Options:

A.

Weak entrance barriers.

B.

Significant scale economies.

C.

Steep experience curve.

D.

Strong negotiation power with suppliers.

Buy Now
Questions 32

Which of the following is the best reason for considering the acquisition of a nondomestic organization?

Options:

A.

Relatively fast market entry.

B.

Improved cash flow of the acquiring organization.

C.

Increased diversity of corporate culture.

D.

Opportunity to influence local government policy.

Buy Now
Questions 33

An organization needs to borrow a large amount of cash to fund its expansion plan. Which of the following annual interest rates is least expensive?

Options:

A.

7 percent simple interest with a 10 percent compensating balance.

B.

7 percent simple interest paid at the end of each year.

C.

7 percent discount interest.

D.

7 percent compounding interest.

Buy Now
Questions 34

Which of the following are appropriate functions for an IT steering committee?

1) Assess the technical adequacy of standards for systems design and programming.

2) Continually monitor of the adequacy and accuracy of software and hardware in use.

3) Assess the effects of new technology on the organization`s IT operations.

4) Provide broad oversight of implementation, training, and operation of new systems.

Options:

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Buy Now
Questions 35

According to the waterfall cycle approach to systems development, which of the following sequence of events is correct?

Options:

A.

Program design, system requirements, software design, analysis, coding, testing, operations.

B.

System requirements, software design, analysis, program design, testing, coding, operations.

C.

System requirements, software design, analysis, program design, coding, testing, operations.

D.

System requirements, analysis, coding, software design, program design, testing, operations.

Buy Now
Questions 36

Which of the following is false with regard to Internet connection firewalls?

Options:

A.

Firewalls can protect against computer viruses.

B.

Firewalls monitor attacks from the Internet.

C.

Firewalls provide network administrators tools to retaliate against hackers.

D.

Firewalls may be software-based or hardware-based.

Buy Now
Questions 37

The first stage in the development of a crisis management program is to:

Options:

A.

Formulate contingency plans.

B.

Conduct a risk analysis.

C.

Create a crisis management team.

D.

Practice the response to a crisis.

Buy Now
Questions 38

During a review of a web-based application used by customers to check the status of their bank accounts, it would be most important for the internal auditor to ensure that:

Options:

A.

Access to read application logs is restricted to authorized users.

B.

Account balance information is encrypted in the database.

C.

The web server used to host the application is located in a physically secure area.

D.

Sensitive data, such as account numbers, are submitted using encrypted communications.

Buy Now
Questions 39

An organization uses a database management system (DBMS) as a repository for data. The DBMS, in turn, supports a number of end-user developed applications which were created using fourth-generation programming languages. Some of the applications update the database. Which of the following is the most important control related to the integrity of the data in the database?

Options:

A.

End users have their read-only applications approved by the information systems department before accessing the database.

B.

Concurrency update controls are in place.

C.

End-user applications are developed on personal computers before being implemented on the

mainframe.

D.

A hierarchical database model is adopted so that multiple users can be served at the same time.

Buy Now
Questions 40

Which of the following is a limiting factor for capacity expansion?

Options:

A.

Government pressure on organizations to increase or maintain employment.

B.

Production orientation of management.

C.

Lack of credible market leader in the industry.

D.

Company diversification.

Buy Now
Questions 41

Which of the following statements accurately describes the responsibility of the internal audit activity (IAA) regarding IT governance?

1) The IAA does not have any responsibility because IT governance is the responsibility of the board and senior management of the organization.

2) The IAA must assess whether the IT governance of the organization supports the organization’s strategies and objectives.

3) The IAA may assess whether the IT governance of the organization supports the organization’s strategies and objectives.

4) The IAA may accept requests from management to perform advisory services regarding how the IT governance of the organization supports the organization’s strategies and objectives.

Options:

A.

1 only

B.

4 only

C.

2 and 4

D.

3 and 4

Buy Now
Questions 42

Which of the following statements is true regarding an organization's inventory valuation1?

Options:

A.

The valuation will be incorrect it the inventory includes goods m transit shipped free on board (FOB) destination to another organization

B.

The valuation will be correct if the inventory includes goods received on consignment from another organization

C.

The valuation will be incorrect it the inventory includes goods in transit shipped FOB shipping point from another organization

D.

The valuation will be correct it the inventory includes goods sent on consignment to another

organization

Buy Now
Questions 43

Which of the following statements is true regarding the risks associated with the increased use of smart devices at work?

Options:

A.

Due to their small size and portability smart devices and their associated data are typically less susceptible to physical loss

B.

