Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CCSA Exam Dumps - Certification in Control Self-Assessment® (CCSA®)

Question # 4

The risk remaining after management takes action to reduce the impact and likelihood of an adverse event is called residual risk.

A.

True

B.

False

Full Access
Question # 5

_________ structures tend to evolve in highly formal, centralized organizations where employees are subject to strict controls and little flexibility in decision making.

A.

Simple

B.

Professional

C.

Mechanistic

D.

Organic

Full Access
Question # 6

An ethical tone has been established at the top of the organization and has been communicated throughout the organization.

A.

True

B.

False

Full Access
Question # 7

Which of the following is NOT the process risk assessment?

A.

Risk Management

B.

Risk Identification

C.

Risk Measurement

D.

Risk Prioritization

Full Access
Question # 8

Which of the following is NOT the category of Control?

A.

Preventive

B.

Precautionary

C.

Detective

D.

Corrective

Full Access
Question # 9

“I understand how to use the business unit’s new automated accounting software”, this question falls in which category?

A.

Core questions

B.

Business questions

C.

workshop questions

D.

Noneof the above

Full Access
Question # 10

The four domains of emotional intelligence includes; Self-awareness, Self-management, Social awareness and:

A.

Organizational awareness

B.

Social skill

C.

Achievement Orientation

D.

Initiative

Full Access
Question # 11

Purchase insurance coverage when:

A.

To avoiding and eliminating the risks where and when possible.

B.

The risk is catastrophic in nature or beyond the capacity of the organization to absorb from current funds.

C.

The expenditure of premiums is not justified by the services incidental to the insurance contract, or other services.

D.

All of the above

Full Access
Question # 12

Operational risk is the day to day mitigation of safety and health risks of employees performing their jobs.

A.

True

B.

False

Full Access
Question # 13

Which of the following is Correct?

A.

The decision symbol have three exit points, these can be on the sides and the bottom.

B.

Flowcharts generally flow from top to bottom and right to left.

C.

Flowchart symbols may or may not start with a terminal symbol.

D.

Flowchart symbols should have a single entry point on the bottom of the symbol.

Full Access
Question # 14

The employee theft risk has safeguard supply inventory as a control objective and uses which technique to control risk?

A.

Develop recovery technique

B.

Install detection devices

C.

Develop quality control structure

D.

install security camera

Full Access
Question # 15

Which of the following is Correct?

A.

Data envelopment analysis (DEA) expands the multiple-input/multiple-output model of efficiency measurement to the real world environment of multiple-input/multipleoutput organizations.

B.

Data envelopment analysis (DEA) expands the single-input/multiple-output model of performance measurement to the real world environment of single-input/multiple-output organizations.

C.

Data envelopment analysis (DEA) expands the single-input/multiple-output model of efficiency measurement to the real world environment of multiple-input/multiple-output organizations.

D.

Data envelopment analysis (DEA) expands the multiple-input/multiple-output model of performance measurement to the real world environment of multiple-input/multipleoutput organizations.

Full Access
Question # 16

The process of identifying best practices and comparing them to one’s own organization is called:

A.

Exhaustive comparison

B.

Benchmarking

C.

Program Evaluation

D.

Timeliness

Full Access
Question # 17

What provide means for evaluating the use of inputs to achieve outputs?

A.

Input/Output measures

B.

Non-Financial measures

C.

Quantifiable measures

D.

Operational measures

Full Access
Question # 18

Accounting controls are:

A.

Procedures and information related to the activity-level achievements of processes and reliability of financial records.

B.

Information related to the controlling of assets and reliability of financial records.

C.

Procedures related to the management of expenses and reliability of financial records.

D.

Procedures and information related to the safeguarding of assets and reliability of financial records.

Full Access
Question # 19

A document that outlines in visual and narrative format the processes and control points within the process is called:

A.

Flowchart

B.

Visual aids

C.

Visual illustration

D.

None of the above

Full Access
Question # 20

_________ refers to recommended actions should take into account relevant resource limitations.

A.

Sufficiency

B.

Feasibility

C.

Consistency

D.

Reliability

Full Access
Question # 21

To relate high-level goals, aligned with and supporting the entity’s mission/vision is called:

A.

Strategic act

B.

Operational law

C.

Objective setting

D.

Event identification

Full Access
Question # 22

No proper documentation of adds, changes or deletions to vendor master file is a fraud warning sign of:

A.

Personality characteristics

B.

Organizational characteristics

C.

Accounts payable

D.

Accounts receivable

Full Access
Question # 23

The technique which allows for the study of past and current patterns and can be used to project future patterns is called:

A.

Inspection

B.

Examination

C.

Data collection

D.

Time series

Full Access
Question # 24

A control objective is a statement of the desired result or purpose to be achieved by implementing control procedures within any activity.

A.

True

B.

False

Full Access
Question # 25

The aim of the workshop is to evaluate, update, validate, improve and streamline the whole process and its component activities in:

A.

Procedure-based format

B.

Process-based format

C.

Activity-based format

D.

Process-based format

Full Access
Question # 26

Principles relevant to profession of internal auditing and rules of conduct that describe their behaviors are the components of:

A.

Auditing Reviews

B.

Internal Auditing Profession

C.

Auditing Standards

D.

Institute of Internal Auditors

Full Access
Question # 27

Work group participants may be suspicious and even hostile, seeing CSA as a management ploy to find out more about them, when:

A.

auditor implements several critical points with respect to use of CSA

B.

auditor doesn’t able to recognize several critical points with respect to use of CSA

C.

auditor reports several critical points with respect to use of CSA

D.

auditor recognizes several critical points with respect to use of CSA

Full Access
Question # 28

Risk is assessed at which three levels?

A.

Strategic, Process and Operational

B.

Business, Process and Operational

C.

Strategic, Process and Assertion

D.

Quantifiable, Strategic, and Operational

Full Access
Question # 29

Substantive tests are:

A.

procedures designed to test for validity of flowcharts.

B.

activities designed to test for risk assessment.

C.

procedures designed to test for errors in the system of internal control.

D.

procedures designed to test for errors in the automated control systems.

Full Access
Question # 30

Management has a strategy to ensure that ____________ is effective and will trigger separate evaluations where problems are identified or systems are critical and testing is periodically desirable.

A.

System monitoring

B.

Activity-level monitoring

C.

Internal control monitoring

D.

Ongoing monitoring

Full Access
Question # 31

The ability to take charge and inspire with a compelling vision is known as:

A.

Directed vision

B.

Visionary leadership

C.

Visionary management

D.

Intended vision

Full Access
Question # 32

New employees, consultants and contractors must receive security awareness training and supporting documentation at the time of employment refers to:

A.

Employee orientation

B.

Confidentiality agreement

C.

Both A & B

D.

Neither A nor B

Full Access
Question # 33

SWOT Analysis is:

A.

the process of analyzing environmental information

B.

the process of monitoring environmental information

C.

the process of organization’s hierarchical information

D.

the process of analyzing technological policies

Full Access
Question # 34

Which if the following is Correct?

A.

Vulnerability/control risk is determined after ranking control activities.

B.

Vulnerability/control risk is determined after ranking risk assessment.

C.

Vulnerability/control risk is determined after ranking inherent risk.

D.

Vulnerability/control risk is determined after ranking competence and integrity values.

Full Access
Question # 35

An organization-wide commitment to quality is called Quality control.

A.

True

B.

False

Full Access
Question # 36

Which of the following is NOT the step involved in evaluating the internal controls?

A.

Identify control points

B.

Document an understanding of the control environment

C.

Assess the level of control risk

D.

Define the adequacy of the system of internal control

Full Access
Question # 37

Which of the following is NOT the step in developing the strategic planning process?

A.

To determine the amount of change occurring in the organization.

B.

Develop one or more general statements in the form of mission and objective.

C.

Develop specific plans for achieving objectives.

D.

Communicate the plan to affected staff.

Full Access
Question # 38

In any organization of people, ___________ is the blending of purpose, commitment, capability, monitoring and learning.

A.

Standardization

B.

Communication

C.

Essence of control

D.

Reliability of internal/external reporting

Full Access
Question # 39

Which of the following is Correct?

A.

Risk appears in the finance profession as a qualitative element of holding expenses or the opportunity to gain profits from such investments.

B.

Risk appears in the finance profession as a quantitative element of holding liabilities or the opportunity to gain profits from such investments.

C.

Risk appears in the finance profession as a quantifiable element of holding assets or the opportunity to gain profits from such investments.

D.

Risk appears in the finance profession as a quantitative element of holding revenues or the opportunity to gain profits from such investments.

Full Access
Question # 40

___________ is the uncertainty or exposures that exist assuming no controls are in place.

A.

Systematic risk

B.

Business risk

C.

Procedural risk

D.

Inherent risk

Full Access