Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

IIA-CIA-Part3-3P Exam Dumps - CIA Exam Part Three: Business Knowledge for Internal Auditing

Go to page:
Question # 33

Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?

A.

Intranet.

B.

Extranet.

C.

Digital subscriber line.

D.

Broadband.

Full Access
Question # 34

A small furniture-manufacturing firm with 100 employees is located in a two-story building and does not plan to expand. The furniture manufactured is not special-ordered or custom-made. The most likely structure for this organization would be:

A.

Functional departmentalization.

B.

Product departmentalization.

C.

Matrix organization.

D.

Divisional organization.

Full Access
Question # 35

At a manufacturing plant, how would using Internet of Things during the production process benefit the organization?

A.

It would provide the ability to monitor in real-time.

B.

It would assist in securing sensitive data.

C.

It would help detect cyberattacks in a more timely fashion.

D.

It would assist in ensuring that data integrity is maintained.

Full Access
Question # 36

Which of the following budgets serves as a basis for the budgeted income statement?

A.

All financial budgets

B.

All operating budgets

C.

Only the cash budget and budgeted balance sheet

D.

Only the sales and production budgets

Full Access
Question # 37

Which of me following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

A.

First-in first-out method (FIFO)

B.

Last-in first-out method (LIFO)

C.

Specific identification method

D.

Average-cost method

Full Access
Question # 38

An organization decided to install a motion detection system in its warehouse to protect against after-hours theft. According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?

A.

Avoidance.

B.

Reduction.

C.

Elimination.

D.

Sharing.

Full Access
Question # 39

Which of the following is useful for forecasting the required level of inventory?

1) Statistical modeling.

2) Information about seasonal variations in demand.

3) Knowledge of the behavior of different business cycles.

4) Pricing models linked to seasonal demand.

A.

1 and 2 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, 3, and 4

Full Access
Question # 40

Which of the following are typical audit considerations for a review of authentication?

1) Authentication policies and evaluation of controls transactions.

2) Management of passwords, independent reconciliation, and audit trail.

3) Control self-assessment tools used by management.

4) Independent verification of data integrity and accuracy.

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Full Access
Go to page: