IIA IIA-CIA-Part3 - Business Knowledge for Internal Auditing
Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?
When determining the level of physical controls required for a workstation, which of the following factors should be considered?
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?
A chief audit executive (CAE) is developing a strategic plan for the internal audit function. In the last two years, the organization has faced significant IT risks, but the internal audit function has not been able to audit those areas due to a lack of knowledge. How could the CAE address this in the strategic plan?
When would a contract be dosed out?
Which of the following measures the operating success of a company for a given period of time?
Which of the following would be most likely found in an internal audit procedures manual?
Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?
Which of the following functions of a quality assurance and improvement program (QAIP) must be performed by personnel independent of the internal audit function?
After auditing the treasury function, the internal audit team issued a final report, which included an action plan agreed with management. When the audit team returned three months later to follow up on the action plan, management indicated that the plan had not been implemented because the old treasury system was being replaced with a new system. Which of the following is the most appropriate audit response?
Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?
Which of the following scenarios best illustrates a spear phishing attack?
Which of the following is an effective preventive control for data center security?
