Which of the following devices best controls both physical and logical access to information systems?
A manager decided to build his team's enthusiasm by giving encouraging talks about employee empowerment, hoping to change the perception that management should make all decisions in the department.
The manager is most likely trying to impact which of the following components of his team's attitude?
Which of the following is the first step an internal audit activity should undertake when executing a data analytics process?
Which of the following IT controls includes protection for mainframe computers and workstations?
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager.
Which of the following organizational structures does this situation represent?
Which of the following statements is true regarding the "management-by-objectives" method?
According to MA guidance, which of the following would indicate poor change management control?
1) Low change success rate
2) Occasional planned outages
3) Low number of emergency changes.
4) Instances of unauthorized changes
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
An organization accumulated the following data for the prior fiscal year:
Value of Percentage of
Quarter
Output Produced
Cost X
1
$4,750,000
2.9
2
$4,700,000
3.0
3
$4,350,000
3.2
4
$4,000,000
3.5
Based on this data, which of the following describes the value of Cost X in relation to the value of Output Produced?
Refer to the exhibit.
If the profit margin of an organization decreases, and all else remains equal, which of the following describes
how the "Funds Needed" line in the graph below will shift?
Which of the following strategies is most appropriate for an industry that is in decline?
According to the Standards, the internal audit activity must evaluate risk exposures relating to which of the following when examining an organization's risk management process?
1) Organizational governance.
2) Organizational operations.
3) Organizational information systems.
4) Organizational structure.
Which of the following is not a method for implementing a new application system?
When developing an effective risk-based plan to determine audit priorities, an internal audit activity should start by:
Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?
In mergers and acquisitions, which of the following is an example of a horizontal combination?
Which of the following statements about slack time and milestones are true?
1) Slack time represents the amount of time a task may be delayed without delaying the entire project.
2) A milestone is a moment in time that marks the completion of the project's major deliverables.
3) Slack time allows the project manager to move resources from one task to another to ensure that the project is finished on time.
4) A milestone requires resource allocation and needs time to be completed.
Capacity overbuilding is most likely to occur when management is focused on which of the following?
When initiating international ventures, an organization should consider cultural dimensions in order to prevent misunderstandings. Which of the following does not represent a recognized cultural dimension in a work environment?
Which of the following are typical responsibilities for operational management within a risk management program?
1) Implementing corrective actions to address process deficiencies.
2) Identifying shifts in the organization's risk management environment.
3)( Providing guidance and training on risk management processes.
4) Assessing the impact of mitigation strategies and activities.
While auditing an organization's customer call center, an internal auditor notices that key performance indicators show a positive trend despite the fact that there have been increasing customer complaints over the same period Which of the following audit recommendations would most likely correct the cause of this inconsistency?
Which of the following situations best applies to an organization that uses a project rather man a process to accomplish its business activities?
All of the following are true with regard to the first-in, first-out inventory valuation method except:
For employees, the primary value of implementing job enrichment is which of the following?
According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?
Which of the following statements is true regarding the roles and responsibilities associated with a corporate social responsibility (CSR) program?
Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?
A small furniture-manufacturing firm with 100 employees is located in a two-story building and does not plan to expand. The furniture manufactured is not special-ordered or custom-made. The most likely structure for this organization would be:
At a manufacturing plant, how would using Internet of Things during the production process benefit the organization?
Which of the following budgets serves as a basis for the budgeted income statement?
Which of me following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?
An organization decided to install a motion detection system in its warehouse to protect against after-hours theft. According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?
Which of the following is useful for forecasting the required level of inventory?
1) Statistical modeling.
2) Information about seasonal variations in demand.
3) Knowledge of the behavior of different business cycles.
4) Pricing models linked to seasonal demand.
Which of the following are typical audit considerations for a review of authentication?
1) Authentication policies and evaluation of controls transactions.
2) Management of passwords, independent reconciliation, and audit trail.
3) Control self-assessment tools used by management.
4) Independent verification of data integrity and accuracy.
Which of the following activities most significantly increases the risk that a bank will make poor-quality loans to its customers?
Which of the following techniques is the most relevant when an internal auditor conducts a valuation of an organization's physical assets?
According to Porter's model of competitive strategy, which of the following is a generic strategy?
1 Differentiation.
2) Competitive advantage.
3) Focused differentiation.
4) Cost focus.
Which of the following phases of a business cycle are marked by an underuse of resources?
1) The trough.
2) The peak.
3) The recovery.
4) The recession.
An organization needs to borrow a large amount of cash to fund its expansion plan. Which of the following annual interest rates is least expensive?
The economic order quantity can be calculated using the following formula:
Which of the following describes how the optimal order size will change if the annual demand increases by 36 percent?
Providing knowledge, motivating organizational members, controlling and coordinating individual efforts, and expressing feelings and emotions are all functions of:
Which of the following local area network physical layouts is subject to the greatest risk of failure if one device fails?
An internal auditor is trying to assess control risk and the effectiveness of an organization's internal controls. Which of the following audit procedures would not provide assurance to the auditor on this matter?
According to the COSO enterprise risk management (ERM) framework, which of the following is not a typical responsibility of the chief risk officer?
When granting third parties temporary access to an entity's computer systems, which of the following is the most effective control?
According to IIA guidance, which of the following corporate social responsibility (CSR) activities is appropriate for the internal audit activity to perform?
Which of the following assumptions regarding cost-volume-profit analysis is true?
Which of the following statements is true with regard to information protection?
Which of the following should software auditors do when reporting internal audit findings related to enterprise wide resource planning?
Which of the following is a characteristic of using a hierarchical control structure?
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
Which of the following actions would senior management need to consider as pan of new IT guidelines regarding the organization's cybersecurity policies?
What would an internal auditor do to ensure that a process to mitigate risk is in place for the organization's change management process?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
Which of the following characteristics applies to an organization that adopts a flat structure?
According to MA guidance on IT. which of the following controls the routing of data packets to link computers?
According to IIA guidance on IT. which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?
Which of the following control features consists of a set of authorization codes that distinguishes among actions such as reading, adding, and deleting records?
Which of the following would best prevent unauthorized external changes to an organization's data?