IIA IIA-CIA-Part3 - Internal Audit Function
An internal audit uncovered high-risk issues that needed to be addressed by the organization. During the exit conference, the audit team discussed the high-risk issues with the manager responsible for addressing them. How should the chief audit executive respond if the manager agrees to correct the issues identified during the audit?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
Which of the following best describes the use of predictive analytics?
Which of the following business practices promotes a culture of high performance?
Which of the following is the best example of IT governance controls?
For employees, the primary value of implementing job enrichment is which of the following?
A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:
“Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.†The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?
Which of the following statements is most accurate concerning the management and audit of a web server?
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze,
improve, and control. Which of the following best describes this approach?
Which of the following would be the strongest control to prevent unauthorized wireless network access?
Which of the following capital budgeting techniques considers the expected total net cash flows from investment?
With regard to project management, which of the following statements about project crashing is true?
Which of the following describes a third-party network that connects an organization specifically with its trading partners?