The Bluetooth and WI-FI features of smart devices enhance the security of data while in transit

C.

The global positioning system (GPS) capability of smart devices could be exploited to plan cyberattacks

D.

When the user fads to perform jailbreaking or rooting, data security and privacy risks we increased

Buy Now
Questions 44

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organization's systems?

Options:

A.

Boundary defense.

B.

Malware defense.

C.

Penetration tests.

D.

Wireless access controls.

Buy Now
Questions 45

Which of the following IT disaster recovery plans includes a remote site designated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?

Options:

A.

Frozen site.

B.

Cold site.

C.

Warm site.

D.

Hot site.

Buy Now
Questions 46

According to IIA guidance, which of the following is a primary component of a network security strategy?

Options:

A.

Application input controls

B.

Firewall controls.

C.

Transmission encryption controls

D.

Change management controls

Buy Now
Questions 47

In terms of international business strategy, which of the following is true regarding a multi-domestic strategy?

Options:

A.

It uses the same products in all countries.

B.

It centralizes control with little decision-making authority given to the local level.

C.

It is an effective strategy when large differences exist between countries.

D.

It provides cost advantages, improves coordinated activities, and speeds product development.

Buy Now
Questions 48

Which of the following is a characteristic of just-in-time inventory management systems?

Options:

A.

Users determine the optimal level of safety stocks.

B.

They are applicable only to large organizations.

C.

They do not really increase overall economic efficiency because they merely shift inventory levels further up the supply chain.

D.

They rely heavily on high quality materials.

Buy Now
Questions 49

A manager has difficulty motivating staff to improve productivity, despite establishing a lucrative individual reward system. Which of the following is most likely the cause of the difficulty?

Options:

A.

High degree of masculinity.

B.

Low uncertainty avoidance.

C.

High collectivism.

D.

Low long-term orientation.

Buy Now
Questions 50

Which of the following does not provide operational assurance that a computer system is operating properly?

Options:

A.

Performing a system audit.

B.

Making system changes.

C.

Testing policy compliance.

D.

Conducting system monitoring.

Buy Now
Questions 51

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational

capability in the event of a disaster.

Which of the following best describes this approach to disaster recovery planning?

Options:

A.

Cold recovery plan.

B.

Outsourced recovery plan.

C.

Storage area network recovery plan.

D.

Hot recovery plan.

Buy Now
Questions 52

Which of the following cybersecurity-related activities is most likely to be performed by the second line of defense?

Options:

A.

Deploy intrusion detection systems and conduct penetration testing

B.

Administer security procedures, training, and testing.

C.

Monitor incidents, key risk indicators, and remediation

D.

implement vulnerability management with internal and external scans.

Buy Now
Questions 53

According to IIA guidance, which of the following is the correct order to conduct a business impact analysis (BIA) for the potential loss of an organization's network services''

1. identify resources and partners to provide required recovery services

2. Identify the business processes supporting the network functionality

3. Obtain approval of the BIA from the operating managers relative to their areas of responsibility

4. Identify the business impact if the network services cannot be performed

Options:

A.

1, 2, 3, 4

B.

2, 1, 4, 3

C.

2, 4, 1, 3

D.

4, 2, 1, 3

Buy Now
Questions 54

Which of the following is an example of a physical control?

Options:

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization's critical data

Buy Now
Questions 55

An organization's network administrator received an email that appeared to come from the organization's external IT service provider requesting his credentials to perform an update of a server operating system If the IT service provider did not send the email, which of the following best describes the likely purpose of the email?

Options:

A.

An attempt at phishing.

B.

An attempt at penetration testing

C.

An attempt to patch the server

D.

An attempt to launch malware

Buy Now
Questions 56

Which of the following price adjustment strategies encourages prompt payment?

Options:

A.

Cash discounts.

B.

Quantity discounts.

C.

Functional discounts.

D.

Seasonal discounts.

Buy Now
Questions 57

Division A produces a product with a variable cost of $5 per unit and an allocated fixed cost of $3 per unit The market price of the product is $15 plus 20% selling cost. Division B currently purchases this product from an external supplier but is going to purchase it from division A for $18 Which of the following methods of transfer pricing is being used?

Options:

A.

Market price.

B.

Negotiation-based.

C.

Full absorption cost

D.

Variable cost

Buy Now
Questions 58

Which of the following application controls can be defined as controls that monitor data Being processed and in storage to ensure it remains consistent and correct?

Options:

A.

Input controls

B.

Output controls

C.

Integrity controls

D.

Processing controls

Buy Now
Questions 59

Which of the following risks would involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a focal area?

Options:

A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Buy Now
Questions 60

Which of the following activities best illustrates a user's authentication control?

Options:

A.

Identity requests are approved in two steps.

B.

Logs are checked for misaligned identities and access rights.

C.

Users have to validate their identity with a smart card.

D.

Functions can be performed based on access rights.

Buy Now
Questions 61

An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income Which of the following terms would the investor most likely label this investment in her portfolio?

Options:

A.

A star

B.

A cash cow

C.

A Question mark

D.

A dog

Buy Now
Questions 62

According to IIA guidance on IT. which of the following plans would pair the identification of critical business processes with recovery time objectives?

Options:

A.

The business continuity management charter.

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Buy Now
Questions 63

Which of the following situations best applies to an organization that uses a project rather man a process to accomplish its business activities?

Options:

A.

A clothing company designs makes and sells a new item.

B.

A commercial constructor company is hired to build a warehouse.

C.

A city department sets up a new firefighter training program.

D.

A manufacturing organization acquires component parts from a contracted vendor

Buy Now
Questions 64

Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?

Options:

A.

Risk tolerance

B.

Performance.

C.

Threats and opportunities.

D.

Governance

Buy Now
Questions 65

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

Options:

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity.

Buy Now
Questions 66

Which of the following is an example of a phishing attack?

Options:

A.

An employee receives an email that appears to be from the organization's bank, though it is not. The employee replies to the email and sends the requested confidential information.

B.

An organization's website has been hacked. The hacker added political content that is not consistent with the organization's views.

C.

An organization's systems have been compromised by malicious software. The software locks the organization's operating system until d ransom is paid.

D.

An organization's communication systems have been intercepted. A communication session is controlled by an unauthorized third party.

Buy Now
Questions 67

According to MA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?

Options:

A.

Report identifying data that is outside of system parameters

B.

Report identifying general ledger transactions by time and individual

C.

Report comparing processing results with original input

D.

Report confirming that the general ledger data was processed without error.

Buy Now
Questions 68

According to IIA guidance, which of the following corporate social responsibility (CSR) evaluation activities may be performed by the internal audit activity?

1) Consult on CSR program design and implementation.

2) Serve as an advisor on CSR governance and risk management.

3) Review third parties for contractual compliance with CSR terms.

4) Identify and mitigate risks to help meet the CSR program objectives.

Options:

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Buy Now
Questions 69

Which of the following statements regarding program change management is not correct?

Options:

A.

The goal of the change management process is to sustain and improve organizational operations.

B.

The degree of risk associated with a proposed change determines if the change request requires authorization.

C.

In order to protect the production environment, changes must be managed in a repeatable, defined, and predictable manner.

D.

All changes should be tested in a non-production environment before migrating to the production environment.

Buy Now
Questions 70

Which of the following is the primary benefit of including end users in the system development process?

Options:

A.

Improved integrity of programs and processing.

B.

Enhanced ongoing maintenance of the system.

C.

Greater accuracy of the testing phase.

D.

Reduced need for unexpected software changes.

Buy Now
Questions 71

According to the ISO 14001 standard, which of the following is not included in the requirements for a quality management system?

Options:

A.

Key processes across the entity which impact quality must be identified and included.

B.

The quality management system must be documented in the articles of incorporation, quality manual,

procedures, work instructions, and records.

C.

Management must review the quality policy, analyze data about quality management system

performance, and assess opportunities for improvement and the need for change.

D.

The entity must have processes for inspections, testing, measurement, analysis, and improvement.

Buy Now
Questions 72

One change control function that is required in client/server environments, but is not required in mainframe environments, is to ensure that:

Options:

A.

Program versions are synchronized across the network.

B.

Emergency move procedures are documented and followed.

C.

Appropriate users are involved in program change testing.

D.

Movement from the test library to the production library is controlled.

Buy Now
Questions 73

Which of the following is an example of a risk avoidance response?

Options:

A.

Buying an insurance policy to protect against loss events.

B.

Hedging against natural gas price fluctuations.

C.

Selling a non-strategic business unit.

D.

Outsourcing a high risk process to a third party.

Buy Now
Exam Code: IIA-CIA-Part3-3P
Exam Name: CIA Exam Part Three: Business Knowledge for Internal Auditing
Last Update: Apr 17, 2024
Questions: 488
$72  $159.99
$54  $119.99
$45  $99.99
buy now IIA-CIA-Part3-3P