New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part3-3P Exam Dumps - CIA Exam Part Three: Business Knowledge for Internal Auditing

Go to page:
Question # 57

Which of the following should software auditors do when reporting internal audit findings related to enterprise wide resource planning?

A.

Draft separate audit reports for business and IT management

B.

Connect IT audit findings to business issues

C.

Include technical details to support IT issues

D.

Include an opinion on financial reporting accuracy and completeness

Full Access
Question # 58

Which of the following are the most common characteristics of big data?

A.

Visibility, validity, vulnerability

B.

Velocity, variety volume.

C.

Complexity completeness constancy

D.

Continuity, control convenience

Full Access
Question # 59

Which of the following is a characteristic of using a hierarchical control structure?

A.

Less use of policies and procedures

B.

Less organizational commitment by employees

C.

Less emphasis on extrinsic rewards

D.

Less employees turnover

Full Access
Question # 60

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

A.

Session hijacking.

B.

Jailbreaking.

C.

Eavesdropping.

D.

Authentication.

Full Access
Question # 61

Which of the following is improved by the use of smart devices?

A.

Version control

B.

Privacy

C.

Portability

D.

Secure authentication

Full Access
Question # 62

Which of the following actions would senior management need to consider as pan of new IT guidelines regarding the organization's cybersecurity policies?

A.

Assigning new roles and responsibilities for senior IT management.

B.

Growing use of bring your own devices tor organizational matters

C.

Expansion of operations into new markets with united IT access

D.

Hiring new personnel within the IT department tor security purposes

Full Access
Question # 63

What would an internal auditor do to ensure that a process to mitigate risk is in place for the organization's change management process?

A.

Develop and enforce change policies to ensure employees are continually trained.

B.

Apply a risk-based approach and impose segregation of duties related to the change management process.

C.

Conduct a high-level threat analysis and implement a compensating control.

D.

Validate authorization, segregation of duties, testing of changes, and approval to move changes into production.

Full Access
Question # 64

According to IIA guidance, which of the following statements is true regarding analytical procedures?

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences but cannot be used to identify the absence of differences

Full Access
Go to page: