Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

IIA-CIA-Part3-3P Sample Questions Answers

Questions 4

Which of the following is a key component of an organization's cybersecurity governance?

Options:

A.

Administrators monitoring the use, assignment and configuration of privileges on the network.

B.

The IT department establishing implementing, and actively managing security configurations.

C.

Management identifying and classifying the types of critical data in the organization's system

D.

Senior management of the organization setting the cybersecurity policy

Buy Now
Questions 5

According to IIA guidance on IT. which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?

Options:

A.

Formulas and static data are locked or protected.

B.

The spreadsheet is stored on a network server that is backed up daily.

C.

The purpose and use of the spreadsheet are documented.

D.

Check-in and check-out software is used to control versions.

Buy Now
Questions 6

Which of the following is a disadvantage in a centralized organizational structure?

Options:

A.

Communication conflicts.

B.

Slower decision making

C.

Loss of economies of scale

D.

Vulnerabilities in sharing knowledge

Buy Now
Questions 7

in which of the following technical infrastructure audits should attention be turned to physical security and environmental controls?

Options:

A.

Database review

B.

Data center review

C.

Network configuration review

D.

Operating systems review

Buy Now
Questions 8

A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software

that will remotely wipe data in case of theft or other incidents.

Which of the following should the organization ensure in exchange for the employees' consent?

Options:

A.

That those employees who do not consent to MDM software cannot have an email account.

B.

That personal data on the device cannot be accessed and deleted by system administrators.

C.

That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.

D.

That employee consent includes appropriate waivers regarding potential breaches to their privacy.

Buy Now
Questions 9

An internal auditor is using data analytics to locus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of me following statements is true regarding this scenario?

Options:

A.

The auditor is normalizing data in preparation for analyzing it

B.

The auditor is analyzing the data in preparation for communicating the results

C.

The auditor is cleaning the data in preparation for determining which processes may tie involved

D.

The auditor is reviewing the data prior to defining the question

Buy Now
Questions 10

Which of the following concepts of managerial accounting is focused on allocating overheads to products?

Options:

A.

Theory of constraints

B.

Just-in-time method

C.

Activity-based costing

D.

Break-even analysis

Buy Now
Questions 11

An organization is developing a new online collaboration tool for employees. The tool includes a homepage that is customized to each employee according to his department and job function Which of the following engagements should be conducted to ensure that the organization has included all departments and job functions in the system before it is implemented?

Options:

A.

An application control review

B.

A source code review

C.

A design review

D.

An access control review

Buy Now
Questions 12

Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?

Options:

A.

Key performance indicators

B.

Reports of software customization

C.

Change and patch management

D.

Master data management

Buy Now
Questions 13

Which of the following is an example of a physical security control that should be in place at an organization's data center?

Options:

A.

Backup servers in the data center are stored in an environmentally controlled location

B.

All users have a unique ID and password to access data

C.

Swipe cards are used to access the data center

D.

Firewalls and antivirus protection are in place to prevent unauthorized access to data.

Buy Now
Questions 14

Which of the following risks would involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a focal area?

Options:

A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Buy Now
Questions 15

An organization suffered significant damage to its local file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor.

Which of the following approaches has been used by the organization?

Options:

A.

Application management.

B.

Data center management.

C.

Managed security services.

D.

Systems integration.

Buy Now
Questions 16

Which of the following types of analytics would be used by an organization to examine metrics by business units and identity the most profitable business units?

Options:

A.

Detailed analytics

B.

Predictive analytics

C.

Diagnostic analytics

D.

Prescriptive analytics

Buy Now
Questions 17

Which of the following is an example of a nonfinancial internal failure quality cost?

Options:

A.

Decreasing gross profit margins over time.

B.

Foregone contribution margin on lost sales.

C.

Defective units shipped to customers.

D.

Excessive time to convert raw materials into finished goods.

Buy Now
Questions 18

Which of the following are typical responsibilities for operational management within a risk management program?

1) Implementing corrective actions to address process deficiencies.

2) Identifying shifts in the organization's risk management environment.

3)( Providing guidance and training on risk management processes.

4) Assessing the impact of mitigation strategies and activities.

Options:

A.

1 and 2 only

B.

1 and 4 only

C.

2 and 3 only

D.

3 and 4 only

Buy Now
Questions 19

Which of the following is likely to occur when an organization decides to adopt a decentralized organizational structure?

Options:

A.

A slower response to external change.

B.

Less controlled decision making.

C.

More burden on higher-level managers.

D.

Less use of employees' true skills and abilities.

Buy Now
Questions 20

Which of the following options correctly defines a transmission control protocol/Internet protocol (TCP/IP)?

Options:

A.

System software that acts as an interface between a user and a computer.

B.

A standardized set of guidelines that facilitates communication between computers on different

networks.

C.

System software that translates hypertext markup language to allow users to view a remote webpage.

D.

A network of servers used to control a variety of mission-critical operations.

Buy Now
Questions 21

Much of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?

Options:

A.

A traditional key lock

B.

A biometric device.

C.

A card-key system

D.

A proximity device

Buy Now
Questions 22

Which of the following is a typical example of structured data?

Options:

A.

Production information maintained in relational tables.

B.

Tweets and posts of users on social media.

C.

Photos and videos stored in hard drive catalogs.

D.

Sales reports documented in word processing software.

Buy Now
Questions 23

During an audit of the organization's annual financial statements, the internal auditor notes that the current cost of goods sold percentage is substantially higher than in prior years. Which of the following is the most likely explanation for this increase?

Options:

A.

Cost of raw material inventory items is decreasing.

B.

Process to manufacture goods is more efficient.

C.

Labor productivity to produce goods is increasing.

D.

Write-off of inventory is increasing.

Buy Now
Questions 24

An organization's account for office supplies on hand had a balance of S9,000 at the end of year one. During year two. the organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?

Options:

A.

A debit to office supplies on hand for S2.500

B.

A debit to office supplies on hand for $11,500

C.

A debit to office supplies on hand for S20.500

D.

A debit to office supplies on hand for S42.500

Buy Now
Questions 25

Which of the following assumptions regarding cost-volume-profit analysis is true?

Options:

A.

Costs are affected by changes in activity only.

B.

The behavior of costs and revenues is inverse.

C.

When more than one type of product is sold, the sales mix changes.

D.

Only variable costs have to be classified accurately.

Buy Now
Questions 26

According to MA guidance on IT. which of the following controls the routing of data packets to link computers?

Options:

A.

Operating system.

B.

Control environment.

C.

Network.

D.

Application program code.

Buy Now
Questions 27

Which of the following is improved by the use of smart devices?

Options:

A.

Version control

B.

Privacy

C.

Portability

D.

Secure authentication

Buy Now
Questions 28

Which of the following statements is true regarding user-developed applications (UDAs)?

Options:

A.

UDAs are less flexible and more difficult to configure than traditional IT applications.

B.

Updating UDAs may lead to various errors resulting from changes or corrections.

C.

UDAs typically are subjected to application development and change management controls.

D.

Using UDAs typically enhances the organization's ability to comply with regulatory factors.

Buy Now
Questions 29

An organization uses the management-by-objectives method, whereby employee performance is based on defined goals Which of the following statements is true regarding this approach?

Options:

A.

It is particularly helpful to management when the organization is facing rapid change

B.

It is a more successful approach when adopted by mechanistic organizations

C.

It is more successful when goal-setting is performed not only by management, but by an team members, including lower-level staff.

D.

It is particularly successful in environments that are prone to having poor employer-employee relations

Buy Now
Questions 30

During which phase of the contacting process ate contracts drafted for a proposed business activity?

Options:

A.

Initiation phase

B.

Bidding phase

C.

Development phase

D.

Management phase

Buy Now
Questions 31

During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?

Options:

A.

Initiation phase.

B.

Bidding phase.

C.

Development phase.

D.

Negotiation phase

Buy Now
Questions 32

During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an analytics tool to identify the top five vendors that received the highest sum of payments.

Which of the following analytics techniques did the auditor apply?

Options:

A.

Process analysis.

B.

Process mining.

C.

Data analysis.

D.

Data mining.

Buy Now
Questions 33

A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?

Options:

A.

Lack of coordination among different business units.

B.

Operational decisions are inconsistent with organizational goals.

C.

Suboptimal decision-making.

D.

Duplication of business activities.

Buy Now
Questions 34

The management of working capital is most crucial for which of the following aspects of business?

Options:

A.

Liquidity.

B.

Profitability.

C.

Solvency.

D.

Efficiency.

Buy Now
Questions 35

With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?

Options:

A.

Determining the frequency with which backups will be performed.

B.

Prioritizing the order in which business systems would be restored.

C.

Assigning who in the IT department would be involved in the recovery procedures.

D.

Assessing the resources needed to meet the data recovery objectives

Buy Now
Questions 36

Which of the following security controls would be the most effective in preventing security breaches?

Options:

A.

Approval of identity request.

B.

Access logging.

C.

Monitoring privileged accounts.

D.

Audit of access rights.

Buy Now
Questions 37

While auditing an organization's customer call center, an internal auditor notices that key performance indicators show a positive trend despite the fact that there have been increasing customer complaints over the same period Which of the following audit recommendations would most likely correct the cause of this inconsistency?

Options:

A.

Review the the call center script used by customer service agents to interact with callers and update the script rf necessary

B.

De-emphasize the importance of call center employees completing a certain number of calls per hour

C.

Retrain call center staff on area processes and common technical issues that they will Likely be asked to resolve

D.

Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily

Buy Now
Questions 38

Which of the following performance measures disincentivizes engaging in earnings management?

Options:

A.

Linking performance to profitability measures such as return on investment.

B.

Linking performance to the stock price.

C.

Linking performance to quotas such as units produced.

D.

Linking performance to nonfinancial measures such as customer satisfaction and employees training.

Buy Now
Questions 39

Which of the following data security policies is most likely to be the result of a data privacy law?

Options:

A.

Access to personally identifiable information is limited to those who need it to perform their job.

B.

Confidential data must be backed up and recoverable within a 24-hour period.

C.

Updates to systems containing sensitive data must be approved before being moved to production.

D.

A record of employees with access to insider information must be maintained and those employees may not trade company stock during blackout periods

Buy Now
Questions 40

While conducting audit procedures at the organization's data center, an internal auditor noticed the following:

Backup media was located on data center shelves.

Backup media was organized by date.

Backup schedule was one week in duration.

The system administrator was able to present restore logs.

Which of the following is reasonable for the internal auditor to conclude?

Options:

A.

Backup media is not properly stored, as the storage facility should be off-site.

B.

Backup procedures are adequate and appropriate according to best practices.

C.

Backup media is not properly indexed, as backup media should be indexed by system, not date.

D.

Backup schedule is not sufficient, as full backup should be conducted daily.

Buy Now
Questions 41

Which of the following is the first step an internal audit activity should undertake when executing a data analytics process?

Options:

A.

Conduct a risk assessment regarding the effectiveness of the data analytics process.

B.

Analyze possible and available sources of raw data

C.

Define the purpose and the anticipated value

D.

Select data for cleaning and normalization procedures.

Buy Now
Questions 42

Which of me following responsibilities would ordinary fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support

B.

Management of infrastructure services including network management

C.

Physical hosting of mainframes and distributed servers

D.

End-to-end security architecture design

Buy Now
Questions 43

Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?

Options:

A.

Decentralized.

B.

Centralized.

C.

Departmentalized.

D.

Tall structure.

Buy Now
Questions 44

When using cost-volume-profit analysts which of the following will increase operating income once the break-even point has been reached?

Options:

A.

Fixed costs per unit for each additional unit sold

B.

Variable costs per unit for each additional unit sold

C.

Contribution margin per unit for each additional unit sold

D.

Gross margin per unit for each additional unit sold

Buy Now
Questions 45

Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?

Options:

A.

Data center operations manager.

B.

Response and support team.

C.

Database administrator.

D.

Network administrator.

Buy Now
Questions 46

Which of me following storage options would give the organization the best chance of recovering data?

Options:

A.

Encrypted physical copies of the data and their encryption keys are stored together at the organization and are readily available upon request

B.

Encrypted physical copies of the data are stored separately from their encryption keys and both are held in secure locations a few hours away from me organization

C.

Encrypted reports on usage and database structure changes are stored on a cloud-based. secured database that is readily accessible

D.

Encrypted copies of the data are stored in a separate secure location a few hours away while the encryption keys are stored at the organization and are readily available

Buy Now
Questions 47

An organization has a total asset turnover of 3.0 times and a total debt-to-total assets ratio of 80 percent. If the organization has total debt of $1 000 000 what is the organization's sales level?

Options:

A.

$266.667

B.

$416,667

C.

$3.750.000

D.

$5 000.000

Buy Now
Questions 48

Which of the following control features consists of a set of authorization codes that distinguishes among actions such as reading, adding, and deleting records?

Options:

A.

Internally encrypted passwords

B.

System access privileges.

C.

Logon passwords

D.

Protocol controls.

Buy Now
Questions 49

Which of the following best describes the purpose of disaster recovery planning?

Options:

A.

To reconstitute systems efficiently following a disruptive event.

B.

To define rules on how devices within the system should communicate after a disaster.

C.

To describe how data should move from one system to another system in case of an emergency.

D.

To establish a protected area of network that is accessible to the public after a disaster

Buy Now
Questions 50

In accounting, which of the following statements is true regarding the terms debit and credit?

Options:

A.

Debit indicates the right side of an account and credit the left side.

B.

Debit means an increase in an account and credit means a decrease.

C.

Credit indicates the right side of an account and debit the left side.

D.

Credit means an increase in an account and debit means a decrease.

Buy Now
Questions 51

The leadership of an organization encourages employees to form voluntary problem-solving groups whereby several employees from the same work area meet regularity during work hours to discuss improvements and creative ways to reduce costs. Which of the following best describes this approach?

Options:

A.

Open-book management

B.

Quality control circles

C.

Self-managed teams

D.

Cross-functional teams

Buy Now
Questions 52

A remote location contains a data center with hardware available to support critical production systems as required in the recovery plan IT personnel periodically test and update systems at the data center. This is an example of which of the following recovery solutions?

Options:

A.

Cold recovery plan

B.

Critical recovery plan

C.

Warm recovery plan

D.

Tested recovery plan

Buy Now
Questions 53

A manager has allowed a subordinate employee to have greater control and responsibility over the tasks that he performs. This is an example of which of the following?

Options:

A.

Job enlargement.

B.

Job enlargement.

C.

Horizontal loading of the job.

D.

Job rotation

Buy Now
Questions 54

Which of the following is most important for an internal auditor to check with regard to the database version?

Options:

A.

Verify whether the organization uses the most recent database software version

B.

Verify whether the database software version is supported by the vendor.

C.

Verify whether the database software version has been recently upgraded

D.

Verify whether access to database version information is appropriately restricted

Buy Now
Questions 55

An internal auditor was asked to review an equal equity partnership In one sampled transaction Partner A transferred equipment into the partnership with a self-declared value of $10,000 and Partner B contributed equipment with a self-declared value of $15 000 The capital accounts of each partner were subsequently credited with S12,500. Which of the following statements is true regarding this transaction?

Options:

A.

The capital accounts of the partners should be increased by the original cost of the contributed equipment.

B.

The capital accounts should be increased using a weighted average based on the current percentage of ownership

C.

No action is needed as the capital account of each partner was increased by the correct amount

D.

The capital accounts of the partners should be increased by the fair market value of their contribution

Buy Now
Questions 56

The balanced scorecard approach differs from traditional performance measurement approaches because it adds which of the following measures?

1) Financial measures

2) Internal business process measures.

3) Client satisfaction measures

4) Innovation and learning measures

Options:

A.

1 only.

B.

2 and 4 only.

C.

3 and 4 only.

D.

2, 3, and 4 only

Buy Now
Questions 57

An organization recently documented its procedures for recovering systems and data after a disaster How are these documented procedures most likely to be used during a disaster simulation exercise?

Options:

Buy Now
Questions 58

An internal auditor reviews a data population and calculates the mean, median, and range.

What is the most likely purpose of performing this analytic technique?

Options:

A.

To inform the classification of the data population.

B.

To determine the completeness and accuracy of the data.

C.

To identify whether the population contains outliers.

D.

To determine whether duplicates in the data inflate the range.

Buy Now
Questions 59

Which of the following is the most effective control to prevent unauthorized entrance of a former employee of the organization?

Options:

A.

Revoking the former employee's biometrics from the entrance systems

B.

Installing security guards who have undergone a background check at all entrances.

C.

Installing multiple high-powered surveillance cameras throughout the organization

D.

Keeping doors locked and accessible with a key that is provided only to employees

Buy Now
Questions 60

Which of the following authentication controls combines what a user knows with the unique characteristics of the user respectively?

Options:

A.

Voice recognition and token.

B.

Password and fingerprint.

C.

Fingerprint and voice recognition

D.

Password and token

Buy Now
Questions 61

Which of me following statements is true regarding the reporting of tangible and intangible assets?

Options:

A.

For plant assets cost includes the purchase price and the cost of design and construction

B.

For intangible assets cost includes the purchase price and development costs

C.

Due to their indefinite nature intangible assets are not subject to amortization

D.

The organization must expense any cost incurred in developing a plant asset

Buy Now
Questions 62

How do data analysis technologies affect internal audit testing?

Options:

A.

They improve the effectiveness of spot check testing techniques

B.

They allow greater insight into high risk areas.

C.

They reduce the overall scope of the audit engagement.

D.

They increase the internal auditor's objectivity

Buy Now
Questions 63

Which of the following is a primary objective of the theory of constraints?

Options:

A.

Full or near capacity in processes.

B.

Smooth workflow among processes.

C.

Few or no defects.

D.

Lowered inventory levels.

Buy Now
Questions 64

According to IIA guidance, which of the following is a primary component of a network security strategy?

Options:

A.

Application input controls

B.

Firewall controls.

C.

Transmission encryption controls

D.

Change management controls

Buy Now
Questions 65

An organization invests excess snort-term cash in trading securities. When of the following actions should an internal auditor take to test the valuation of those securities?

Options:

A.

Use the equity method to recalculate the investment carrying value

B.

Confirm the securities held by the broker

C.

Perform a calculation of premium or discount amortization.

D.

Compare the carrying value with current market quotations

Buy Now
Questions 66

Which of the following statements is true concerning the basic accounting treatment of a partnership?

Options:

A.

The initial investment of each partner should be recorded at book value.

B.

The ownership ratio identifies the basis for dividing net income and net loss.

C.

A partner's capital only changes due to net income or net loss.

D.

The basis for sharing net incomes or net losses must be fixed.

Buy Now
Questions 67

What would be the effect if an organization paid one of its liabilities twice during the year in error?

Options:

A.

Assets liabilities and owners' equity would be understated

B.

Assets net income and owners' equity would be unaffected

C.

Assets and liabilities would be understated

D.

Assets net income and owners' equity would be understated, but liabilities would be overstated

Buy Now
Questions 68

According to IIA guidance on IT which of the following best describes a but recovery and restore processes have not been defined?

Options:

A.

Hot recovery plan

B.

Warm recovery plan

C.

Cold recovery plan.

D.

Absence of recovery plan

Buy Now
Questions 69

Which of the following security controls focuses most on prevention of unauthorized access to the power plant?

Options:

A.

An offboarding procedure is initiated monthly to determine redundant physical access rights

B.

Logs generated by smart locks are automatically scanned to identify anomalies in access patterns

C.

Requests for additional access rights are sent for approval and validation by direct supervisors

D.

Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours

Buy Now
Questions 70

An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.

Which of the following would be considered the most significant cyber threat to the organization?

Options:

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports.

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing the financial information of the company.

Buy Now
Questions 71

Which of me following application controls is the most dependent on the password owner?

Options:

A.

Password selection

B.

Password aging

C.

Password lockout

D.

Password rotation

Buy Now
Questions 72

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational

capability in the event of a disaster.

Which of the following best describes this approach to disaster recovery planning?

Options:

A.

Cold recovery plan.

B.

Outsourced recovery plan.

C.

Storage area network recovery plan.

D.

Hot recovery plan.

Buy Now
Questions 73

The greatest advantage of functional departmentalization is that it:

Options:

A.

Facilitates communication between primary functions.

B.

Helps to focus on the achievement of organizational goals.

C.

Provides for efficient use of specialized knowledge .

D.

Accommodates geographically dispersed companies

Buy Now
Questions 74

Which of the following is a key responsibility of a database administrator?

Options:

A.

Troubleshoot end user problems

B.

Provide production support.

C.

Provide physical security of databases

D.

Maintain database integrity

Buy Now
Questions 75

An internal auditor is assessing the risks related to an organization's mobile device pokey She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems Which of the following types of smart device risks should the internal auditor be most concerned about?

Options:

A.

Compliance

B.

Privacy

C.

Strategic

D.

Physical security.

Buy Now
Questions 76

Which of the following application software features is the least effective control to protect passwords?

Options:

A.

Suspension of user IDs after a user's repeated attempts to sign on with an invalid password.

B.

Encryption of passwords prior to their transmission or storage.

C.

Forced change of passwords after a designated number of days.

D.

Automatic logoff of inactive users after a specified time period of inactivity.

Buy Now
Questions 77

An internal auditor is trying to assess control risk and the effectiveness of an organization's internal controls. Which of the following audit procedures would not provide assurance to the auditor on this matter?

Options:

A.

Interviewing the organization's employees.

B.

Observing the organization's operations.

C.

Reading the board's minutes.

D.

Inspecting manuals and documents.

Buy Now
Questions 78

A holding company set up a centralized group technology department, using a local area network with a mainframe computer to process accounting information for all companies within the group. An internal auditor would expect to find all of the following controls within the technology department except:

Options:

A.

Adequate segregation of duties between data processing controls and file security controls.

B.

Documented procedures for remote job entry and for local data file retention.

C.

Emergency and disaster recovery procedures and maintenance agreements in place to ensure continuity of operations.

D.

Established procedures to prevent and detect unauthorized changes to data files.

Buy Now
Questions 79

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange?

Options:

A.

A time-sensitive just-in-time purchase environment.

B.

A large volume of custom purchases.

C.

A variable volume sensitive to material cost.

D.

A currently inefficient purchasing process.

Buy Now
Questions 80

Which of the following should an organization consider when developing strategic objectives for its business processes?

1) Contribution to the success of the organization.

2) Reliability of operational information.

3) Behaviors and actions expected of employees.

4) How inputs combine with outputs to generate activities.

Options:

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 4 only

D.

3 and 4 only

Buy Now
Questions 81

According to Porter's model of competitive strategy, which of the following is a generic strategy?

1 Differentiation.

2) Competitive advantage.

3) Focused differentiation.

4) Cost focus.

Options:

A.

2 only

B.

3 and 4 only

C.

1, 3, and 4 only

D.

1, 2, 3, and 4

Buy Now
Questions 82

Multinational organizations generally spend more time and effort to identify and evaluate:

Options:

A.

Internal strengths and weaknesses.

B.

Break-even points.

C.

External trends and events.

D.

Internal risk factors.

Buy Now
Questions 83

Which of the following techniques is the most relevant when an internal auditor conducts a valuation of an organization's physical assets?

Options:

A.

Observation.

B.

Inspection.

C.

Original cost.

D.

Vouching.

Buy Now
Questions 84

An organization uses a database management system (DBMS) as a repository for data. The DBMS, in turn, supports a number of end-user developed applications which were created using fourth-generation programming languages. Some of the applications update the database. Which of the following is the most important control related to the integrity of the data in the database?

Options:

A.

End users have their read-only applications approved by the information systems department before accessing the database.

B.

Concurrency update controls are in place.

C.

End-user applications are developed on personal computers before being implemented on the

mainframe.

D.

A hierarchical database model is adopted so that multiple users can be served at the same time.

Buy Now
Questions 85

Which of the following are appropriate reasons for internal auditors to document processes as part of an audit engagement?

1) To determine areas of primary concern.

2) To establish a standard format for process mapping.

3) To define areas of responsibility within the organization.

4) To assess the performance of employees.

Options:

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 3 only

D.

2 and 4 only

Buy Now
Questions 86

Capacity overbuilding is most likely to occur when management is focused on which of the following?

Options:

A.

Marketing.

B.

Finance.

C.

Production.

D.

Diversification.

Buy Now
Questions 87

An internal auditor is reviewing physical and environmental controls for an IT organization. Which control activity should not be part of this review?

Options:

A.

Develop and test the organization's disaster recovery plan.

B.

Install and test fire detection and suppression equipment.

C.

Restrict access to tangible IT resources.

D.

Ensure that at least one developer has access to both systems and operations.

Buy Now
Questions 88

The economic order quantity can be calculated using the following formula:

Which of the following describes how the optimal order size will change if the annual demand increases by 36 percent?

Options:

A.

Decrease by about 17 percent.

B.

Decrease by about 7 percent.

C.

Increase by about 7 percent.

D.

Increase by about 17 percent.

Buy Now
Questions 89

Which of the following is the most likely reason an organization may decide to undertake a stock split?

Options:

A.

To keep stock price constant.

B.

To keep shareholders' equity constant.

C.

To increase shareholders' equity.

D.

To enhance the stock liquidity.

Buy Now
Questions 90

Refer to the exhibit.

If the profit margin of an organization decreases, and all else remains equal, which of the following describes

how the "Funds Needed" line in the graph below will shift?

Options:

A.

The "Funds Needed" line will remain pointed upward, but will become less steep.

B.

The "Funds Needed" line will remain pointed upward, but will become more steep.

C.

The "Funds Needed" line will point downward with a minimal slope.

D.

The "Funds Needed" line will point downward with an extreme slope.

Buy Now
Questions 91

When writing a business memorandum, the writer should choose a writing style that achieves all of the following except:

Options:

A.

Draws positive attention to the writing style.

B.

Treats all receivers with respect.

C.

Suits the method of presentation and delivery.

D.

Develops ideas without overstatement.

Buy Now
Questions 92

Which of the following statements is correct regarding corporate compensation systems and related bonuses?

1) A bonus system should be considered part of the control environment of an organization and should be considered in formulating a report on internal control.

2) Compensation systems are not part of an organization's control system and should not be reported as such.

3) An audit of an organization's compensation system should be performed independently of an audit of the control system over other functions that impact corporate bonuses.

Options:

A.

1 only

B.

2 only

C.

3 only

D.

2 and 3 only

Buy Now
Questions 93

Preferred stock is less risky for investors than is common stock because:

Options:

A.

Common stock pays dividends as a stated percentage of face value.

B.

Common stock has priority over preferred stock with regard to earnings and assets.

C.

Preferred dividends are usually cumulative.

D.

Preferred stock with no conversion feature has a higher dividend yield than does convertible preferred stock.

Buy Now
Questions 94

Which of the following is an example of a risk avoidance response?

Options:

A.

Buying an insurance policy to protect against loss events.

B.

Hedging against natural gas price fluctuations.

C.

Selling a non-strategic business unit.

D.

Outsourcing a high risk process to a third party.

Buy Now
Questions 95

According to the International Professional Practices Framework, which of the following statements is true regarding a corporate social responsibility (CSR) program?

1) Every employee generally has a responsibility for ensuring the success of CSR objectives.

2) The board has overall responsibility for the effectiveness of internal control processes associated with CSR.

3) Public reporting on the CSR governance process is expected.

4) Organizations generally have flexibility regarding what is included in a CSR program.

Options:

A.

1, 2, and 3 only

B.

1, 2, and 4 only

C.

1, 3, and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 96

In creating a risk-based plan, which of the following best describes a top-down approach to understanding business processes?

Options:

A.

Identifying the processes at the activity level.

B.

Analyzing the organization's strategic plan where the business processes are defined.

C.

Analyzing the organization's objectives and identifying the processes needed to achieve the objectives.

D.

Identifying the risks affecting the organization, the objectives, and then the processes concerned.

Buy Now
Questions 97

A key advantage of developing a computer application by using the prototyping approach is that it:

Options:

A.

Does not require testing for user acceptance.

B.

Allows applications to be portable across multiple system platforms.

C.

Is less expensive since it is self-documenting.

D.

Better involves users in the design process.

Buy Now
Questions 98

Which of the following statements accurately describes the responsibility of the internal audit activity (IAA) regarding IT governance?

1) The IAA does not have any responsibility because IT governance is the responsibility of the board and senior management of the organization.

2) The IAA must assess whether the IT governance of the organization supports the organization’s strategies and objectives.

3) The IAA may assess whether the IT governance of the organization supports the organization’s strategies and objectives.

4) The IAA may accept requests from management to perform advisory services regarding how the IT governance of the organization supports the organization’s strategies and objectives.

Options:

A.

1 only

B.

4 only

C.

2 and 4

D.

3 and 4

Buy Now
Questions 99

Import quotas that limit the quantities of goods that a domestic subsidiary can buy from its foreign parent company represent which type of barrier to the parent company?

Options:

A.

Political.

B.

Financial.

C.

Social.

D.

Tariff.

Buy Now
Questions 100

Which of the following costs would be incurred in an inventory stockout?

Options:

A.

Lost sales, lost customers, and backorder.

B.

Lost sales, safety stock, and backorder.

C.

Lost customers, safety stock, and backorder.

D.

Lost sales, lost customers, and safety stock.

Buy Now
Questions 101

Which of the following statements best describes the frameworks set forth by the International Standards Organization?

Options:

A.

Globally accepted standards for industries and processes.

B.

Bridging the gaps among control requirements, technical issues, and business risks.

C.

Practical guidance and benchmarks for all organizations that use information systems.

D.

Frameworks and guidance on enterprise risk management, internal control, and fraud deterrence.

Buy Now
Questions 102

Which of the following is a strategy that organizations can use to stimulate innovation?

1) Source from the most advanced suppliers.

2) Establish employee programs that reward initiative.

3) Identify best practice competitors as motivators.

4) Ensure that performance targets are always achieved.

Options:

A.

1 and 3 only

B.

2 and 4 only

C.

1, 2, and 3 only

D.

1, 2, 3, and 4

Buy Now
Questions 103

An organization is projecting sales of 100,000 units, at a unit price of $12. Unit variable costs are $7. If fixed costs are $350,000, what is the projected total contribution margin?

Options:

A.

$350,000

B.

$500,000

C.

$850,000

D.

$1,200,000

Buy Now
Questions 104

The most important reason to use risk assessment in audit planning is to:

Options:

A.

Identify redundant controls.

B.

Improve budgeting accuracy.

C.

Enhance assurance provided to management.

D.

Assist in developing audit programs.

Buy Now
Questions 105

All of the following are possible explanations for a significant unfavorable material efficiency variance except:

Options:

A.

Cutbacks in preventive maintenance.

B.

An inadequately trained and supervised labor force.

C.

A large number of rush orders.

D.

Production of more units than planned for in the master budget.

Buy Now
Questions 106

When applied to international economics, the theory of comparative advantage proposes that total worldwide output will be greatest when:

Options:

A.

Each nation's total imports approximately equal its total exports.

B.

Each good is produced by the nation that has the lowest opportunity cost for that good.

C.

Goods that contribute to a nation's balance-of-payments deficit are no longer imported.

D.

International trade is unrestricted and tariffs are not imposed.

Buy Now
Questions 107

According to the International Professional Practices Framework, internal auditors who are assessing the adequacy of organizational risk management processes should not:

Options:

A.

Recognize that organizations use different techniques for managing risk.

B.

Seek assurance that the key objectives of the risk management processes are being met.

C.

Determine and accept the level of risk for the organization.

D.

Treat the evaluation of risk management processes differently from the risk analysis used to plan audit engagements.

Buy Now
Questions 108

Which of the following performance measures would be appropriate for evaluating an investment center, which has responsibility for its revenues, costs, and investment base, but would not be appropriate for evaluating cost, revenue, or profit centers?

Options:

A.

A flexible budget.

B.

Variance analysis.

C.

A contribution margin income statement by segment.

D.

Residual income.

Buy Now
Questions 109

When developing an effective risk-based plan to determine audit priorities, an internal audit activity should start by:

Options:

A.

Identifying risks to the organization's operations.

B.

Observing and analyzing controls.

C.

Prioritizing known risks.

D.

Reviewing organizational objectives.

Buy Now
Questions 110

Which of the following factors would reduce dissatisfaction for a management trainee but would not particularly motivate the trainee?

Options:

A.

A sense of achievement.

B.

Promotion.

C.

Recognition.

D.

An incremental increase in salary.

Buy Now
Questions 111

Presented below are partial year-end financial statement data (000 omitted from dollar amounts) for companies A and B:

If company A has a quick ratio of 2:1, then it has an accounts receivable balance of:

Options:

A.

$100

B.

$200

C.

$300

D.

$500

Buy Now
Questions 112

Which of the following would not impair the objectivity of internal auditor?

Options:

A.

Management assurance on risks.

B.

Implementing risk responses on behalf of management.

C.

Providing assurance that risks assessed are correctly evaluated.

D.

Setting the risk appetite.

Buy Now
Questions 113

Which of the following does not provide operational assurance that a computer system is operating properly?

Options:

A.

Performing a system audit.

B.

Making system changes.

C.

Testing policy compliance.

D.

Conducting system monitoring.

Buy Now
Questions 114

Which of the following steps should an internal auditor take during an audit of an organization's business continuity plans?

1) Evaluate the business continuity plans for adequacy and currency.

2) Prepare a business impact analysis regarding the loss of critical business.

3) Identify key personnel who will be required to implement the plans.

4) Identify and prioritize the resources required to support critical business processes.

Options:

A.

1 only

B.

2 and 4 only

C.

1, 3, and 4 only

D.

1, 2, 3, and 4

Buy Now
Questions 115

In mergers and acquisitions, which of the following is an example of a horizontal combination?

Options:

A.

Dairy manufacturing company taking over a large dairy farm.

B.

A movie producer acquires movie theaters.

C.

A petroleum processing company acquires an agro-processing firm.

D.

A baker taking over a competitor.

Buy Now
Questions 116

When granting third parties temporary access to an entity's computer systems, which of the following is the most effective control?

Options:

A.

Access is approved by the supervising manager.

B.

User accounts specify expiration dates and are based on services provided.

C.

Administrator access is provided for a limited period.

D.

User accounts are deleted when the work is completed.

Buy Now
Questions 117

A retail organization is considering acquiring a composite textile company. The retailer's due diligence team determined the value of the textile company to be $50 million. The financial experts forecasted net present value of future cash flows to be $60 million. Experts at the textile company determined their company's market value to be $55 million if purchased by another entity. However, the textile company could earn more than $70 million from the retail organization due to synergies. Therefore, the textile company is motivated to make the negotiation successful. Which of the following approaches is most likely to result in a successful negotiation?

Options:

A.

Develop a bargaining zone that lies between $50 million and $70 million and create sets of outcomes between $50 million and $70 million.

B.

Adopt an added-value negotiating strategy, develop a bargaining zone between $50 million and $70 million, and create sets of outcomes between $50 million and $70 million.

C.

Involve a mediator as a neutral party who can work with the textile company's management to determine a bargaining zone.

D.

Develop a bargaining zone that lies between $55 million and $60 million and create sets of outcomes between $55 million and $60 million.

Buy Now
Questions 118

Within an enterprise, IT governance relates to the:

1) Alignment between the enterprise's IT long term plan and the organization's objectives.

2) Organizational structures of the company that are designed to ensure that IT supports the organization's strategies and objectives.

3) Operational plans established to support the IT strategies and objectives.

4) Role of the company's leadership in ensuring IT supports the organization's strategies and objectives.

Options:

A.

1 and 2 only

B.

3 and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 119

Which of the following statements regarding organizational governance is not correct?

Options:

A.

An effective internal audit function is one of the four cornerstones of good governance.

B.

Those performing governance activities are accountable to the customer.

C.

Accountability is one of the key elements of organizational governance.

D.

Governance principles and the need for an internal audit function are applicable to governmental and not-for-profit activities.

Buy Now
Questions 120

Which of the following is a role of the board of directors in the governance process?

Options:

A.

Conduct periodic assessments of the organization's governance systems.

B.

Obtain assurance concerning the effectiveness of the organization's governance systems.

C.

Implement an effective system of internal controls to support the organization's governance systems.

D.

Review and approve operational goals and objectives.

Buy Now
Questions 121

Which of the following local area network physical layouts is subject to the greatest risk of failure if one device fails?

Options:

A.

Star network.

B.

Bus network.

C.

Token ring network.

D.

Mesh network.

Buy Now
Questions 122

Which of the following is a disadvantage of selecting a commercial software package rather than developing an application internally?

Options:

A.

Lack of flexibility.

B.

Incompatibility with client/server technology.

C.

Employee resistance to change.

D.

Inadequate technical support.

Buy Now
Questions 123

Which of the following price adjustment strategies encourages prompt payment?

Options:

A.

Cash discounts.

B.

Quantity discounts.

C.

Functional discounts.

D.

Seasonal discounts.

Buy Now
Questions 124

Which of the following conflict resolution methods should be applied when the intention of the parties is to solve the problem by clarifying differences and attaining everyone's objectives?

Options:

A.

Accommodating.

B.

Compromising.

C.

Collaborating.

D.

Competing.

Buy Now
Questions 125

Which of the following statements is in accordance with COBIT?

1) Pervasive controls are general while detailed controls are specific.

2) Application controls are a subset of pervasive controls.

3) Implementation of software is a type of pervasive control.

4) Disaster recovery planning is a type of detailed control.

Options:

A.

1 and 4 only

B.

2 and 3 only

C.

2, 3, and 4 only

D.

1, 2, and 4 only

Buy Now
Questions 126

Which of the following is a product-oriented definition of a business rather than a market-oriented definition of a business?

Options:

A.

We are a people-and-goods mover.

B.

We supply energy.

C.

We make movies.

D.

We provide climate control in the home.

Buy Now
Questions 127

An organization accumulated the following data for the prior fiscal year:

Value of Percentage of

Quarter

Output Produced

Cost X

1

$4,750,000

2.9

2

$4,700,000

3.0

3

$4,350,000

3.2

4

$4,000,000

3.5

Based on this data, which of the following describes the value of Cost X in relation to the value of Output Produced?

Options:

A.

Cost X is a variable cost.

B.

Cost X is a fixed cost.

C.

Cost X is a semi-fixed cost.

D.

Cost X and the value of Output Produced are unrelated.

Buy Now
Questions 128

In terms of international business strategy, which of the following is true regarding a multi-domestic strategy?

Options:

A.

It uses the same products in all countries.

B.

It centralizes control with little decision-making authority given to the local level.

C.

It is an effective strategy when large differences exist between countries.

D.

It provides cost advantages, improves coordinated activities, and speeds product development.

Buy Now
Questions 129

Which of the following descriptions of the internal control system are indicators that risks are managed effectively?

1) Existing controls promote compliance with applicable laws and regulations.

2) The control environment is designed to address all identified risks to the organization.

3) Key controls for significant risks to the organization remain consistent over time.

4) Monitoring systems are in place to alert management to unexpected events.

Options:

A.

1 and 3.

B.

1 and 4.

C.

2 and 3.

D.

2 and 4.

Buy Now
Questions 130

In which type of business environment are price cutting strategies and franchising strategies most appropriate?

Options:

A.

Embryonic, focused.

B.

Fragmented, decline.

C.

Mature, fragmented.

D.

Competitive, embryonic.

Buy Now
Questions 131

According to the COSO enterprise risk management (ERM) framework, which of the following is not a typical responsibility of the chief risk officer?

Options:

A.

Establishing risk category definitions and a common risk language for likelihood and impact measures.

B.

Defining ERM roles and responsibilities.

C.

Providing the board with an independent, objective risk perspective on financial reporting.

D.

Guiding integration of ERM with other management activities.

Buy Now
Questions 132

A department purchased one copy of a software program for internal use. The manager of the department installed the program on an office computer and then made two complete copies of the original software.

Copy 1 was solely for backup purposes.

Copy 2 was for use by another member of the department.

In terms of software licenses and copyright law, which of the following is correct?

Options:

A.

Both copies are legal.

B.

Only copy 1 is legal.

C.

Only copy 2 is legal.

D.

Neither copy is legal.

Buy Now
Questions 133

Which of the following is an element of effective negotiating?

Options:

A.

Ensuring that the other party has a personal stake in the agreement.

B.

Focusing on interests rather than on obtaining a winning position.

C.

Considering a few select choices during the settlement phase.

D.

Basing the agreement on negotiating power and positioning leverage.

Buy Now
Questions 134

The activity that involves a trial run of a product in a typical segment of the market before proceeding to a national launch is referred to as:

Options:

A.

Test marketing

B.

Experimentation

C.

Segmentation

D.

Positioning

Buy Now
Questions 135

Which of the following control techniques would minimize the risk of interception during transmission in an electronic data interchange system?

1) Encryption.

2) Traffic padding.

3) Edit checks.

4) Structured data format.

Options:

A.

1 and 2 only

B.

2 and 3 only

C.

3 and 4 only

D.

1, 2, and 3 only

Buy Now
Questions 136

Which of the following best describes the concept of relevant cost?

Options:

A.

A future cost that is the same among alternatives.

B.

A future cost that differs among alternatives.

C.

A past cost that is the same among alternatives.

D.

A past cost that differs among alternatives.

Buy Now
Questions 137

Which of the following statements is true regarding outsourced business processes?

Options:

A.

Outsourced business processes should not be considered in the internal audit universe because the controls are owned by the external service provider.

B.

Generally, independence is improved when the internal audit activity reviews outsourced business processes.

C.

The key controls of outsourced business processes typically are more difficult to audit because they are designed and managed externally.

D.

The system of internal controls may be better and more efficient when the business process is

outsourced compared to internally sourced.

Buy Now
Questions 138

According to IIA guidance on IT auditing, which of the following would not be an area examined by the internal audit activity?

Options:

A.

Access system security.

B.

Policy development.

C.

Change management.

D.

Operations processes.

Buy Now
Questions 139

Which of the following strategies would most likely prevent an organization from adjusting to evolving industry market conditions?

Options:

A.

Specializing in proven manufacturing techniques that have made the organization profitable in the past.

B.

Substituting its own production technology with advanced techniques used by its competitors.

C.

Forgoing profits over a period of time to gain market share from its competitors.

D.

Using the same branding to sell its products through new sales channels to target new markets.

Buy Now
Questions 140

An internationally recognized brand name is an entrance barrier to new competitors because new competitors would:

Options:

A.

Have to initiate a price war in order to enter the industry.

B.

Face increased production costs.

C.

Face increased marketing costs.

D.

Face higher learning costs, which would increase fixed costs.

Buy Now
Questions 141

Unsecured loans are loans:

Options:

A.

That do not have to be repaid for over one year.

B.

That appear to be too risky for most lenders to consider.

C.

Granted on the basis of a company's credit standing.

D.

Backed by mortgaged assets.

Buy Now
Questions 142

If a bank's activities are categorized under such departments as community banking, institutional banking, and agricultural banking, what kind of departmentalization is being utilized?

Options:

A.

Product departmentalization.

B.

Process departmentalization.

C.

Functional departmentalization.

D.

Customer departmentalization.

Buy Now
Questions 143

Which of the following application-based controls is an example of a programmed edit check?

Options:

A.

Reasonableness check.

B.

Transaction log.

C.

Input error correction.

D.

Authorization for access.

Buy Now
Questions 144

A small furniture-manufacturing firm with 100 employees is located in a two-story building and does not plan to expand. The furniture manufactured is not special-ordered or custom-made. The most likely structure for this organization would be:

Options:

A.

Functional departmentalization.

B.

Product departmentalization.

C.

Matrix organization.

D.

Divisional organization.

Buy Now
Questions 145

An internal auditor discovered that several unauthorized modifications were made to the production version of an organization's accounting application. Which of the following best describes this deficiency?

Options:

A.

Production controls weakness.

B.

Application controls weakness.

C.

Authorization controls weakness.

D.

Change controls weakness.

Buy Now
Questions 146

A supervisor receives a complaint from an employee who is frustrated about having to learn a new software

program. The supervisor responds that the new software will enable the employee to work more efficiently and with greater accuracy. This response is an example of:

Options:

A.

Empathetic listening.

B.

Reframing.

C.

Reflective listening.

D.

Dialogue.

Buy Now
Exam Code: IIA-CIA-Part3-3P
Exam Name: CIA Exam Part Three: Business Knowledge for Internal Auditing
Last Update: Oct 15, 2025
Questions: 488
$66  $164.99
$50  $124.99
$42  $104.99
buy now IIA-CIA-Part3-3P