Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IIA IIA-CIA-Part3 - Business Knowledge for Internal Auditing

Page: 5 / 11
Total 516 questions

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?

A.

The auditor eliminated duplicate information

B.

The auditor organized data to minimize useless information

C.

The auditor made data usable for a specific purpose by ensuring that anomalies were identified and addressed

D.

The auditor ensured data fields were consistent and that data could be used for a specific purpose

An organization uses the management-by-objectives method, whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?

A.

It is particularly helpful to management when the organization is facing rapid change

B.

It is a more successful approach when adopted by mechanistic organizations

C.

It is more successful when goal-setting is performed not only by management, but by all team members, including lower-level staff

D.

It is particularly successful in environments that are prone to having poor employer-employee relations

Which of the following application controls is the most dependent on the password owner?

A.

Password selection.

B.

Password aging.

C.

Password lockout.

D.

Password rotation.

According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?

A.

Individual workstation computer controls are not as important as companywide server controls

B.

Particular attention should be paid to housing workstations away from environmental hazards

C.

Cybersecurity issues can be controlled at an enterprise level, making workstation-level controls redundant

D.

With security risks near an all-time high, workstations should not be connected to the company network

Which of the following principles is shared by both hierarchical and open organizational structures?

A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.

A supervisor's span of control should not exceed seven subordinates.

Responsibility should be accompanied by adequate authority.

Employees at all levels should be empowered to make decisions.

A.

1 and 3 only

B.

1 and 4 only

C.

2 and 3 only

D.

3 and 4 only

When using data analytics during a review of the procurement process, what is the first step in the analysis process?

A.

Identify data anomalies and outliers

B.

Define questions to be answered

C.

Identify data sources available

D.

Determine the scope of the data extract

According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

A.

The business continuity management charter

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?

A.

Determining the frequency with which backups will be performed.

B.

Prioritizing the order in which business systems would be restored.

C.

Assigning who in the IT department would be involved in the recovery procedures.

D.

Assessing the resources needed to meet the data recovery objectives.

An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?

A.

Decrease the transfer price.

B.

Increase the transfer price.

C.

Charge at the arm’s length price.

D.

Charge at the optimal transfer price.

A newly appointed chief audit executive (CAE) reviews current reporting practices. The CAE notices that exit meetings tend to be unproductive. When internal auditors present summaries of observations, engagement clients consistently complain that they do not understand where the observations come from. Which of the following could improve this situation?

A.

Send summaries of observations in advance of exit meetings and ask engagement clients to review them ahead of time

B.

Establish the purpose of exit meetings as for presentation of observations only and request that all disagreements are submitted in writing afterwards

C.

Read the entire draft internal audit report together with the clients at the exit meeting to eliminate any disputes

D.

Discontinue exit meetings, as they have proved to be ineffective and unproductive

A new manager received computations of the internal rate of return regarding his project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?

A.

Compare to the annual cost of capital.

B.

Compare to the annual interest rate.

C.

Compare to the required rate of return.

D.

Compare to the net present value.

According to IIA guidance, which of the following are typical physical and environmental IT controls?

A.

Locating servers in locked rooms with restricted admission.

B.

Applying encryption where confidentiality is a stated requirement.

C.

Allocating and controlling access rights according to the organization's stated policy.

D.

Ensuring a tightly controlled process for applying all changes and patches to software, systems, network components, and data.

According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?

A.

Report identifying data that is outside of system parameters.

B.

Report identifying general ledger transactions by time and individual.

C.

Report comparing processing results with original input.

D.

Report confirming that the general ledger data was processed without error.

According to IIA guidance, which of the following statements is true regarding analytical procedures?

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify differences, but cannot be used to identify the absence of differences

Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?

A.

Voice recognition and token

B.

Password and fingerprint

C.

Fingerprint and voice recognition

D.

Password and token