Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IIA IIA-CIA-Part3-3P - CIA Exam Part Three: Business Knowledge for Internal Auditing

Page: 15 / 15
Total 488 questions

The balanced scorecard approach differs from traditional performance measurement approaches because it adds which of the following measures?

1) Financial measures

2) Internal business process measures.

3) Client satisfaction measures

4) Innovation and learning measures

A.

1 only.

B.

2 and 4 only.

C.

3 and 4 only.

D.

2, 3, and 4 only

Which of the following security controls would be the most effective in preventing security breaches?

A.

Approval of identity request.

B.

Access logging.

C.

Monitoring privileged accounts.

D.

Audit of access rights.

In accounting, which of the following statements is true regarding the terms debit and credit?

A.

Debit indicates the right side of an account and credit the left side.

B.

Debit means an increase in an account and credit means a decrease.

C.

Credit indicates the right side of an account and debit the left side.

D.

Credit means an increase in an account and debit means a decrease.

An internal auditor is evaluating an organization's business continuity management program According to the guidance on IT. which of the following tests would best demonstrate the ability to perform Key processes without significant problems?

A.

End-to-end testing

B.

IT systems and application walkthrough

C.

Tabletop or boardroom-style testing

D.

Desk check testing

Which of the following statements is true regarding user-developed applications (UDAs)?

A.

UDAs are less flexible and more difficult to configure than traditional IT applications.

B.

Updating UDAs may lead to various errors resulting from changes or corrections.

C.

UDAs typically are subjected to application development and change management controls.

D.

Using UDAs typically enhances the organization's ability to comply with regulatory factors.

Which of the following assists in ensuring mat information exchanged over IT systems is encrypted?

A.

Operating system

B.

Utility software

C.

Firewall

D.

Application software