IIA IIA-CIA-Part3 - Internal Audit Function
Which of the following key performance indicators would serve as the best measurement of internal audit innovation?
An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?
Which of the following describes the primary advantage of using data analytics in internal auditing?
In a final audit report, internal auditors drafted the following management action plan with a due date of the last day of the calendar year:
"Plan: A bank reconciliation template has been updated to address issues with formulas incorrectly calculating variances."
Which critical element of the action plan is missing?
Which of the following best describes owner's equity?
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
Which of the following statements is true regarding cost-volume-profit analysis?
An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?
Which of the following are the most common characteristics of big data?
Which of the following is a limitation of the remote wipe for a smart device?
Which of the following Issues would be a major concern for internal auditors when using a free software to analyze a third-party vendor's big data?
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
