Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IIA IIA-CIA-Part3 - Business Knowledge for Internal Auditing

Page: 1 / 11
Total 516 questions

In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?

A.

A value-added network.

B.

A local area network.

C.

A metropolitan area network.

D.

A wide area network.

Which of the following physical security controls is able to serve as both a detective and preventive control?

A.

Authentication logs.

B.

Card key readers.

C.

Biometric devices

D.

Video surveillance.

An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?

A.

Regular review of logs.

B.

Two-level authentication.

C.

Photos on smart cards.

D.

Restriction of access hours.

IT governance begins with which of the following activities?

A.

Identification of risk-mitigating options.

B.

Definition of IT objectives.

C.

Identification of IT risk events.

D.

Definition of risk response policies.

Which of the following responsibilities would ordinarily fall under the help desk function of an organization?

A.

Maintenance service items such as production support

B.

Management of infrastructure services, including network management

C.

Physical hosting of mainframes and distributed servers

D.

End-to-end security architecture design

Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?

A.

Greater cost-effectiveness

B.

Increased economies of scale

C.

Larger talent pool

D.

Strong internal controls

Which of the following describes the primary advantage of using data analytics in internal auditing?

A.

It helps support the internal audit conclusions with factual evidence.

B.

It reduces the time and effort needed to prepare the audit report.

C.

It helps prevent internal auditors from unknowingly disregarding key process risks.

D.

It enables internal auditors to meet their responsibility for monitoring controls.

Which of the following statements is true regarding change management?

A.

The degree of risk associated with a proposed change determines whether the change request requires authorization

B.

Program changes generally are developed and tested in the production environment.

C.

Changes are only required by software programs

D.

To protect the production environment, changes must be managed in a repeatable, defined, and predictable manner

An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.

Which of the following terms would the investor most likely label this investment in her portfolio?

A.

A star

B.

A cash cow

C.

A question mark

D.

A dog

An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?

A.

Data is synchronized in real time

B.

Recovery time is expected to be less than one week

C.

Servers are not available and need to be procured

D.

Recovery resources end data restore processes have not been defined.

An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?

A.

$0

B.

$4,000

C.

$5,000

D.

$10,000

With regard to project management, which of the following statements about project crashing Is true?

A.

It leads to an increase in risk and often results in rework.

B.

It is an optimization technique where activities are performed in parallel rather than sequentially.

C.

It involves a revaluation of project requirements and/or scope.

D.

It is a compression technique in which resources are added so the project.

According to IIA guidance, which of the following statements is true regarding analytical procedures?

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences, but cannot be used to identify the absence of differences

Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?

A.

Verify completeness and accuracy.

B.

Verify existence and accuracy.

C.

Verify completeness and integrity.

D.

Verify existence and completeness.

Which of the following statements is true regarding the management-by-objectives method?

A.

Management by objectives is most helpful in organizations that have rapid changes.

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.

Management by objectives helps organizations to keep employees motivated.

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.