Library
Library
Next Question
Question 2
A. Direct cutover.
B. Parallel.
C. Pilot.
D. Test.
Next Question
Question 3
Next Question
Question 4
Next Question
Question 5
A. Lack of flexibility.
B. Incompatibility with client/server technology.
C. Employee resistance to change.
D. Inadequate technical support.
Next Question
Question 6
Next Question
Question 7
Next Question
Question 8
The activity that involves a trial run of a product in a typical segment of the
market before proceeding to a national launch is referred to as:
A. Test marketing
B. Experimentation
C. Segmentation
D. Positioning
Next Question
Question 9
Next Question
Question 10
A. The strategy is favored when unit costs fall with the increase in units
produced.
B. The strategy is favored when buyers are relatively insensitive to price
increases.
C. The strategy is favored when there is insufficient market capacity and
competitors cannot increase market capacity.
D. The strategy is favored when high price is perceived as high quality.
Next Question
Question 11
Which of the following statements is true regarding the use of public key
encryption to secure data while it is being transmitted across a network?
A. Both the key used to encrypt the data and the key used to decrypt the
data are made public.
B. The key used to encrypt the data is kept private but the key used to
decrypt the data is made public.
C. The key used to encrypt the data is made public but the key used to
decrypt the data is kept private.
D. Both the key used to encrypt the data and the key used to decrypt the
data are made private.
Next Question
Question 12
The market price is the most appropriate transfer price to be charged by one
department to another in the same organization for a service provided when:
Next Question
Question 13
A. Intranet.
B. Extranet.
C. Digital subscriber line.
D. Broadband.
Next Question
Question 14
A. $170,000
B. $280,000
C. $300,000
D. $540,000
Question 15
During a review of a web-based application used by customers to check the status of their bank
accounts, it would be most important for the internal auditor to ensure that:
Next Question
Which of the following steps should an internal auditor take during an audit of an organization's
business continuity plans?
1. Evaluate the business continuity plans for adequacy and currency.
2. Prepare a business impact analysis regarding the loss of critical business.
3. Identify key personnel who will be required to implement the plans.
4. Identify and prioritize the resources required to support critical business processes.
A. 1 only
B. 2 and 4 only
C. 1, 3, and 4 only
D. 1, 2, 3, and 4
Next Question
Which of the following engagement observations would provide the least motivation for
management to amend or replace an existing cost accounting system?
A. The distorted unit cost of a service is 50 percent lower than the true cost, while the true
cost is 50 percent higher than the competition's cost.
B. The organization is losing $1,000,000 annually because it incorrectly outsourced an
operation based on information from its current system.
C. The cost of rework, hidden by the current system, is 50 percent of the total cost of all
services.
D. 50 percent of total organizational cost has been allocated on a volume basis.
Next Question
Which of the following control techniques would minimize the risk of interception during
transmission in an electronic data interchange system?
1. Encryption.
2. Traffic padding.
3. Edit checks.
4. Structured data format.
A. 1 and 2 only
B. 2 and 3 only
C. 3 and 4 only
D. 1, 2, and 3 only
Next Question
Question 15 ( Single Topic)
For an engineering department with a total quality management program, important elements of
quality management include all of the following except:
Next Question
The figure below shows the network diagram for the activities of a large project. What is the
shortest number of days in which the project can be completed?
A. 21 days.
B. 22 days.
C. 27 days.
D. 51 days.
Next Question
Next Question
The economic order quantity for inventory is higher for an organization that has:
Next Question
What must be monitored in order to manage risk of consumer product inventory obsolescence?
1. Inventory balances.
2. Market share forecasts.
3. Sales returns.
4. Sales trends.
A. 1 only
B. 4 only
C. 1 and 4 only
D. 1, 2, and 3 only
Next Question
The percentage of sales method, rather than the percentage of receivables method, would be used to
estimate uncollectible accounts if an organization seeks to:
A. Use an aging schedule to more closely estimate uncollectible accounts.
B. Eliminate the need for an allowance for doubtful accounts.
C. Emphasize the accuracy of the net realizable value of the receivables on the balance
sheet.
D. Use a method that approximates the matching principle.
Next Question
Page: 2 / 63
Exam contains 621 questions
Preferred stock is less risky for investors than is common stock because:
Next Question
Next Question
Question 23 ( Single Topic)
A. A tougher collections policy that reduces the bad debt loss ratio.
B. A higher cost per unit sold.
C. A longer average collection period.
D. An increase in the cost of capital.
Next Question
A. Cash budget.
B. Production budget.
C. Sales budget.
D. Selling and administrative expenses budget.
Next Question
A. A flexible budget.
B. Variance analysis.
C. A contribution margin income statement by segment.
D. Residual income.
A capital investment project will have a higher net present value, everything
else being equal, if it has:
Next Question
Next Question
A. $350,000
B. $500,000
C. $850,000
D. $1,200,000
Next Question
Next Question
Page: 3 / 63
Exam contains 621 questions
Q's per page:
Next Question
A. Direct cutover.
B. Parallel.
C. Pilot.
D. Test.
Next Question
Next Question
Next Question
A. Lack of flexibility.
B. Incompatibility with client/server technology.
C. Employee resistance to change.
D. Inadequate technical support.
Next Question
Next Question
Next Question
The activity that involves a trial run of a product in a typical segment of the
market before proceeding to a national launch is referred to as:
A. Test marketing
B. Experimentation
C. Segmentation
D. Positioning
Next Question
Next Question
A. The strategy is favored when unit costs fall with the increase in units
produced.
B. The strategy is favored when buyers are relatively insensitive to price
increases.
C. The strategy is favored when there is insufficient market capacity and
competitors cannot increase market capacity.
D. The strategy is favored when high price is perceived as high quality.
Next Question
Page: 4 / 63
Exam contains 621 questions
Q's per page:
Which of the following statements is true regarding the use of public key
encryption to secure data while it is being transmitted across a network?
A. Both the key used to encrypt the data and the key used to decrypt the
data are made public.
B. The key used to encrypt the data is kept private but the key used to
decrypt the data is made public.
C. The key used to encrypt the data is made public but the key used to
decrypt the data is kept private.
D. Both the key used to encrypt the data and the key used to decrypt the
data are made private.
Next Question
Next Question
A. Intranet.
B. Extranet.
C. Digital subscriber line.
D. Broadband.
Next Question
A. $170,000
B. $280,000
C. $300,000
D. $540,000
Next Question
Question 45 ( Single Topic)
Next Question
An organization produces two products, X and Y. The materials used for the
production of both products are limited to 500 kilograms (kg) per month. All
other resources are unlimited and their costs are fixed. Individual product
details are as follows:
Product X -
Product Y -
Monthly demand -
100 units
120 units
In order to maximize profit, how much of product Y should the organization
produce each month?
A. 50 units.
B. 60 units.
C. 100 units.
D. 120 units.
Expose Correct Answer
Answer : A
Next Question
Which of the following is useful for forecasting the required level of inventory?
1. Statistical modeling.
2. Information about seasonal variations in demand.
3. Knowledge of the behavior of different business cycles.
4. Pricing models linked to seasonal demand.
A. 1 and 2 only
B. 2 and 3 only
C. 1, 2, and 3 only
D. 1, 2, 3, and 4
Next Question
Next Question
A. Functional departmentalization.
B. Product departmentalization.
C. Matrix organization.
D. Divisional organization.
Next Question
When writing a business memorandum, the writer should choose a writing style
that achieves all of the following except:
Next Question
Page: 5 / 63
Exam contains 621 questions
Q's per page:
Next Question
Next Question
Next Question
A. 1 and 2 only
B. 1 and 3 only
C. 2 and 3 only
D. 1, 2, and 3
Next Question
Which of the following is the best reason for considering the acquisition of a
nondomestic organization?
Next Question
Next Question
A. Filtering.
B. Communication overload.
C. Similar frames of reference.
D. Lack of source credibility.
Next Question
A. 2 only
B. 3 and 4 only
C. 1, 3, and 4 only
D. 1, 2, 3, and 4
Next Question
A. Standardization.
B. Global marketing.
C. Limited exporting.
D. Domestic marketing.
Next Question
Page: 6 / 63
Exam contains 621 questions
Q's per page:
A. Empathetic listening.
B. Reframing.
C. Reflective listening.
D. Dialogue.
Next Question
The cost to enter a foreign market would be highest in which of the following
methods of global expansion?
A. Joint ventures.
B. Licensing.
C. Exporting.
D. Overseas production.
Next Question
Next Question
Next Question
A. 1 and 4 only
B. 2 and 3 only
C. 1, 2, and 3 only
D. 1, 2, and 4 only
Next Question
A. Product departmentalization.
B. Process departmentalization.
C. Functional departmentalization.
D. Customer departmentalization.
Next Question
Which of the following conflict resolution methods should be applied when the
intention of the parties is to solve the problem by clarifying differences and
attaining everyone's objectives?
A. Accommodating.
B. Compromising.
C. Collaborating.
D. Competing.
Next Question
A. A sense of achievement.
B. Promotion.
C. Recognition.
D. An incremental increase in salary.
Next Question
Next Question
According to the Standards, the internal audit activity must evaluate risk
exposures relating to which of the following when examining an organization's
risk management process?
1. Organizational governance.
2. Organizational operations.
3. Organizational information systems.
4. Organizational structure.
A. 1 and 3 only
B. 2 and 4 only
C. 1, 2, and 3 only
D. 1, 2, and 4 only
Next Question
Page: 7 / 63
Exam contains 621 questions
Q's per page:
A. Monitoring.
B. Control activities.
C. Risk assessment.
D. Control environment.
Next Question
Next Question
Next Question
Next Question
Next Question
A. 1 only
B. 4 only
C. 2 and 4
D. 3 and 4
Next Question
Next Question
A. Avoidance.
B. Reduction.
C. Elimination.
D. Sharing.
Next Question
A. Risk response.
B. Risk identification.
C. Identification of context.
D. Risk assessment.
Next Question
Next Question
Next Question
Which of the following are included in ISO 31000 risk principles and guidelines?
Next Question
Next Question
Next Question
Next Question
A. Forming stage.
B. Performing stage.
C. Norming stage.
D. Storming stage.
Next Question
Next Question
Next Question
Question 90 ( Single Topic)
A. 1 and 3 only
B. 2 and 4 only
C. 1, 2, and 4 only
D. 1, 2, 3, and 4
Which of the following is the primary benefit of including end users in the
system development process?
Next Question
Which of the following is the most appropriate test to assess the privacy risks
associated with an organization's workstations?
A. Penetration test.
B. Social engineering test.
C. Vulnerability test.
D. Physical control test.
Expose Correct Answer
Answer : D
Next Question
Next Question
Next Question
Next Question
Next Question
A. The board has overall responsibility for the internal control processes
associated with the CSR program.
B. Management has overall responsibility for the effectiveness of
governance, risk management, and internal control processes associated
with the CSR program.
C. The internal audit activity is responsible for ensuring that CSR
principles are integrated into the organization's policies and procedures.
D. Every employee has a responsibility for ensuring the success of the
organization's CSR objectives.
Next Question
Question 98 ( Single Topic)
Which of the following descriptions of the internal control system are indicators
that risks are managed effectively?
1. Existing controls promote compliance with applicable laws and regulations.
2. The control environment is designed to address all identified risks to the
organization.
3. Key controls for significant risks to the organization remain consistent over
time.
4. Monitoring systems are in place to alert management to unexpected events.
A. 1 and 3.
B. 1 and 4.
C. 2 and 3.
D. 2 and 4.
Next Question
Which of the following is true regarding the COSO enterprise risk management
framework?
Next Question
Next Question
Page: 10 / 63
Exam contains 621 questions
The economic order quantity can be calculated using the following formula:
Which of the following describes how the optimal order size will change if the annual demand
increases by 36 percent?
Next Question
Which of the following statements best describes the frameworks set forth by the International
Standards Organization?
A. Globally accepted standards for industries and processes.
B. Bridging the gaps among control requirements, technical issues, and business risks.
C. Practical guidance and benchmarks for all organizations that use information systems.
D. Frameworks and guidance on enterprise risk management, internal control, and fraud
deterrence.
Next Question
An internal auditor performed a review of IT outsourcing and found that the service provider was
failing to meet the terms of the service level agreement. Which of the following approaches is most
appropriate to address this concern?
A. The organization should review the skill requirements and ensure that the service
provider is maintaining sufficient expertise and retaining skilled resources.
B. The organization should proactively monitor the performance of the service provider,
escalate concerns, and use penalty clauses in the contract where necessary.
C. The organization should ensure that there is a clear management communication strategy
and path for evaluating and reporting on all outsourced services concerns.
D. The organization should work with the service provider to review the current agreement
and expectations relating to objectives, processes, and overall
Next Question
A chief audit executive (CAE) was asked to participate in the selection of an external auditor.
Which of the following would not be a typical responsibility for the
CAE?
Which of the following is the most likely reason an organization may decide to undertake a stock
split?
Next Question
Which of the following is the best approach to overcome entry barriers into a new business?
Next Question
Which of the following techniques would be least effective in resolving the conflict created by an
internal audit client's perception of the audit report as a personal attack on his management
performance?
A. The auditor should focus on the audit client as a person and understand him, rather than
just concentrating on the problem.
B. The auditor should make recommendations based on objective criteria, rather than based
on a subjective assessment.
C. The auditor should explore alternative solutions to address the audit problem, so the audit
client has options.
D. The auditor should take a flexible position on the recommendations and focus on
resolving the issue by addressing the interests of the people concerned.
Expose Correct Answer
Answer : A
Next Question
Which of the following most accurately describes the purpose of application authentication
controls?
A. To ensure that data input into business applications is valid, complete, and accurate.
B. To prevent or detect errors in data processed using business applications.
C. To ensure that business applications are protected from unauthorized logical access.
D. To ensure the validity, accuracy, and completeness of outputs from business applications.
Next Question
Which of the following is always true regarding the use of encryption algorithms based on public
key infrastructure (PKI)?
Next Question
A. 1, 2, and 3
B. 1, 2, and 4
C. 1, 3, and 4
D. 2, 3, and 4
Next Question
Question 111 ( Single Topic)
Which of the following application-based controls is an example of a
programmed edit check?
A. Reasonableness check.
B. Transaction log.
C. Input error correction.
D. Authorization for access.
Next Question
Next Question
An organization's balance sheet indicates that the total asset amount and the
total capital stock amount remained unchanged from one year to the next, and
no dividends were declared or paid. However, the organization reported a loss
of $200,000. Which of the following describes the most likely year-over-year
change to the organization's total liabilities and total stockholder equity?
A. The total liabilities and total stockholder equity both increased.
B. The total liabilities and total stockholder equity both decreased.
C. The total liabilities decreased, and the total stockholder equity
increased.
D. The total liabilities increased, and the total stockholder equity
decreased.
Next Question
An organization accumulated the following data for the prior fiscal year:
Value of -
Percentage of -
Quarter -
Output Produced -
Cost X -
$4,750,000
2.9
$4,700,000
3.0
$4,350,000
3.2
$4,000,000
3.5
Based on this data, which of the following describes the value of Cost X in
relation to the value of Output Produced?
Next Question
A. The internal auditor may cite the use of other standards during audit
communications.
B. If the other standards are government-issued, the internal auditor
should apply them in conjunction with The IIA's Standards.
C. If there are inconsistencies between the other standards and The IIA's
Standards, the internal auditor must use the more restrictive standards.
D. If there are inconsistencies between the other standards and The IIA's
Standards, the internal auditor must use the less restrictive standards.
Next Question
Next Question
Next Question
A. 1 and 2 only
B. 3 and 4 only
C. 1, 2, and 4 only
D. 2, 3, and 4 only
Next Question
A. 1, 2, and 3 only
B. 1, 2, and 4 only
C. 1, 3, and 4 only
D. 2, 3, and 4 only
Next Question
Question 120 ( Single Topic)
Which of the following would not impair the objectivity of internal auditor?
Next Question
Page: 12 / 63
Exam contains 621 questions
Q's per page:
Next Question
Next Question
Question 123 ( Single Topic)
Which of the following statements are true regarding the use of heat maps as risk assessment tools?
1. They focus primarily on known risks, limiting the ability to identify new risks.
2. They rely heavily on objective assessments and related risk tolerances.
3. They are too complex to provide an easily understandable view of key risks.
4. They are helpful but limited in value in a rapidly changing environment.
A. 1 and 2 only
B. 1 and 4 only
C. 2 and 3 only
D. 3 and 4 only
Next Question
The most important reason to use risk assessment in audit planning is to:
Next Question
In creating a risk-based plan, which of the following best describes a top-down approach to
understanding business processes?
Next Question
Which of the following are typical responsibilities for operational management within a risk
management program?
1. Implementing corrective actions to address process deficiencies.
2. Identifying shifts in the organization's risk management environment.
3. Providing guidance and training on risk management processes.
4. Assessing the impact of mitigation strategies and activities.
A. 1 and 2 only
B. 1 and 4 only
C. 2 and 3 only
D. 3 and 4 only
Next Question
A. COBIT helps management understand and manage the risks associated with information
technology (IT) processes.
B. Management needs to determine the cost-benefit ratio of adopting COBIT control
objectives.
C. COBIT control objectives are specific to various IT platforms and help determine
minimum controls.
D. COBIT provides management with the capability to conduct self-assessments against
industry best practices.
Next Question
In order to provide useful information for an organization's risk management decisions, which of
the following factors is least important to assess?
A. The underlying causes of the risk.
B. The impact of the risk on the organization's objectives.
C. The risk levels of current and future events.
D. The potential for eliminating risk factors.
Next Question
According to the Standards, which of the following is based on the assertion that the quality of an
organization's risk management process should improve with time?
A. Process element.
B. Key principles.
C. Maturity model.
D. Assurance.
Next Question
An internal auditor has been asked to conduct an investigation involving allegations of independent
contractor fraud. Which of the following controls would be least effective in detecting any potential
fraudulent activity?
Next Question
A. 1 and 2 only
B. 1 and 3 only
C. 2 and 4 only
D. 3 and 4 only
Next Question
Which of the following are appropriate reasons for internal auditors to document processes as part
of an audit engagement?
1. To determine areas of primary concern.
2. To establish a standard format for process mapping.
3. To define areas of responsibility within the organization.
4. To assess the performance of employees.
A. 1 and 2 only
B. 1 and 3 only
C. 2 and 3 only
D. 2 and 4 only
Next Question
Which of the following phases of a business cycle are marked by an underuse of resources?
1. The trough.
2. The peak.
3. The recovery.
4. The recession.
A. 1 and 3 only
B. 1 and 4 only
C. 2 and 3 only
D. 2 and 4 only
Expose Correct Answer
Answer : B
Next Question
According to the ISO 14001 standard, which of the following is not included in the requirements for
a quality management system?
A. Key processes across the entity which impact quality must be identified and included.
B. The quality management system must be documented in the articles of incorporation,
quality manual, procedures, work instructions, and records.
C. Management must review the quality policy, analyze data about quality management
system performance, and assess opportunities for improvement and the need for change.
D. The entity must have processes for inspections, testing, measurement, analysis, and
improvement.
Next Question
Which of the following professional organizations sets standards for quality and environmental
audits?
Next Question
An organization facing rapid growth decides to employ a third party service provider to manage its
customer relationship management function. Which of the following is true regarding the
supporting application software used by that provider compared to an in-house developed system?
1. Updating documentation is always a priority.
2. System availability is usually more reliable.
3. Data security risks are lower.
4. Overall system costs are lower.
A. 1 and 2 only
B. 1 and 3 only
C. 2 and 4 only
D. 3 and 4 only
Next Question
An organization is considering the outsourcing of its business processes related to payroll and
information technology functions. Which of the following is the most significant area of concern for
management regarding this proposed agreement?
A. Ensuring that payments to the vendor are appropriate and timely for the services
delivered.
B. Ensuring that the vendor has complete management control of the outsourced process.
C. Ensuring that there are means of monitoring the efficiency of the outsourced process.
D. Ensuring that there are means of monitoring the effectiveness of the outsourced process.
Next Question
A. Motivation.
B. Performance.
C. Organizational structure.
D. Communication.
Next Question
Question 139 ( Single Topic)
Where complex problems need to be addressed, which of the following communication networks
would be most appropriate?
A. Chain.
B. All-channel.
C. Circle.
D. Wheel.
Next Question
Which of the following is a strategy that organizations can use to stimulate innovation?
1. Source from the most advanced suppliers.
2. Establish employee programs that reward initiative.
3. Identify best practice competitors as motivators.
4. Ensure that performance targets are always achieved.
A. 1 and 3 only
B. 2 and 4 only
C. 1, 2, and 3 only
D. 1, 2, 3, and 4
Next Question
Question 141 ( Single Topic)
A. 1 and 3 only
B. 1 and 4 only
C. 2 and 3 only
D. 2 and 4 only
Expose Correct Answer
Answer : A
Next Question
Next Question
A. Embryonic, focused.
B. Fragmented, decline.
C. Mature, fragmented.
D. Competitive, embryonic.
Next Question
Next Question
A. Fragmented industries.
B. Declining industries.
C. Mature industries.
D. Emerging industries.
Next Question
A. Invest in marketing.
B. Invest in research and development.
C. Control costs.
D. Shift toward mass production.
Next Question
Next Question
A. Merger.
B. Strategic fit.
C. Joint venture.
D. Strategic goal.
Next Question
Next Question
A. Forming stage.
B. Norming stage.
C. Performing stage.
D. Storming stage.
Next Question
Page: 15 / 63
Exam contains 621 questions
A. Ensuring that the other party has a personal stake in the agreement.
B. Focusing on interests rather than on obtaining a winning position.
C. Considering a few select choices during the settlement phase.
D. Basing the agreement on negotiating power and positioning leverage.
Next Question
Which of the following statements is true regarding the resolution of interpersonal conflict?
Next Question
Question 153 ( Single Topic)
Which of the following would best prevent unauthorized external changes to an organization's data?
Next Question
When granting third parties temporary access to an entity's computer systems, which of the
following is the most effective control?
Next Question
An organization is considering mirroring the customer data for one regional center at another
center. A disadvantage of such an arrangement would be:
Next Question
A. The goal of the change management process is to sustain and improve organizational
operations.
B. The degree of risk associated with a proposed change determines if the change request
requires authorization.
C. In order to protect the production environment, changes must be managed in a repeatable,
defined, and predictable manner.
D. All changes should be tested in a non-production environment before migrating to the
production environment.
Next Question
When auditing an application change control process, which of the following procedures should be
included in the scope of the audit?
1. Ensure system change requests are formally initiated, documented, and approved.
2. Ensure processes are in place to prevent emergency changes from taking place.
3. Ensure changes are adequately tested before being placed into the production environment.
4. Evaluate whether the procedures for program change management are adequate.
A. 1 only
B. 1 and 3 only
C. 2 and 4 only
D. 1, 3, and 4 only
Next Question
An internal auditor discovered that several unauthorized modifications were made to the production
version of an organization's accounting application. Which of the following best describes this
deficiency?
Next Question
Which of the following would provide the most relevant assurance that the application under
development will provide maximum value to the organization?
Next Question
Which of the following does not provide operational assurance that a computer system is operating
properly?
Which of the following statements regarding database management systems is not correct?
A. Database management systems handle data manipulation inside the tables, rather than it
being done by the operating system itself in files.
B. The database management system acts as a layer between the application software and
the operating system.
C. Applications pass on the instructions for data manipulation which are then executed by
the database management system.
D. The data within the database management system can only be manipulated directly by the
database management system administrator.
Expose Correct Answer
Answer : D
Next Question
A. 1 and 4 only
B. 2 and 3 only
C. 2, 3, and 4 only
D. 1, 2, and 4 only
Next Question
A holding company set up a centralized group technology department, using a local area network
with a mainframe computer to process accounting information for all companies within the group.
An internal auditor would expect to find all of the following controls within the technology
department except:
A. Adequate segregation of duties between data processing controls and file security
controls.
B. Documented procedures for remote job entry and for local data file retention.
C. Emergency and disaster recovery procedures and maintenance agreements in place to
ensure continuity of operations.
D. Established procedures to prevent and detect unauthorized changes to data files.
Next Question
A. Star network.
B. Bus network.
C. Token ring network.
D. Mesh network.
Next Question
A department purchased one copy of a software program for internal use. The manager of the
department installed the program on an office computer and then made two complete copies of the
original software.
Copy 1 was solely for backup purposes.
Copy 2 was for use by another member of the department.
In terms of software licenses and copyright law, which of the following is correct?
Next Question
During which phase of disaster recovery planning should an organization identify the business
units, assets, and systems that are critical to continuing an acceptable level of operations?
Next Question
Sales -
$2,300,000
Purchases of materials -
$700,000
Interest expenses -
$30,000
If the value-added tax (VAT) rate is 20 percent and the corporate tax rate is 30 percent, which of the
following is the amount of VAT that the organization has to pay?
A. $34,000
B. $51,000
C. $60,000
D. $320,000
Next Question
Next Question
All of the following are true with regard to the first-in, first-out inventory
valuation method except:
Next Question
Month -
Patient Days -
Incurred -
January -
5,600
$7,900
February -
7,100
$8,500
March -
5,000
$7,400
April -
6,500
$8,200
May -
7,300
$9,100
June -
8,000
$9,800
If the cost of maintenance is expressed in an equation, what is the independent
variable for this data?
A. Fixed cost.
B. Variable cost.
C. Total maintenance cost.
D. Patient days.
Next Question
A. Political.
B. Financial.
C. Social.
D. Tariff.
Next Question
The process of scenario planning begins with which of the following steps?
Next Question
According to IIA guidance, which of the following steps are most important for
an internal auditor to perform when evaluating an organization's social and
environmental impact on the local community?
1. Determine whether previous incidents have been reported, managed, and
resolved.
2. Determine whether a business contingency plan exists.
3. Determine the extent of transparency in reporting.
4. Determine whether a cost/benefit analysis was performed for all related
projects.
A. 1 and 3.
B. 1 and 4.
C. 2 and 3.
D. 2 and 4.
Next Question
Next Question
A. 1, 2, and 3
B. 1, 2, and 4
C. 1, 3, and 4
D. 2, 3, and 4
Next Question
Question 178 ( Single Topic)
Next Question
A. Cash discounts.
B. Quantity discounts.
C. Functional discounts.
D. Seasonal discounts.
Next Question
Which of the following actions is most likely to gain support for process
change?
Next Question
According to IIA guidance, which of the following is a typical risk associated with the tender
process and contracting stage of an organization's IT outsourcing life cycle?
Next Question
Which of the following is true regarding an organization's relationship with external stakeholders?
Next Question
Which stage in the industry life cycle is characterized by many different product variations?
A. Introduction.
B. Growth.
C. Maturity.
D. Decline.
Next Question
Capacity overbuilding is most likely to occur when management is focused on which of the
following?
A. Marketing.
B. Finance.
C. Production.
D. Diversification.
Next Question
A retail organization is considering acquiring a composite textile company. The retailer's due
diligence team determined the value of the textile company to be $50 million. The financial experts
forecasted net present value of future cash flows to be $60 million. Experts at the textile company
determined their company's market value to be $55 million if purchased by another entity.
However, the textile company could earn more than $70 million from the retail organization due to
synergies.
Therefore, the textile company is motivated to make the negotiation successful. Which of the
following approaches is most likely to result in a successful negotiation?
A. Develop a bargaining zone that lies between $50 million and $70 million and create sets
of outcomes between $50 million and $70 million.
B. Adopt an added-value negotiating strategy, develop a bargaining zone between $50
million and $70 million, and create sets of outcomes between $50 million and $70 million.
C. Involve a mediator as a neutral party who can work with the textile company's
management to determine a bargaining zone.
D. Develop a bargaining zone that lies between $55 million and $60 million and create sets
of outcomes between $55 million and $60 million.
Next Question
A. Authorization.
B. Identification.
C. Verification.
D. Validation.
Next Question
According to IIA guidance on IT auditing, which of the following would not be an area examined
by the internal audit activity?
Next Question
According to the waterfall cycle approach to systems development, which of the following
sequence of events is correct?
A. Program design, system requirements, software design, analysis, coding, testing,
operations.
B. System requirements, software design, analysis, program design, testing, coding,
operations.
C. System requirements, software design, analysis, program design, coding, testing,
operations.
D. System requirements, analysis, coding, software design, program design, testing,
operations.
Next Question
Which of the following describes a typical desktop workstation used by most employees in their
daily work?
Next Question
Question 191 ( Single Topic)
Next Question
Question 192 ( Single Topic)
Next Question
Next Question
Next Question
Question 195 ( Single Topic)
A. 1, 2, and 3
B. 1, 2, and 4
C. 1, 3, and 4
D. 2, 3, and 4
Next Question
Which of the following roles would be least appropriate for the internal audit
activity to undertake with regard to an organization's corporate social
responsibility
(CSR) program?
Next Question
A. Control environment.
B. Control activities.
C. Information and communication.
D. Monitoring.
Next Question
Next Question
Which of the following principles are common to both hierarchical and open
organizational structures?
1. Employees at all levels should be empowered to make decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. A superior cannot delegate the ultimate responsibility for results.
A. 1 and 2
B. 1 and 4
C. 2 and 3
D. 3 and 4
Next Question
Which of the following purchasing scenarios would gain the greatest benefit from implementing
electronic data interchange?
Next Question
A. Outsourced business processes should not be considered in the internal audit universe
because the controls are owned by the external service provider.
B. Generally, independence is improved when the internal audit activity reviews outsourced
business processes.
C. The key controls of outsourced business processes typically are more difficult to audit
because they are designed and managed externally.
D. The system of internal controls may be better and more efficient when the business
process is outsourced compared to internally sourced.
When an organization is choosing a new external auditor, which of the following is the most
appropriate role for the chief audit executive to undertake?
Next Question
Next Question
Which of the following conditions could lead an organization to enter into a new business through
internal development rather than through acquisition?
Next Question
Question 206 ( Single Topic)
Which of the following statements about slack time and milestones are true?
1. Slack time represents the amount of time a task may be delayed without delaying the entire
project.
2. A milestone is a moment in time that marks the completion of the project's major deliverables.
3. Slack time allows the project manager to move resources from one task to another to ensure that
the project is finished on time.
4. A milestone requires resource allocation and needs time to be completed.
A. 1 and 4 only
B. 2 and 3 only
C. 1, 2, and 3 only
D. 1, 2, 3, and 4
Next Question
Which of the following are typical audit considerations for a review of authentication?
1. Authentication policies and evaluation of controls transactions.
2. Management of passwords, independent reconciliation, and audit trail.
3. Control self-assessment tools used by management.
4. Independent verification of data integrity and accuracy.
A. 1, 2, and 3
B. 1, 2, and 4
C. 1, 3, and 4
D. 2, 3, and 4
Next Question
At what point during the systems development process should an internal auditor verify that the
new application's connectivity to the organization's other systems has been established correctly?
Next Question
Which of the following is not a potential area of concern when an internal auditor places reliance on
spreadsheets developed by users?
Next Question
According to IIA guidance, which of the following would be a primary reason for an internal
auditor to test the organization's IT contingency plan?
A. To ensure that adequate controls exist to prevent any significant business interruptions.
B. To identify and address potential security weaknesses within the system.
C. To ensure that tests contribute to improvement of the program.
D. To ensure that deficiencies identified by the audit are promptly addressed.
If the profit margin of an organization decreases, and all else remains equal, which of the following
describes how the "Funds Needed" line in the graph below will shift?
A. The "Funds Needed" line will remain pointed upward, but will become less steep.
B. The "Funds Needed" line will remain pointed upward, but will become more steep.
C. The "Funds Needed" line will point downward with a minimal slope.
D. The "Funds Needed" line will point downward with an extreme slope.
Next Question
Which of the following techniques is the most relevant when an internal auditor conducts a
valuation of an organization's physical assets?
A. Observation.
B. Inspection.
C. Original cost.
D. Vouching.
Next Question
A. A zero-based budget provides estimates of costs that would be incurred under different
levels of activity.
B. A zero-based budget maintains focus on the budgeting process.
C. A zero-based budget is prepared each year and requires each item of expenditure to be
justified.
D. A zero-based budget uses input from lower-level and middle-level managers to formulate
budget plans.
Next Question
If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the
auditor should do which of the following?
A. Conform with all other parts of The IIA's Standards and provide appropriate disclosures.
B. Conform with all other parts of The IIA's Standards; there is no need to provide
appropriate disclosures.
C. Continue the engagement without conforming with the other parts of The IIA's
Standards.
D. Withdraw from the engagement.
Next Question
Which of the following physical access controls often functions as both a preventive and detective
control?
A. Locked doors.
B. Firewalls.
C. Surveillance cameras.
D. Login IDs and passwords.
An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is
unable to get the desired return on investment and output per hour of labor. Based on this
information, the organization is most likely focused on which of the following?
Next Question
An organization that sells products to a foreign subsidiary wants to charge a price that will decrease
import tariffs. Which of the following is the best course of action for the organization?
Next Question
An investor has acquired an organization that has a dominant position in a mature, slow-growth
industry and consistently creates positive financial income. Which of the following terms would the
investor most likely label this investment in her portfolio?
A. A star.
B. A cash cow.
C. A question mark.
D. A dog.
Reference:
https://www.businessnewsdaily.com/5693-bcg-matrix.html
Next Question
An organization with global headquarters in the United States has subsidiaries in eight other
nations. If the organization operates with an ethnocentric attitude, which of the following statements
is true?
A. Standards used for evaluation and control are determined at local subsidiaries, not set by
headquarters.
B. Orders, commands, and advice are sent to the subsidiaries from headquarters.
C. People of local nationality are developed for the best positions within their own country.
D. There is a significant amount of collaboration between headquarters and subsidiaries.
Next Question
Which of the following data security policies is most likely to be the result of a data privacy law?
A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The
manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed
manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the
following assumptions needs to be true?
A. Fixed and variable manufacturing costs are less than the special offer selling price.
B. The manufacturer can fulfill the order without expanding the capacities of the production
facilities.
C. Costs related to accepting this offer can be absorbed through the sale of other products.
D. The manufacturer's production facilities are currently operating at full capacity.
Next Question
Which of the following responsibilities would ordinarily fall under the help desk function of an
organization?
Next Question
As it relates to the data analytics process, which of the following best describes the purpose of an
internal auditor who cleaned and normalized data?
Reference:
https://iaonline.theiia.org/blogs/Jim-Pelletier/2018/Pages/6-Essentials-to-Jump-start-Data-
Analytics-in-Internal-Audit.aspx
Next Question
Question 224 ( More Questions.)
Which of the following authentication device credentials is the most difficult to revoke when an
employee's access rights need to be removed?
Next Question
A. To restore all data and systems immediately after the occurrence of an incident.
B. To set the maximum allowable downtime to restore systems and data after the occurrence
of an incident.
C. To set the point in time to which systems and data must be recovered after the occurrence
of an incident.
D. To restore data and systems to a previous point in time after the occurrence of an
incident.
Next Question
Which of the following IT-related activities is most commonly performed by the second line of
defense?
Next Question
With regard to disaster recovery planning, which of the following would most likely involve
stakeholders from several departments?
Next Question
An internal auditor observed that the organization's disaster recovery solution will make use of a
cold site in a town several miles away. Which of the following is likely to be a characteristic of this
disaster recovery solution?
Next Question
During her annual performance review, a sales manager admits that she experiences significant
stress due to her job but stays with the organization because of the high bonuses she earns. Which
of the following best describes her primary motivation to remain in the job?
A. Intrinsic reward.
B. Job enrichment.
C. Extrinsic reward.
D. The hierarchy of needs.
Expose Correct Answer
Answer : C
Reference:
https://www.verywellmind.com/what-is-extrinsic-motivation-2795164
Next Question
What kind of strategy would be most effective for an organization to adopt in order to implement a
unique advertising campaign for selling identical product lines across all of its markets?
A. Export strategy.
B. Transnational strategy.
C. Multi-domestic strategy.
D. Globalization strategy.
Reference:
https://www.globalnegotiator.com/international-trade/dictionary/multidomestic-strategy/
Reference:
https://www.corporatecomplianceinsights.com/encryption-what-is-it-good-for-risk-compliance/
Next Question
Which of the following is an example of a key systems development control typically found in the
in-house development of an application system?
A. Logical access controls monitor application usage and generate audit trails.
B. The development process is designed to prevent, detect, and correct errors that may
occur.
C. A record is maintained to track the process of data from input, to output, to storage.
D. Business users"™ requirements are documented, and their achievement is monitored.
Next Question
When using data analytics during a review of the procurement process, what is the first step in the
analysis process?
Next Question
According to IIA guidance, which of the following statements is true regarding analytical
procedures?
A. Data relationships are assumed to exist and to continue where no known conflicting
conditions exist.
B. Analytical procedures are intended primarily to ensure the accuracy of the information
being examined.
C. Data relationships cannot include comparisons between operational and statistical data.
D. Analytical procedures can be used to identify unexpected differences, but cannot be used
to identify the absence of differences.
Next Question
Next Question
Reference:
https://phoenixnap.com/blog/what-data-integrity
Next Question
A. Communication conflicts.
B. Slower decision making.
C. Loss of economies of scale.
D. Vulnerabilities in sharing knowledge.
Reference:
https://smallbusiness.chron.com/disadvantages-centralized-control-business-20670.html
Next Question
An organization's account for office supplies on hand had a balance of $9,000 at the end of year
one. During year two, the organization recorded an expense of
$45,000 for purchasing office supplies. At the end of year two, a physical count determined that the
organization has $11,500 in office supplies on hand. Based on this information, what would be
recorded in the adjusting entry at the end of year two?
Next Question
According to IIA guidance on IT, which of the following plans would pair the identification of
critical business processes with recovery time objectives?
Reference:
https://searchitchannel.techtarget.com/feature/Business-impact-analysis-for-business-continuity-
Recovery-time-requirements
According to IIA guidance on IT, which of the following would be considered a primary control for
a spreadsheet to help ensure accurate financial reporting?
Next Question
An organization requires an average of 58 days to convert raw materials into finished products to
sell. An average of 42 additional days is required to collect receivables. If the organization takes an
average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
A. 26 days.
B. 90 days.
C. 100 days.
D. 110 days.
Next Question
A. There is a greater need for organizations to rely on users to comply with policies and
procedures.
B. With fewer devices owned by the organization, there is reduced need to maintain
documented policies and procedures.
C. Incident response times are less critical in the BYOD environment, compared to a
traditional environment.
D. There is greater sharing of operational risk in a BYOD environment.
Next Question
Next Question
Which of the following statements is most accurate concerning the management and audit of a web
server?
Next Question
Next Question
A retail organization mistakenly did not include $10,000 of inventory in the physical count at the
end of the year. What was the impact to the organization's financial statements?
Next Question
According to IIA guidance on IT, which of the following controls the routing of data packets to link
computers?
A. Operating system.
B. Control environment.
C. Network.
D. Application program code.
Next Question
Reference:
https://chapters.theiia.org/montreal/ChapterDocuments/GTAG%208%20-%20Auditing
%20application%20controls.pdf
Next Question
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The
auditor has obtained data and is working to eliminate redundancies in the data. Which of the
following statements is true regarding this scenario?
An internal auditor was asked to review an equal equity partnership. In one sampled transaction,
Partner A transferred equipment into the partnership with a self- declared value of $10,000, and
Partner B contributed equipment with a self-declared value of $15,000. The capital accounts of each
partner were subsequently credited with $12,500. Which of the following statements is true
regarding this transaction?
A. The capital accounts of the partners should be increased by the original cost of the
contributed equipment.
B. The capital accounts should be increased using a weighted average based on the current
percentage of ownership.
C. No action is needed, as the capital account of each partner was increased by the correct
amount.
D. The capital accounts of the partners should be increased by the fair market value of their
contribution.
Expose Correct Answer
Answer : C
Next Question
Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss
of data if there was a disaster at its data center. Which of the following test results would likely lead
the auditor to this conclusion?
A. Requested backup tapes were not returned from the offsite vendor in a timely manner.
B. Returned backup tapes from the offsite vendor contained empty spaces.
C. Critical systems have been backed up more frequently than required.
D. Critical system backup tapes are taken off site less frequently than required
Next Question
Reference:
https://chapters.theiia.org/montreal/ChapterDocuments/GTAG%201%20-%20Information
%20technology%20controls_2nd%20ed.pdf
Next Question
An organization has an established bring-your-own-device policy. Due to this policy, which of the
following privacy risks would be most relevant to the organization?
A. Employees who consider updates of software or operating systems degrading to the
performance of their devices might choose not to install the updates.
B. Confidential intellectual property of the organization may be compromised if the smart
device is physically lost.
C. Concern by employees that the organization could intrusively monitor them through their
smart devices.
D. Malware may infect smart devices that contain the organization's confidential data if the
device does not have adequate security restrictions.
Next Question
An internal auditor found the following information while reviewing the monthly financial
statements for a wholesaler of safety glasses:
Opening inventory: 1,000 units at $2 per unit
Purchased: 5,000 units at $3 per unit
Sold: 3,000 units at $7 per unit
The cost of goods sold was reported at $8,500. Which of the following inventory methods was used
to derive this value?
Next Question
Which of the following capital budgeting techniques considers the expected total net cash flows
from investment?
A. Cash payback.
B. Annual rate of return.
C. Incremental analysis.
D. Net present value.
Reference:
https://castudyweb.com/wp-content/uploads/2019/05/Financial-Management-Module-II.pdf
Next Question
A rapidly expanding retail organization continues to be tightly controlled by its original small
management team. Which of the following is a potential risk in this vertically centralized
organization?
Next Question
Which of the following statements is true regarding the capital budgeting procedure known as
discounted payback period?
Reference:
https://www.investopedia.com/terms/d/discounted-payback-period.asp#:~:text=The%20discounted
%20payback%20period%20is,the%20time%20value
%20of%20money
Next Question
Which of the following is classified as a product cost using the variable costing method?
1. Direct labor costs.
2. Insurance on a factory.
3. Manufacturing supplies.
4. Packaging and shipping costs.
A. 1 and 2.
B. 1 and 3.
C. 2 and 4.
D. 3 and 4.
Next Question
An organization has 1,000 units of a defect item in stock. Per unit, market price is $10; production
cost is $4; and the defect selling price is $5. What is the carrying amount (inventory value) of
defects at year end?
A. $0
B. $4,000
C. $5,000
D. $10,000
Next Question
Next Question
Next Question
A. Password selection.
B. Password aging.
C. Password lockout.
D. Password rotation.
Expose Correct Answer
Answer : D
Next Question
Reference:
https://www.mindtools.com/pages/article/herzberg-motivators-hygiene-
factors.htm
Next Question
Which of the following best explains why an organization would enter into a
capital lease contract?
Next Question
Reference:
https://www.investopedia.com/terms/a/absorptioncosting.asp
Next Question
Next Question
A. Process mining.
B. Process analysis.
C. Data mining.
D. Data analysis.
Reference:
https://www.researchgate.net/profile/Mohamed_Hammad11/post/What_instrum
ent_is_used_to_analyze_qualitative_descriptive_data/
attachment/59d659ca79197b80779af218/AS
%3A543750520664064%401506651634578/download/CHAPTER+6-
+DATA+ANALYSIS+AND
+INTERPRETATION.pdf
Next Question
Next Question
Page: 27 / 63
Exam contains 621 questions
Q's per page:
10
30 50
100
621
COLLAPSE ALL
According to IIA guidance, which of the following best describes an adequate management (audit)
trail application control for the general ledger?
Next Question
A. The risk that users try to bypass controls and do not install required software updates.
B. The risk that smart devices can be lost or stolen due to their mobile nature.
C. The risk that an organization intrusively monitors personal information stored on smart
devices.
D. The risk that proprietary information is not deleted from the device when an employee
leaves.
Next Question
Which of the following describes the most effective control that restricts access to secure areas?
Next Question
Which type of bond sells at a discount from face value, then increases in value annually until it
reaches maturity and provides the owner with the total payoff?
A. High-yield bonds.
B. Commodity-backed bonds.
C. Zero coupon bonds.
D. Junk bonds.
Reference:
https://www.investopedia.com/terms/z/zero-couponbond.asp
Next Question
In an organization that produces chocolate, the leadership team decides that the organization will
open a milk production facility for its milk chocolate. Which of the following strategies has the
organization chosen?
A. Vertical integration.
B. Unrelated diversification.
C. Differentiation.
D. Focus.
Next Question
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes
that the organization allows third parties (vendors and visitors) to use outside smart devices to
access its proprietary networks and systems. Which of the following types of smart device risks
should the internal auditor be most concerned about?
A. Compliance.
B. Privacy.
C. Strategic.
D. Physical security.
Next Question
Which of the following types of data analytics would be used by a hospital to determine which
patients are likely to require readmittance for additional treatment?
A. Predictive analytics.
B. Prescriptive analytics.
C. Descriptive analytics.
D. Diagnostic analytics.
Expose Correct Answer
Answer : A
Reference:
https://www.healthcareitnews.com/sponsored-content/predictive-analytics-used-help-large-hospital-
group-reduce-readmission-rates
Next Question
The audit committee has asked the internal audit activity to integrate data analytics into all work
programs going forward. To accomplish this, which of the following describes the first step an audit
team should take when planning for an audit?
A. Ensure that there are sufficient audit resources or train personnel in data analytics.
B. Obtain and assess as much data as possible for the audit.
C. Identify the business question or need, data required, and expected results.
D. Gain management's approval and willingness to accept audit findings based on data
analytics.
Next Question
Which of the following is a project planning methodology that involves a complex series of
required simulations to provide information about schedule risk?
Reference:
https://opentextbc.ca/projectmanagement/chapter/chapter-16-risk-management-planning-project-
management/
Next Question
A. Version control.
B. Privacy.
C. Portability.
D. Secure authentication
A. Horizontal analysis.
B. Vertical analysis.
C. Ratio analysis.
D. Trend analysis.
Next Question
Which of the following is a primary driver behind the creation and prioritization of new strategic
initiatives established by an organization?
A. Risk tolerance.
B. Performance.
C. Threats and opportunities.
D. Governance.
Next Question
A. Tampering.
B. Hacking.
C. Phishing.
D. Piracy.
Next Question
With regard to project management, which of the following statements about project crashing is
true?
Reference:
https://www.simplilearn.com/fast-tracking-vs-crashing-article#:~:text=What%20is%20Crashing
%3F,for%20the%20least%20cost%20possible
Next Question
A. Limit the use of the employee devices for personal use to mitigate the risk of exposure to
organizational data.
B. Ensure that relevant access to key applications is strictly controlled through an approval
and review process.
C. Institute detection and authentication controls for all devices used for network
connectivity and data storage.
D. Use management software to scan and then prompt patch reminders when devices
connect to the network.
Expose Correct Answer
Answer : D
Next Question
Reference:
https://www.referenceforbusiness.com/encyclopedia/Man-Mix/Matrix-Management-and-
Structure.html
Next Question
Which of the following would most likely be found in an organization that uses a decentralized
organizational structure?
Next Question
Next Question
A. Contribution margin is the amount remaining from sales revenue after fixed expenses
have been deducted.
B. Breakeven point is the amount of units sold to cover variable costs.
C. Breakeven occurs when the contribution margin covers fixed costs.
D. Following breakeven, net operating income will increase by the excess of fixed costs less
the variable costs per units sold.
Reference:
https://courses.lumenlearning.com/acctmgrs/chapter/5-3-the-contribution-margin-income-
statement/#:~:text=The%20contribution%20margin%
20represents%20sales,%2C%20the%20name%20contribution%20margin
Next Question
A technology developer has entered a two-year contract with another organization to design new
software. According to IIA guidance, which of the following provisions of this agreement would be
the most effective to protect the developer's product knowledge and expertise?
Reference:
https://docs.oracle.com/cd/B10501_01/server.920/a96524/c05dicti.htm
Next Question
Reference:
https://www.investopedia.com/terms/m/management-by-objectives.asp
Next Question
A. 1 and 2.
B. 1 and 4.
C. 3 and 4.
D. 2 and 3.
Next Question
A. Esteem by colleagues.
B. Self-fulfillment.
C. Sense of belonging in the organization.
D. Job security.
Reference:
https://opentextbc.ca/businessopenstax/chapter/maslows-hierarchy-of-needs/
Next Question
Next Question
Next Question
Which of the following describes the most appropriate set of tests for auditing a
workstation's logical access controls?
A. Review the list of people with access badges to the room containing
the workstation and a log of those who accessed the room.
B. Review the password length, frequency of change, and list of users for
the workstation's login process.
C. Review the list of people who attempted to access the workstation and
failed, as well as error messages.
D. Review the passwords of those who attempted unsuccessfully to
access the workstation and the log of their activity.
Expose Correct Answer
Answer : B
Next Question
During which phase of the contracting process are contracts drafted for a
proposed business activity?
A. Initiation phase.
B. Bidding phase.
C. Development phase.
D. Management phase.
Next Question
A. Anti-malware software.
B. Authentication.
C. Spyware.
D. Rooting.
Next Question
According to IIA guidance on IT, which of the following strategies would provide
the most effective access control over an automated point-of-sale system?
Next Question
Page: 30 / 63
Exam contains 621 questions
Q's per page:
10
30 50
100
621
COLLAPSE ALL
According to IIA guidance, which of the following statements is true with regard
to workstation computers that access company information stored on the
network?
Next Question
Next Question
Reference:
https://na.theiia.org/about-us/Public%20Documents/Esther%20R
%20%20Sawyer%20Research%20Manuscript%207-26-11-Rachel%20Bond.pdf
Next Question
Next Question
According to IIA guidance, which of the following would be the best first step to
manage risk when a third party is overseeing the organization's network and
data?
A. Creating a comprehensive reporting system for vendors to
demonstrate their ongoing due diligence in network operations.
B. Drafting a strong contract that requires regular vendor control reports
and a right-to-audit clause.
C. Applying administrative privileges to ensure right-to-access controls
are appropriate.
D. Creating a standing cybersecurity committee to identify and manage
risks related to data security.
Next Question
Which of the following is a security feature that involves the use of hardware
and software to filter or prevent specific information from moving between the
inside network and the outside network?
A. Authorization.
B. Architecture model.
C. Firewall.
D. Virtual private network
Next Question
Which of the following is most important for an internal auditor to check with
regard to the database version?
Next Question
A. Greater cost-effectiveness,
B. Increased economies of scale.
C. Larger talent pool.
D. Strong internal controls.
Reference:
https://www.economicsdiscussion.net/management/advantages-and-
disadvantages-of-decentralization/31848
Next Question
Next Question
Which of the following contract concepts is typically given in exchange for the
execution of a promise?
A. Lawfulness.
B. Consideration
C. Agreement
D. Discharge.
Expose Correct Answer
Answer : B
Reference:
https://law.jrank.org/pages/5690/Contracts-Elements-Contract.html
Next Question
Page: 31 / 63
Exam contains 621 questions
Q's per page:
10
30 50
100
621
COLLAPSE ALL
A. Applications.
B. Technical infrastructure.
C. External connections.
D. IT management.
Next Question
Which of the following is the most appropriate way to record each partner's
initial investment in a partnership?
Reference:
https://www.slideshare.net/ArthikDavianti/accounting-for-partnership-46681465
Next Question
An internal auditor reviews a data population and calculates the mean, median,
and range.
Next Question
Next Question
Next Question
Next Question
Next Question
Which of the following would be the best argument for using the direct write-off
method?
Next Question
Next Question
Which of the following strategies offers the greatest alignment with the board's
focus?