Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part1 Exam Dumps - Essentials of Internal Auditing

Go to page:
Question # 57

Outsourcing a business activity is considered which of the following risk management techniques?

A.

Sharing a risk.

B.

Avoiding a risk.

C.

Reducing a risk.

D.

Mitigating a risk

Full Access
Question # 58

An internal auditor was completely honest with operational management when delivering unfavorable audit results. Which of the following best describes the IIA Code of Ethics principle that the auditor demonstrated?

A.

Integrity

B.

Objectivity

C.

Competency

D.

Transparency

Full Access
Question # 59

Which of the following types of fraud tests would be most effective if an internal auditor was looking for possible fictitious vendors?

A.

Checking for invoice amounts that do not match that of the purchase order.

B.

Searching for identical invoice numbers and payment amounts.

C.

Running checks to uncover post office box addresses matching employee addresses.

D.

Comparing prices across vendors to see whether one vendor is unreasonably high.

Full Access
Question # 60

What should be the first step for a newly hired chief audit executive to build and maintain the proficiency of the internal audit activity'?

A.

Incorporate the basic criteria of internal audit competency into job descriptions

B.

Complete a periodic skills assessment of the internal audit activity

C.

Develop a competency or skill assessment tool.

D.

Perform benchmarking with competitors to learn what other firms are doing related to this topic

Full Access
Question # 61

Which of the following would the chief audit executive be required to disclose in the communication of quality assessment results to senior management and the board?

A.

The cost and frequency of both internal and external assessments.

B.

Any assumptions made by the assessment team

C.

A potential conflict of interest of the assessment team.

D.

The assessment team’s execution plan of relevant procedures.

Full Access
Question # 62

Which of the following is true for consulting engagements'?

A.

The internal audit activity must ensure management actions have been effectively implemented or risk accepted

B.

A work program for the engagement is not required but may be developed

C.

The nature of consulting services does not have to be in the internal audit charter

D.

Risks identified from the engagement must be considered when evaluating the organization's risk management processes

Full Access
Question # 63

An internal auditor performed a risk assessment and concluded that the controls over access privileges to a bank account were appropriate. Later, the auditor learned that a contractor was using a shared password provided by an authorized user of the account. Which of the following statements best describes the auditor's application of due professional care?

A.

Due professional care was exercised, despite the auditor’s failure to identify the significant risk.

B.

Due professional care was not exercised because the auditor failed to identify all the significant risks during the risk assessment.

C.

Due professional care was not exercised because the residual risk from the possibility of authorized users sharing their passwords was not considered.

D.

Due professional care was not exercised because the auditor failed to conduct interviews to obtain testimonial evidence of possible password sharing

Full Access
Question # 64

A large commercial bank was fined by regulators for fraudulent practices when employees, over a period of time, opened thousands of new accounts for existing clients without the clients' consent. It was later found that employees were given unrealistic new account targets and were aggressively monitored by management on a daily basis.

Which of the following controls would have most likely reduced the likelihood of the fraudulent practice from occurring?

A.

An evaluation of the current performance and compensation program.

B.

The performance of background investigations on all existing employees.

C.

The availability of fraud training to all employees.

D.

The availability of an employee whistleblower hotline

Full Access
Go to page: