Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

IIA IIA-ACCA - ACCA CIA Challenge Exam

Page: 12 / 13
Total 604 questions

Which of the following is an element of effective negotiating?

A.

Ensuring that the other party has a personal stake in the agreement.

B.

Focusing on interests rather than on obtaining a winning position.

C.

Considering a few select choices during the settlement phase.

D.

Basing the agreement on negotiating power and positioning leverage.

Which of the following best demonstrates an organization's ability to recover from a disaster?

A.

Hot site

B.

Cold site

C.

Redundant data center

D.

Regular testing of the disaster plan

An organization is projecting sales of 100,000 units, at a unit price of $12. Unit variable costs are $7. If fixed costs are $350,000, what is the projected total contribution margin?

A.

$350,000

B.

$500,000

C.

$850,000

D.

$1,200,000

When developing an effective risk-based plan to determine audit priorities, an internal audit activity should start by:

A.

Identifying risks to the organization's operations.

B.

Observing and analyzing controls.

C.

Prioritizing known risks.

D.

Reviewing organizational objectives.

Which of the following statements about matrix organizations is false?

A.

In a matrix organization, conflict between functional and product managers may arise.

B.

In a matrix organization, staff under dual command is more likely to suffer stress at work.

C.

Matrix organizations offer the advantage of greater flexibility.

D.

Matrix organizations minimize costs and simplify communication.

The economic order quantity can be calculated using the following formula:

Which of the following describes how the optimal order size will change if the annual demand increases by 36 percent?

A.

Decrease by about 17 percent.

B.

Decrease by about 7 percent.

C.

Increase by about 7 percent.

D.

Increase by about 17 percent.

Which of the following should an organization consider when developing strategic objectives for its business processes?

1. Contribution to the success of the organization.

2. Reliability of operational information.

3. Behaviors and actions expected of employees.

4. How inputs combine with outputs to generate activities.

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 4 only

D.

3 and 4 only

An employee frequently uses a personal smart device to send and receive work-related emails. Which of the following controls would be most effective to mitigate security risks related to these transmissions?

A.

Hardware encryption.

B.

Software encryption

C.

Data encryption.

D.

Authentication.

If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the auditor should do which of the following?

A.

Conform with all other parts of The IIA's Standards and provide appropriate disclosures.

B.

Conform with all other parts of The IIA's Standards; there is no need to provide appropriate disclosures.

C.

Continue the engagement without conforming with the other parts of The IIA's Standards.

D.

Withdraw from the engagement.

Which of the following statements accurately describes the responsibility of the internal audit activity (IAA) regarding IT governance?

1. The IAA does not have any responsibility because IT governance is the responsibility of the board and senior management of the organization.

2. The IAA must assess whether the IT governance of the organization supports the organization’s strategies and objectives.

3. The IAA may assess whether the IT governance of the organization supports the organization’s strategies and objectives.

4. The IAA may accept requests from management to perform advisory services regarding how the IT governance of the organization supports the organization’s strategies and objectives.

A.

1 only

B.

4 only

C.

2 and 4

D.

3 and 4

Which of the following application-based controls is an example of a programmed edit check?

A.

Reasonableness check.

B.

Transaction log.

C.

Input error correction.

D.

Authorization for access.

Which of the following is not a method for implementing a new application system?

A.

Direct cutover.

B.

Parallel.

C.

Pilot.

D.

Test.

Which of the following costs would be incurred in an inventory stockout?

A.

Lost sales, lost customers, and backorder.

B.

Lost sales, safety stock, and backorder.

C.

Lost customers, safety stock, and backorder.

D.

Lost sales, lost customers, and safety stock.

Which of the following is the most effective control to prevent unauthorized entrance of a former employee of the organization?

A.

Revoking the former employee's biometrics from the entrance systems

B.

Installing security guards who have undergone a background check at all entrances.

C.

Installing multiple high-powered surveillance cameras throughout the organization

D.

Keeping doors locked and accessible with a key that is provided only to employees

Which of the following characteristics is most important specifically for a global manager to possess in order to be successful?

A.

Knowledge of different languages.

B.

Understanding of uncertainty avoidance differences

C.

Emotional intelligence

D.

Cultural intelligence